huaqun Wang
TítuloCitado porAño
Proxy provable data possession in public clouds
H Wang
IEEE Transactions on Services Computing 6 (4), 551-559, 2012
1852012
Identity-based distributed provable data possession in multicloud storage
H Wang
IEEE Transactions on Services Computing 8 (2), 328-340, 2014
1582014
Identity-based remote data possession checking in public clouds
H Wang, Q Wu, B Qin, J Domingo-Ferrer
IET Information Security 8 (2), 114-121, 2013
712013
Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
H Wang, D He, S Tang
IEEE Transactions on Information Forensics and Security 11 (6), 1165-1176, 2016
682016
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
H Wang, Y Zhang, H Xiong, B Qin
IET Information Security 6 (1), 20-27, 2012
482012
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network
D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel
IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016
472016
On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
H Wang, Y Zhang
IEEE Transactions on Parallel and Distributed Systems 25 (1), 264-267, 2013
472013
TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids
H Wang, B Qin, Q Wu, L Xu, J Domingo-Ferrer
IEEE Transactions on Information Forensics and Security 10 (11), 2340-2351, 2015
362015
Anonymous and secure aggregation scheme in fog-based public cloud computing
H Wang, Z Wang, J Domingo-Ferrer
Future Generation Computer Systems 78, 712-719, 2018
342018
Strong key-exposure resilient auditing for secure cloud storage
J Yu, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017
342017
NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data, 2017
322017
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks
H Wang, Q Wu, B Qin, J Domingo-Ferrer
Journal of biomedical informatics 50, 226-233, 2014
302014
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
292016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
292016
几种无证书数字签名方案的安全性分析及改进
王化群, 徐名海, 郭显久
通信学报 29 (5), 88-92, 2008
232008
An anonymous data aggregation scheme for smart grid systems
X Liu, Y Zhang, B Wang, H Wang
Security and communication networks 7 (3), 602-610, 2014
222014
Incentive and unconditionally anonymous identity-based public provable data possession
H Wang, D He, J Yu, Z Wang
IEEE Transactions on Services Computing, 2016
212016
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Q Feng, D He, S Zeadally, H Wang
Future Generation Computer Systems 84, 239-251, 2018
202018
Improved one-to-many authentication scheme for access control in pay-TV systems
H Wang, B Qin
IET information Security 6 (4), 281-290, 2012
202012
Certificateless provable data possession scheme for cloud-based smart grid data management systems
D He, N Kumar, S Zeadally, H Wang
IEEE Transactions on Industrial Informatics 14 (3), 1232-1241, 2017
192017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20