huaqun Wang
TítuloCitado porAño
Proxy provable data possession in public clouds
H Wang
IEEE Transactions on Services Computing 6 (4), 551-559, 2012
2222012
Identity-based distributed provable data possession in multicloud storage
H Wang
IEEE Transactions on Services Computing 8 (2), 328-340, 2014
1802014
Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
H Wang, D He, S Tang
IEEE Transactions on Information Forensics and Security 11 (6), 1165-1176, 2016
832016
Identity-based remote data possession checking in public clouds
H Wang, Q Wu, B Qin, J Domingo-Ferrer
IET Information Security 8 (2), 114-121, 2013
772013
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network
D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel
IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016
552016
On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
H Wang, Y Zhang
IEEE Transactions on Parallel and Distributed Systems 25 (1), 264-267, 2013
502013
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
H Wang, Y Zhang, H Xiong, B Qin
IET Information Security 6 (1), 20-27, 2012
502012
Anonymous and secure aggregation scheme in fog-based public cloud computing
H Wang, Z Wang, J Domingo-Ferrer
Future Generation Computer Systems 78, 712-719, 2018
462018
Strong key-exposure resilient auditing for secure cloud storage
J Yu, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017
422017
NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data, 2017
402017
TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids
H Wang, B Qin, Q Wu, L Xu, J Domingo-Ferrer
IEEE Transactions on Information Forensics and Security 10 (11), 2340-2351, 2015
402015
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
372016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
372016
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks
H Wang, Q Wu, B Qin, J Domingo-Ferrer
Journal of biomedical informatics 50, 226-233, 2014
372014
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Q Feng, D He, S Zeadally, H Wang
Future Generation Computer Systems 84, 239-251, 2018
272018
Certificateless provable data possession scheme for cloud-based smart grid data management systems
D He, N Kumar, S Zeadally, H Wang
IEEE Transactions on Industrial Informatics 14 (3), 1232-1241, 2017
242017
Incentive and unconditionally anonymous identity-based public provable data possession
H Wang, D He, J Yu, Z Wang
IEEE Transactions on Services Computing, 2016
242016
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
242016
An anonymous data aggregation scheme for smart grid systems
X Liu, Y Zhang, B Wang, H Wang
Security and communication networks 7 (3), 602-610, 2014
232014
几种无证书数字签名方案的安全性分析及改进
王化群, 徐名海, 郭显久
通信学报 29 (5), 88-92, 2008
232008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20