default search action
Wei Luo 0003
Person information
- affiliation: Xidian University, State Key Laboratory of Integrated Service Networks, Xian, China
Other persons with the same name
- Wei Luo — disambiguation page
- Wei Luo 0001 — Deakin University, Geelong, VIC, Australia (and 1 more)
- Wei Luo 0002 — Northern Illinois University, Department of Geography, DeKalb, IL, USA
- Wei Luo 0004 — University of Navarra, IESE Business School, Barcelona, Spain
- Wei Luo 0005 — Fudan University, State Key Laboratory of ASIC and System, Shanghai, China
- Wei Luo 0006 — South China Agricultural University, College of Mathematics and Informatics, Guangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j10]Wei Luo, Wenping Ma, Juntao Gao:
MHB*T based dynamic data integrity auditing in cloud storage. Clust. Comput. 24(3): 2115-2132 (2021) - 2019
- [j9]Wei Luo, Wenping Ma:
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. Clust. Comput. 22(2): 541-551 (2019) - [j8]Jiaojiao Zhao, Wenping Ma, Wei Luo, Xiaoxue Liu:
基于密钥共享的分层混合认证模型 (Hierarchical Hybrid Authentication Model Based on Key Sharing). 计算机科学 46(2): 115-119 (2019) - [j7]Tong Wang, Wenping Ma, Wei Luo:
基于区块链的信息共享及安全多方计算模型 (Information Sharing and Secure Multi-party Computing Model Based on Blockchain). 计算机科学 46(9): 162-168 (2019) - 2018
- [j6]Wei Luo, Wenping Ma:
Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing. IEEE Access 6: 40420-40428 (2018) - [j5]Qiang Gao, Wenping Ma, Wei Luo:
Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Networks 73: 40-50 (2018) - [j4]Qiang Gao, Wenping Ma, Wei Luo, Feifei Zhao:
Hash-Chain Improvement of Key Predistribution Schemes Based on Transversal Designs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 157-159 (2018) - [j3]Yanrong Xie, Wenping Ma, Wei Luo:
一种新的信息服务实体跨域认证模型 (New Cross-domain Authentication Model for Information Services Entity). 计算机科学 45(9): 177-182 (2018) - 2017
- [j2]Qiang Gao, Wenping Ma, Wei Luo:
A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks. Wirel. Pers. Commun. 96(2): 2179-2204 (2017) - 2016
- [j1]Wei Luo, Wenping Ma, Qiang Gao:
A dynamic trust management system for wireless sensor networks. Secur. Commun. Networks 9(7): 613-621 (2016)
Conference and Workshop Papers
- 2018
- [c1]Wei Luo, Wenping Ma:
A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage. ICCCS (2) 2018: 519-530
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint