default search action
Axin Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Axin Wu, Fagen Li, Xiangjun Xin, Yinghui Zhang, Jianhao Zhu:
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage. J. Syst. Archit. 149: 103104 (2024) - [j20]Qingquan Bian, Yue Zhang, Chang Song, Axin Wu:
Flexible symmetric predicate encryption for data privacy in IoT environments. Peer Peer Netw. Appl. 17(2): 656-664 (2024) - [j19]Yafeng Chen, Axin Wu, Yuer Yang, Xiangjun Xin, Chang Song:
Efficient Verifiable Cloud-Assisted PSI Cardinality for Privacy-Preserving Contact Tracing. IEEE Trans. Cloud Comput. 12(1): 251-263 (2024) - [j18]Axin Wu, Xiangjun Xin, Jianhao Zhu, Wei Liu, Chang Song, Guoteng Li:
Cloud-Assisted Laconic Private Set Intersection Cardinality. IEEE Trans. Cloud Comput. 12(1): 295-305 (2024) - [j17]Axin Wu, Yinghui Zhang, Jianhao Zhu, Qiuxia Zhao, Yu Zhang:
Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing. IEEE Trans. Cloud Comput. 12(2): 659-670 (2024) - [j16]Axin Wu, Weiqi Luo, Anjia Yang, Yinghui Zhang, Jianhao Zhu:
Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing. IEEE Trans. Serv. Comput. 17(3): 865-877 (2024) - 2023
- [j15]Axin Wu, Anjia Yang, Weiqi Luo, Jinghang Wen:
Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud. IEEE Trans. Cloud Comput. 11(2): 1886-1898 (2023) - [j14]Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen:
Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 18: 5592-5607 (2023) - 2022
- [i1]Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang:
Cross-Domain Identity-based Matchmaking Encryption. IACR Cryptol. ePrint Arch. 2022: 85 (2022) - 2021
- [j13]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j12]Zhenwei Chen, Axin Wu, Yifei Li, Qixuan Xing, Shengling Geng:
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing. Secur. Commun. Networks 2021: 6619689:1-6619689:11 (2021) - [c1]Jinghang Wen, Jia-Nan Liu, Axin Wu, Jiasi Weng:
A General Framework for Matching Pattern Hiding in Deep Packet Inspection. WISA 2021: 243-254 - 2020
- [j11]Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng:
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices. Int. J. Netw. Secur. 22(4): 698-707 (2020) - [j10]Chencheng Hu, Dong Zheng, Rui Guo, Axin Wu, Liang Wang, Shiyao Gao:
A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks. Int. J. Netw. Secur. 22(5): 874-884 (2020)
2010 – 2019
- 2019
- [j9]Sugang Ma, Tiantian Zhang, Axin Wu, Xiangmo Zhao:
Lightweight and Privacy-Preserving Data Aggregation for Mobile Multimedia Security. IEEE Access 7: 114131-114140 (2019) - [j8]Yinghui Zhang, Fangyuan Ren, Axin Wu, Tiantian Zhang, Jin Cao, Dong Zheng:
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks. IEEE Access 7: 114721-114730 (2019) - [j7]Axin Wu, Yinghui Zhang, Xiaokun Zheng, Rui Guo, Qinglan Zhao, Dong Zheng:
Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann. des Télécommunications 74(7-8): 401-411 (2019) - [j6]Yinghui Zhang, Axin Wu, Tiantian Zhang, Dong Zheng:
Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things. Ann. des Télécommunications 74(7-8): 413-421 (2019) - [j5]Aijing Sun, Axin Wu, Xiaokun Zheng, Fangyuan Ren:
Efficient and privacy-preserving certificateless data aggregation in Internet of things-enabled smart grid. Int. J. Distributed Sens. Networks 15(4) (2019) - 2018
- [j4]Dong Zheng, Axin Wu, Yinghui Zhang, Qinglan Zhao:
Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power. IEEE Access 6: 28019-28027 (2018) - [j3]Yinghui Zhang, Axin Wu, Dong Zheng:
Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J. Ambient Intell. Humaniz. Comput. 9(4): 1039-1048 (2018) - [j2]Axin Wu, Dong Zheng, Yinghui Zhang, Menglei Yang:
Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing. Sensors 18(7): 2158 (2018) - [j1]Yinghui Zhang, Menglei Yang, Dong Zheng, Pengzhen Lang, Axin Wu, Chen Chen:
Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput. 22(23): 7763-7772 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint