default search action
Wei Gao 0007
Person information
- affiliation: Ludong University, School of Mathematics and Statistics, Yantai, China
- affiliation: Nanjing University of Information Science and Technology, School of Computer and Software, China
- affiliation: Guangzhou University, Key Laboratory of Information Security, China
- affiliation (former): Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
- affiliation (former): Hunan University, School of Mathematics and Econometrics, Changsha, China
Other persons with the same name
- Wei Gao — disambiguation page
- Wei Gao 0001 — Singapore Management University (and 3 more)
- Wei Gao 0002 — Northeast Normal University, School of Mathematics and Statistics, Key Laboratory for Applied Statistics of MOE, Changchun, China
- Wei Gao 0003 — Peking University, Shenzhen Graduate School, School of Electronic and Computer Engineering, China
- Wei Gao 0004 — California Institute of Technology, Pasadena, CA, USA (and 2 more)
- Wei Gao 0005 — Harbin Institute of Technology, School of Electrical Engineering and Automation, China
- Wei Gao 0006 — University of Pittsburgh, Department of Electrical and Computer Engineering, PA, USA (and 2 more)
- Wei Gao 0008 — Nanjing University, National Key Laboratory for Novel Software Technology, China
- Wei Gao 0009 — University of Western Australia, School of Electrical Electronic and Computer Engineering, Perth, Australia
- Wei Gao 0010 — Harbin Institute of Technology, School of Electrical Engineering and Automation, China (and 1 more)
- Wei Gao 0011 — State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
- Wei Gao 0012 — Yunnan Normal University, School of Information Science and Technology, Kunming, China
- Wei Gao 0013 — Ningbo University, College of Science and Technology / Faculty of Information Science and Engineering, China
- Wei Gao 0014 — Chinese Academy of Sciences, Institute of Automation, National Laboratory of Pattern Recognition, Beijing, China
- Wei Gao 0015 — Beihang University, School of Astronautics, Beijing, China
- Wei Gao 0016 — Inner Mongolia University, School of Mathematical Sciences, Hohhot, China
- Wei Gao 0017 — University of Auckland, Faculty of Engineering, Department of Chemical and Material Engineering, New Zealand
- Wei Gao 0018 — Xi'an University of Finance and Economics, School of Statistics, Xi'an, China
- Wei Gao 0019 — University of New South Wales, School of Civil and Environmental Engineering, Sydney, Australia
- Wei Gao 0020 — University of Arizona, Tucson, AZ, USA
- Wei Gao 0021 — Jiangsu University, School of Computer Science and Communication Engineering, Zhenjiang, China (and 1 more)
- Wei Gao 0022 — University of Hong Kong, Queen Mary Hospital, Department of Surgery, Hong Kong
- Wei Gao 0023 — Fuzhou University, College of Electrical Engineering and Automation, China
- Wei Gao 0024 — Chinese Academy of Sciences, Shanghai Institute of Microsystem and Information Technology, China
- Wei Gao 0025 — Wuhu Vocational Institute of Technology, School of Electrical Engineering, China
- Wei Gao 0026 — Massachusetts Institute of Technology, CASIL, MA, USA
- Wei Gao 0027 — Tohoku University, Department of Finemechanics, School of Engineering, Sendai, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j20]Fei Li, Dongqing Xie, Wei Gao, Kefei Chen, Guilin Wang, Roberto Metere:
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. J. Ambient Intell. Humaniz. Comput. 15(2): 1317-1326 (2024) - 2022
- [j19]Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. Comput. J. 65(9): 2430-2438 (2022) - 2019
- [j18]Gang Sheng, Chunming Tang, Hongyan Han, Wei Gao, Xing Hu:
Authentication of outsourced linear function query with efficient updates. Clust. Comput. 22(Supplement): 10031-10039 (2019) - [j17]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Chunming Tang:
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash. Frontiers Inf. Technol. Electron. Eng. 20(2): 176-186 (2019) - 2018
- [j16]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold decryption scheme from bilinear pairings. Frontiers Comput. Sci. 12(1): 177-189 (2018) - [j15]Feng Wang, Li Xu, Wei Gao:
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors". IEEE Trans. Comput. Soc. Syst. 5(3): 854-857 (2018) - 2017
- [j14]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. Informatica 28(2): 215-235 (2017) - 2016
- [j13]Fei Li, Dongqing Xie, Wei Gao, Jianhua Yan, Xu An Wang:
Round-optimal ID-based dynamic authenticated group key agreement. Int. J. High Perform. Syst. Archit. 6(3): 153-161 (2016) - 2015
- [j12]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. Comput. J. 58(10): 2747-2757 (2015) - [j11]Jianhua Yu, Xueli Wang, Wei Gao:
Improvement and applications of secure outsourcing of scientific computations. J. Ambient Intell. Humaniz. Comput. 6(6): 763-772 (2015) - [j10]Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu:
A brief survey on secure multi-party computing in the presence of rational parties. J. Ambient Intell. Humaniz. Comput. 6(6): 807-824 (2015) - 2014
- [j9]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold signature scheme from bilinear pairings in standard model. Int. J. Internet Protoc. Technol. 8(2/3): 107-115 (2014) - [j8]Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao:
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. IEEE Trans. Inf. Forensics Secur. 9(12): 2302-2313 (2014) - 2013
- [j7]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures and Its Application to E-Prosecution. J. Comput. 8(4): 833-841 (2013) - [j6]Fei Li, Wei Gao, Yilei Wang, Xueli Wang:
Short Convertible Undeniable Signature From Pairing. J. Softw. 8(12): 2983-2990 (2013) - 2012
- [j5]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption. J. Commun. 7(12): 909-920 (2012) - [j4]Fei Li, Wei Gao, Yilei Wang, Xueli Wang:
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings. J. Comput. 7(12): 2987-2996 (2012) - 2009
- [j3]Wei Gao, Fei Li, Xueli Wang:
Chameleon hash without key exposure based on Schnorr signature. Comput. Stand. Interfaces 31(2): 282-285 (2009) - [j2]Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang:
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings. Informatica 20(4): 461-476 (2009) - 2007
- [j1]Wei Gao, Xueli Wang, Dongqing Xie:
Chameleon Hashes Without Key Exposure Based on Factoring. J. Comput. Sci. Technol. 22(1): 109-113 (2007)
Conference and Workshop Papers
- 2017
- [c10]Fei Li, Wei Gao, Dongqing Xie, Chunming Tang:
Certificateless Cryptography with KGC Trust Level 3 Revisited. ICCCS (2) 2017: 292-304 - 2016
- [c9]Fei Li, Dongqing Xie, Wei Gao, Xu An Wang, Jianhua Yan:
An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings. CISIS 2016: 468-472 - [c8]Gang Sheng, Chunming Tang, Wei Gao, Ying Yin:
MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication. NSS 2016: 349-362 - 2012
- [c7]Wei Gao, Zhenyou Wang, Fei Li:
On Generic Construction for Private Designated Verifier Signatures. CIS 2012: 497-499 - [c6]Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:
Designated Condition One-Time Signatures. IDCS 2012: 253-263 - 2009
- [c5]Wei Gao, Zhenyou Wang, Fei Li, Li'e Chen:
An Efficient Threshold Signature Scheme Without Random Oracles. CIS (1) 2009: 400-404 - [c4]Zhenyou Wang, Wei Gao, Li'e Chen, Fei Li:
Perfect Subliminal Channel in a Paring-Based Digital Signature. CIS (1) 2009: 455-457 - 2008
- [c3]Wei Gao, Fei Li, Banghai Xu:
An Abuse-Free Optimistic Fair Exchange Protocol Based on BLS Signature. CIS (2) 2008: 278-282 - [c2]Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. Pairing 2008: 316-331 - 2006
- [c1]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures. WISA 2006: 1-14
Informal and Other Publications
- 2017
- [i6]Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu:
Authentication of Outsourced Linear Function Query with Efficient Updates. IACR Cryptol. ePrint Arch. 2017: 337 (2017) - 2012
- [i5]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. IACR Cryptol. ePrint Arch. 2012: 73 (2012) - [i4]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptol. ePrint Arch. 2012: 75 (2012) - [i3]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. IACR Cryptol. ePrint Arch. 2012: 104 (2012) - [i2]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. IACR Cryptol. ePrint Arch. 2012: 105 (2012) - 2007
- [i1]Wei Gao, Xueli Wang, Guilin Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. IACR Cryptol. ePrint Arch. 2007: 7 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint