default search action
Qianhong Wu
Person information
- affiliation: Beihang University, School of Cyber Science and Technology, Beijing, China
- affiliation: University of Rovira i Virgili, Department of Computer Science and Mathematics, Spain
- affiliation: Wuhan University, School of Computer, China
- affiliation: Wollongong University, Center for Computer and Information Security Research, NSW, Australia
- affiliation (PhD 2005): Xidian University, State Key Laboratory Of Integrated Service Networks, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j124]Bchara Sidnawi, Bingjie Zhou, Zhen Chen, Chandra Sehgal, Sridhar Santhanam, Qianhong Wu:
A comprehensive physics-based model for the brachial Artery's full flow mediated dilation (FMD) response observed during the FMD test. Comput. Biol. Medicine 179: 108900 (2024) - [j123]Tianxu Han, Qianhong Wu, Kun Wang, Yingmiao Zhang, Sipeng Xie:
Proof of Inaction for outsourced data with exhaustive audit. Comput. Electr. Eng. 118: 109403 (2024) - [j122]Kun Wang, Qianhong Wu, Tianxu Han, Decun Luo, Hua Deng, Bo Qin, Jialiang Fan, Yingmiao Zhang:
A blockchain-based publicly verifiable data access control scheme without pairing. Comput. Electr. Eng. 120: 109724 (2024) - [j121]Mingming Wang, Qianhong Wu:
Fast intensive validation on blockchain with scale-out dispute resolution. Comput. Stand. Interfaces 89: 103820 (2024) - [j120]Tao Zhang, Qianhong Wu, Qin Wang, Tianxu Han, Bingyu Li, Yan Zhu:
Covert communication via blockchain: Hiding patterns and communication patterns. Comput. Stand. Interfaces 90: 103851 (2024) - [j119]Yizhong Liu, Boyu Zhao, Zedan Zhao, Jianwei Liu, Xun Lin, Qianhong Wu, Willy Susilo:
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain. IEEE Internet Things J. 11(15): 25694-25705 (2024) - [j118]Yizhong Liu, Zixiao Jia, Zixu Jiang, Xun Lin, Jianwei Liu, Qianhong Wu, Willy Susilo:
BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. J. Syst. Archit. 152: 103163 (2024) - [j117]Yizhong Liu, Xinxin Xing, Ziheng Tong, Xun Lin, Jing Chen, Zhenyu Guan, Qianhong Wu, Willy Susilo:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 2603-2618 (2024) - [j116]Dawei Li, Di Liu, Yangkun Ren, Yu Sun, Zhenyu Guan, Qianhong Wu, Jiankun Hu, Jianwei Liu:
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network. IEEE Trans. Dependable Secur. Comput. 21(4): 3487-3500 (2024) - [j115]Andi Liu, Yizhong Liu, Qianhong Wu, Boyu Zhao, Dongyu Li, Yuan Lu, Rongxing Lu, Willy Susilo:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. IEEE Trans. Inf. Forensics Secur. 19: 3178-3193 (2024) - [j114]Mingzhe Zhai, Qianhong Wu, Yizhong Liu, Bo Qin, Xiaopeng Dai, Qiyuan Gao, Willy Susilo:
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 5060-5074 (2024) - [j113]Mingzhe Zhai, Yizhong Liu, Qianhong Wu, Bo Qin, Haibin Zheng, Xiaopeng Dai, Zhenyang Ding, Willy Susilo:
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus. IEEE Trans. Inf. Forensics Secur. 19: 9158-9172 (2024) - [j112]Yizhong Liu, Andi Liu, Yu Xia, Bin Hu, Jianwei Liu, Qianhong Wu, Prayag Tiwari:
A Blockchain-Based Cross-Domain Authentication Management System for IoT Devices. IEEE Trans. Netw. Sci. Eng. 11(1): 115-127 (2024) - [j111]Zhenwei Guo, Bo Qin, Zhenyu Guan, Yujue Wang, Haibin Zheng, Qianhong Wu:
A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism. IEEE Trans. Smart Grid 15(1): 1075-1088 (2024) - [c110]Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia, Qianhong Wu:
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. CCS 2024: 2978-2992 - [c109]Tianxu Han, Qianhong Wu, Sipeng Xie, Kun Wang, Yingmiao Zhang:
Iterative Proof of Retrievability for Periodic Incremental Data Via Optimistic Tags Generation. CSCloud 2024: 135-140 - 2023
- [j110]Tao Zhang, Bingyu Li, Yan Zhu, Tianxu Han, Qianhong Wu:
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions. Comput. Commun. 205: 136-146 (2023) - [j109]Ya-Nan Cao, Yujue Wang, Yong Ding, Zhenwei Guo, Qianhong Wu, Hai Liang:
Blockchain-empowered security and privacy protection technologies for smart grid. Comput. Stand. Interfaces 85: 103708 (2023) - [j108]Dawei Li, Ruonan Chen, Qinjun Wan, Zhenyu Guan, Yu Sun, Qianhong Wu, Jiankun Hu, Jianwei Liu:
Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain. IEEE Internet Things J. 10(24): 21135-21142 (2023) - [j107]Hua Deng, Zheng Qin, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. IEEE Trans. Dependable Secur. Comput. 20(2): 1364-1377 (2023) - [j106]Yizhong Liu, Xinxin Xing, Haosu Cheng, Dawei Li, Zhenyu Guan, Jianwei Liu, Qianhong Wu:
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance. IEEE Trans. Inf. Forensics Secur. 18: 2276-2291 (2023) - [c108]Mengjiang Liu, Qianhong Wu, Kun Wang, Tianxu Han, Yiming Hei:
Cross-chain based Spectrum Resources Transfer Technology across Different Telecom Operators Towards 6G. Blockchain 2023: 365-369 - [c107]Kun Wang, Qianhong Wu, Tianxu Han, Yujue Wang, Yingmiao Zhang, Bo Qin:
DCSS: A Smart Contract-based Data Continuous Storage Scheme. BSCI 2023: 53-63 - [c106]Xinzhe Huang, Yujue Wang, Hai Liang, Yong Ding, Qianhong Wu, Ziyi Zhang, Qiang Qu:
EduChain: A Blockchain-Based Privacy-Preserving Lifelong Education Platform. DASFAA (4) 2023: 701-706 - [c105]Yang Yang, Bingyu Li, Shihong Xiong, Bo Qin, Yan Zhu, Haibin Zheng, Qianhong Wu:
IKE: Threshold Key Escrow Service with Intermediary Encryption. ICA3PP (3) 2023: 463-475 - [c104]Yifu Geng, Bo Qin, Qin Wang, Wenchang Shi, Qianhong Wu:
Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy. ICICS 2023: 571-589 - [c103]Erya Jiang, Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang:
BDTS: Blockchain-Based Data Trading System. ICICS 2023: 645-664 - [c102]Mingming Wang, Qianhong Wu:
Lever: Making Intensive Validation Practical on Blockchain. ISPEC 2023: 440-461 - [c101]Dawei Li, Di Liu, Yangkun Ren, Ziyi Wang, Yu Sun, Zhenyu Guan, Qianhong Wu, Jianwei Liu:
FPHammer: A Device Identification Framework based on DRAM Fingerprinting. TrustCom 2023: 1031-1040 - [i16]Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang:
Decentralized Finance (DeFi): A Survey. CoRR abs/2308.05282 (2023) - [i15]Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang:
Decentralized Finance (DeFi): A Survey. IACR Cryptol. ePrint Arch. 2023: 1210 (2023) - 2022
- [j105]Zongyang Zhang, Jiayuan Yin, Bin Hu, Ting Gao, Weihan Li, Qianhong Wu, Jianwei Liu:
CLTracer: A Cross-Ledger Tracing framework based on address relationships. Comput. Secur. 113: 102558 (2022) - [j104]Yiming Hei, Dawei Li, Chi Zhang, Jianwei Liu, Yizhong Liu, Qianhong Wu:
Practical AgentChain: A compatible cross-chain exchange system. Future Gener. Comput. Syst. 130: 207-218 (2022) - [j103]Tong Zhang, Yujue Wang, Yong Ding, Qianhong Wu, Hai Liang, Huiyong Wang:
Multi-Party Electronic Contract Signing Protocol Based on Blockchain. IEICE Trans. Inf. Syst. 105-D(2): 264-271 (2022) - [j102]Shangbin Han, Qianhong Wu, Yang Yang:
Machine learning for Internet of things anomaly detection under low-quality data. Int. J. Distributed Sens. Networks 18(10): 155013292211337 (2022) - [j101]Yizhong Liu, Jianwei Liu, Qianhong Wu, Hui Yu, Yiming Hei, Ziyu Zhou:
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework. IEEE Trans. Dependable Secur. Comput. 19(3): 2070-2088 (2022) - [j100]Hua Deng, Jixin Zhang, Zheng Qin, Qianhong Wu, Hui Yin, Aniello Castiglione:
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 3024-3037 (2022) - [j99]Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, Hai Jin:
ROSE: Robust Searchable Encryption With Forward and Backward Security. IEEE Trans. Inf. Forensics Secur. 17: 1115-1130 (2022) - [j98]Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Hui Yin:
Revocable Attribute-Based Data Storage in Mobile Clouds. IEEE Trans. Serv. Comput. 15(2): 1130-1142 (2022) - [j97]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - [c100]Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin:
Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic. DSC 2022: 206-213 - [c99]Yanran Zhang, Sheng Hu, Qin Wang, Bo Qin, Qianhong Wu, Wenchang Shi:
PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme. ICA3PP 2022: 170-191 - [c98]Yuhang Ding, Zihan Yang, Bo Qin, Qin Wang, Yanran Zhang, Qianhong Wu:
Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment. TrustCom 2022: 874-881 - [i14]Dawei Li, Di Liu, Yangkun Ren, Ziyi Wang, Yu Sun, Zhenyu Guan, Qianhong Wu, Jianwei Liu:
CyberRadar: A PUF-based Detecting and Mapping Framework for Physical Devices. CoRR abs/2201.07597 (2022) - [i13]Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang:
BDTS: A Blockchain-based Data Trading System with Fair Exchange. CoRR abs/2211.10001 (2022) - 2021
- [j96]Mengjiang Liu, Qianhong Wu, Yiming Hei, Dawei Li, Jiankun Hu:
Fair and smart spectrum allocation scheme for IIoT based on blockchain. Ad Hoc Networks 123: 102686 (2021) - [j95]Yiming Hei, Jianwei Liu, Hanwen Feng, Dawei Li, Yizhong Liu, Qianhong Wu:
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management. Comput. Networks 191: 108029 (2021) - [j94]Hanwen Feng, Jianwei Liu, Dawei Li, Ya-Nan Li, Qianhong Wu:
Traceable ring signatures: general framework and post-quantum security. Des. Codes Cryptogr. 89(6): 1111-1145 (2021) - [j93]Huili Wang, Wenping Ma, Fuyang Deng, Haibin Zheng, Qianhong Wu:
Dynamic threshold ECDSA signature and application to asset custody in blockchain. J. Inf. Secur. Appl. 61: 102805 (2021) - [j92]Yiming Hei, Yizhong Liu, Dawei Li, Jianwei Liu, Qianhong Wu:
Themis: An accountable blockchain-based P2P cloud storage scheme. Peer-to-Peer Netw. Appl. 14(1): 225-239 (2021) - [j91]Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin, Jiankun Hu, Xingang Shi, Linfeng Liu, Xia Yin:
Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning. IEEE Trans. Inf. Forensics Secur. 16: 2300-2311 (2021) - [j90]Peiming Xu, Shaohua Tang, Peng Xu, Qianhong Wu, Honggang Hu, Willy Susilo:
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server. IEEE Trans. Serv. Comput. 14(6): 1877-1889 (2021) - [j89]Meng Zhao, Yong Ding, Qianhong Wu, Yujue Wang, Bo Qin, Kefeng Fan:
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments. Wirel. Pers. Commun. 116(3): 1765-1783 (2021) - [c97]Yizhong Liu, Jianwei Liu, Yiming Hei, Yu Xia, Qianhong Wu:
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains. ACISP 2021: 372-390 - 2020
- [j88]Haibin Zheng, Qianhong Wu, Jan Xie, Zhenyu Guan, Bo Qin, Zhiqiang Gu:
An organization-friendly blockchain system. Comput. Secur. 88 (2020) - [j87]Yanan Li, Xiaotao Feng, Jan Xie, Hanwen Feng, Zhenyu Guan, Qianhong Wu:
A decentralized and secure blockchain platform for open fair data trading. Concurr. Comput. Pract. Exp. 32(7) (2020) - [j86]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [j85]Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Yunya Zhou:
Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511: 94-113 (2020) - [j84]Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin, Kefeng Fan:
Secure server-aided data sharing clique with attestation. Inf. Sci. 522: 80-98 (2020) - [j83]Wenyi Tang, Bo Qin, Yanan Li, Qianhong Wu:
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing. KSII Trans. Internet Inf. Syst. 14(1): 281-298 (2020) - [j82]Xingguang Zhou, Jianwei Liu, Zongyang Zhang, Qianhong Wu:
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System. Secur. Commun. Networks 2020: 8347213:1-8347213:20 (2020) - [j81]Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3168-3180 (2020) - [c96]Tongchen Wang, Jianwei Liu, Dawei Li, Qianhong Wu:
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models. ACISP 2020: 285-305 - [c95]Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu:
Exploring the Security of Certificate Transparency in the Wild. ACNS Workshops 2020: 453-470 - [c94]Yifu Geng, Bo Qin, Wenchang Shi, Qianhong Wu:
A Paid Message Forwarding Scheme Based on Social Network. Inscrypt 2020: 177-192 - [c93]Hanwen Feng, Jianwei Liu, Qianhong Wu, Yanan Li:
Traceable Ring Signatures with Post-quantum Security. CT-RSA 2020: 442-468 - [c92]Yizhong Liu, Jianwei Liu, Jiayuan Yin, Geng Li, Hui Yu, Qianhong Wu:
Cross-shard Transaction Processing in Sharding Blockchains. ICA3PP (3) 2020: 324-339 - [c91]Yizhong Liu, Jianwei Liu, Dawei Li, Hui Yu, Qianhong Wu:
FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding. ICA3PP (3) 2020: 409-425 - [c90]Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:
Experimental Comparisons of Verifiable Delay Functions. ICICS 2020: 510-527 - [c89]Yizhong Liu, Jianwei Liu, Yiming Hei, Wei Tan, Qianhong Wu:
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness. TrustCom 2020: 1012-1019
2010 – 2019
- 2019
- [j80]Ali Metiaf, Qianhong Wu, Yazan Aljeroudi:
Searching With Direction Awareness: Multi-Objective Genetic Algorithm Based on Angle Quantization and Crowding Distance MOGA-AQCD. IEEE Access 7: 10196-10207 (2019) - [j79]Dawei Li, Jianwei Liu, Qianhong Wu, Zhenyu Guan:
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing. IEEE Access 7: 11688-11697 (2019) - [j78]Haibin Zheng, Qianhong Wu, Zhenyu Guan, Bo Qin, Shuangyu He, Jianwei Liu:
Achieving liability in anonymous communication: Auditing and tracing. Comput. Commun. 145: 1-13 (2019) - [j77]Lin Zhong, Qianhong Wu, Jan Xie, Zhenyu Guan, Bo Qin:
A secure large-scale instant payment system based on blockchain. Comput. Secur. 84: 349-364 (2019) - [j76]Ziyu Wang, Jianwei Liu, Qianhong Wu, Yanting Zhang, Hui Yu, Ziyu Zhou:
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network. Comput. Secur. 87 (2019) - [j75]Lin Zhong, Qianhong Wu, Jan Xie, Jin Li, Bo Qin:
A secure versatile light payment system based on blockchain. Future Gener. Comput. Syst. 93: 327-337 (2019) - [j74]Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin:
Securing messaging services through efficient signcryption with designated equality test. Inf. Sci. 490: 146-165 (2019) - [j73]Waqas Haider, Jiankun Hu, Yi Xie, Xinghuo Yu, Qianhong Wu:
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization. IEEE Trans. Big Data 5(3): 305-316 (2019) - [j72]Yujue Wang, Yong Ding, Qianhong Wu, Yongzhuang Wei, Bo Qin, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. IEEE Trans. Inf. Forensics Secur. 14(7): 1779-1790 (2019) - [j71]Han Zhang, Haijun Geng, Yahui Li, Xia Yin, Xingang Shi, Zhiliang Wang, Qianhong Wu, Jianwei Liu:
DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs. IEEE/ACM Trans. Netw. 27(6): 2458-2471 (2019) - [j70]Zhiliang Wang, Han Zhang, Xingang Shi, Xia Yin, Yahui Li, Haijun Geng, Qianhong Wu, Jianwei Liu:
Efficient Scheduling of Weighted Coflows in Data Centers. IEEE Trans. Parallel Distributed Syst. 30(9): 2003-2017 (2019) - [c88]Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu:
A Flexible Instant Payment System Based on Blockchain. ACISP 2019: 289-306 - [c87]Hanwen Feng, Jianwei Liu, Qianhong Wu, Tongge Xu:
Two-Layer Group Signature and Application to E-Cash. DASC/PiCom/DataCom/CyberSciTech 2019: 193-200 - [c86]Hanwen Feng, Jianwei Liu, Qianhong Wu, Tongge Xu:
Traceable Decentralized Anonymous E-Cash System Against Active Attackers. DASC/PiCom/DataCom/CyberSciTech 2019: 344-349 - [c85]Hanwen Feng, Jianwei Liu, Qianhong Wu:
Secure Stern Signatures in Quantum Random Oracle Model. ISC 2019: 425-444 - [c84]Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. NSS 2019: 255-271 - [c83]Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. NSS 2019: 596-614 - [c82]Zhipeng Wang, Qianhong Wu:
A Practical Lattice-Based Sequential Aggregate Signature. ProvSec 2019: 94-109 - [c81]Dawei Li, Jianwei Liu, Zongxun Tang, Qianhong Wu, Zhenyu Guan:
AgentChain: A Decentralized Cross-Chain Exchange System. TrustCom/BigDataSE 2019: 491-498 - [i12]Mingming Wang, Qianhong Wu:
Lever: Breaking the Shackles of Scalable On-chain Validation. IACR Cryptol. ePrint Arch. 2019: 1172 (2019) - 2018
- [j69]Shuangyu He, Qianhong Wu, Xizhao Luo, Zhi Liang, Dawei Li, Hanwen Feng, Haibin Zheng, Yanan Li:
A Social-Network-Based Cryptocurrency Wallet-Management Scheme. IEEE Access 6: 7654-7663 (2018) - [j68]Xingguang Zhou, Jianwei Liu, Qianhong Wu, Zongyang Zhang:
Privacy Preservation for Outsourced Medical Data With Flexible Access Control. IEEE Access 6: 14827-14841 (2018) - [j67]Hui Huang, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78: 850-858 (2018) - [j66]Hua Deng, Yunya Zhou, Qianhong Wu, Bo Qin, Jianwei Liu:
Secure pay-TV for chained hotels. Int. J. Inf. Sec. 17(1): 33-42 (2018) - [j65]Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang, Jianwei Liu, Zhenyu Guan:
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin. J. Comput. Sci. Technol. 33(3): 568-586 (2018) - [j64]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Jungang Lou:
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures. Peer-to-Peer Netw. Appl. 11(2): 235-251 (2018) - [j63]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Efficient subtree-based encryption for fuzzy-entity data sharing. Soft Comput. 22(23): 7961-7976 (2018) - [j62]Wencheng Yang, Jiankun Hu, Song Wang, Qianhong Wu:
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection. Wirel. Commun. Mob. Comput. 2018: 7107295:1-7107295:17 (2018) - [c80]Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu:
Linkable Group Signature for Auditing Anonymous Communication. ACISP 2018: 304-321 - [c79]Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu:
Auditable Hierarchy-Private Public-Key Encryption. ACISP 2018: 322-340 - 2017
- [j61]Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu:
Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds. Comput. J. 60(12): 1871-1888 (2017) - [j60]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu:
Confidentiality-Preserving Publicly Verifiable Computation. Int. J. Found. Comput. Sci. 28(6): 799-818 (2017) - [j59]Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi:
Certificateless and identity-based authenticated asymmetric group key agreement. Int. J. Inf. Sec. 16(5): 559-576 (2017) - [j58]Hao-Hao Nie, Yanping Li, Qian-Hong Wu:
A Privacy-Preserving V2I Authentication Scheme Without Certificates. J. Inf. Sci. Eng. 33(4): 1025-1040 (2017) - [j57]Xiling Luo, Yili Ren, Jiankun Hu, Qianhong Wu, Jungang Lou:
Privacy-preserving identity-based file sharing in smart city. Pers. Ubiquitous Comput. 21(5): 923-936 (2017) - [j56]Jian Mao, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, Jianwei Liu:
A position-aware Merkle tree for dynamic cloud data integrity verification. Soft Comput. 21(8): 2151-2164 (2017) - [j55]Qianhong Wu, Xiuwen Zhou, Bo Qin, Jiankun Hu, Jianwei Liu, Yong Ding:
Secure joint Bitcoin trading with partially blind fuzzy signatures. Soft Comput. 21(11): 3123-3134 (2017) - [j54]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - [j53]Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. IEEE Trans. Inf. Forensics Secur. 12(4): 940-952 (2017) - [j52]Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo:
Online/Offline Provable Data Possession. IEEE Trans. Inf. Forensics Secur. 12(5): 1182-1194 (2017) - [j51]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Chuanyan Hu:
Distributed Aggregate Privacy-Preserving Authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3): 516-526 (2017) - [c78]Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. ACISP (1) 2017: 207-226 - [c77]Hanwen Feng, Jianwei Liu, Qianhong Wu, Weiran Liu:
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext. Inscrypt 2017: 278-298 - [c76]Dawei Li, Jie Chen, Jianwei Liu, Qianhong Wu, Weiran Liu:
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption. CSS 2017: 103-118 - [c75]Xingguang Zhou, Jie Chen, Zongyang Zhang, Jianwei Liu, Qianhong Wu:
Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage. CSS 2017: 411-426 - [c74]Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li:
TTP-free Fair Exchange of Digital Signatures with Bitcoin. ISPEC 2017: 62-81 - [c73]Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu:
EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System. ISPEC 2017: 435-453 - [c72]Yanan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao:
Outsourcing Encrypted Excel Files. ISPEC 2017: 506-524 - [c71]Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Yanan Li:
Secure Communications in Unmanned Aerial Vehicle Network. ISPEC 2017: 601-620 - [c70]Zhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao:
Provably Secure Self-Extractable Encryption. ProvSec 2017: 3-23 - [c69]Zhen Wang, Xiling Luo, Qianhong Wu:
Verifiably Encrypted Group Signatures. ProvSec 2017: 107-126 - [i11]Xiaofei Wang, Qianhong Wu, Yuqing Zhang:
T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework. CoRR abs/1708.08191 (2017) - [i10]Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. IACR Cryptol. ePrint Arch. 2017: 741 (2017) - 2016
- [j50]Shuangyu He, Qianhong Wu, Bo Qin, Jianwei Liu, Yan Li:
Efficient group key management for secure big data in predictable large-scale networks. Concurr. Comput. Pract. Exp. 28(4): 1174-1192 (2016) - [j49]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurr. Comput. Pract. Exp. 28(10): 2920-2939 (2016) - [j48]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. Future Gener. Comput. Syst. 62: 29-39 (2016) - [j47]Yunya Zhou, Hua Deng, Qianhong Wu, Bo Qin, Jianwei Liu, Yong Ding:
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud. Future Gener. Comput. Syst. 62: 128-139 (2016) - [j46]Qianhong Wu, Yang Sun, Bo Qin, Jiankun Hu, Weiran Liu, Jianwei Liu, Yong Ding:
Batch Public Key Cryptosystem with batch multi-exponentiation. Future Gener. Comput. Syst. 62: 196-204 (2016) - [j45]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yan Li:
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption. Int. J. Inf. Sec. 15(1): 35-50 (2016) - [j44]Jianwei Liu, Weiran Liu, Qianhong Wu, Dawei Li, Shigang Chen:
Survey on key security technologies for space information networks. J. Commun. Inf. Networks 1(1): 72-85 (2016) - [j43]Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng, Bo Qin:
SAKE: scalable authenticated key exchange for mobile e-health networks. Secur. Commun. Networks 9(15): 2754-2765 (2016) - [j42]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold attribute-based signcryption and its application to authenticated key agreement. Secur. Commun. Networks 9(18): 4914-4923 (2016) - [j41]Yi Liu, Jie Ling, Qianhong Wu, Bo Qin:
Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks. Soft Comput. 20(8): 3335-3346 (2016) - [j40]Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, Hai Jin:
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans. Computers 65(1): 66-79 (2016) - [j39]Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs, Jesús A. Manjón:
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts. IEEE Trans. Computers 65(2): 466-479 (2016) - [j38]Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin:
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response. IEEE Trans. Computers 65(8): 2562-2574 (2016) - [j37]Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang:
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Trans. Computers 65(12): 3631-3645 (2016) - [c68]Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. ACISP (2) 2016: 87-102 - [c67]Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu:
Accelerating Oblivious Transfer with Batch Multi-exponentiation. ACISP (1) 2016: 310-326 - [c66]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - [c65]Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu:
Anonymous Role-Based Access Control on E-Health Records. AsiaCCS 2016: 559-570 - [c64]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605 - [c63]Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang:
Towards Certificate-Based Group Encryption. ProvSec 2016: 296-305 - [c62]Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu:
Vulnerability analysis of iPhone 6. PST 2016: 457-463 - [c61]Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu:
Distributed Bitcoin Account Management. Trustcom/BigDataSE/ISPA 2016: 105-112 - [i9]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing. IACR Cryptol. ePrint Arch. 2016: 634 (2016) - 2015
- [j36]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu:
Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7): 1-13 (2015) - [j35]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Bao Liu:
Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 71: 50-60 (2015) - [j34]Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou:
Flexible attribute-based encryption applicable to secure e-healthcare records. Int. J. Inf. Sec. 14(6): 499-511 (2015) - [j33]Chen Yang, Yang Sun, Qianhong Wu:
Batch Attribute-Based Encryption for Secure Clouds. Inf. 6(4): 704-718 (2015) - [j32]Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. Secur. Commun. Networks 8(8): 1485-1493 (2015) - [j31]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j30]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search. IEEE Trans. Inf. Forensics Secur. 10(9): 1993-2006 (2015) - [j29]Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer:
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids. IEEE Trans. Inf. Forensics Secur. 10(11): 2340-2351 (2015) - [j28]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Zheming Dong:
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications. IEEE Trans. Inf. Forensics Secur. 10(11): 2352-2364 (2015) - [c60]Chen Yang, Bo Qin, Xiuwen Zhou, Yang Sun, Shuangyu He, Qianhong Wu:
Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks. AINA Workshops 2015: 22-24 - [c59]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou:
Group-oriented Proofs of Storage. AsiaCCS 2015: 73-84 - [c58]Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi:
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. AsiaCCS 2015: 393-404 - [c57]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. CSCloud 2015: 187-193 - [c56]Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu, Jun Zhang, Yan Li:
Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs. HPCC/CSS/ICESS 2015: 336-341 - [c55]Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu:
Batch Blind Signatures on Elliptic Curves. ISPEC 2015: 192-206 - [c54]Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia:
Flexible and Robust Privacy-Preserving Implicit Authentication. SEC 2015: 18-34 - [i8]Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia:
Flexible and Robust Privacy-Preserving Implicit Authentication. CoRR abs/1503.00454 (2015) - [i7]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Chuanyan Hu:
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures). CoRR abs/1506.08548 (2015) - [i6]Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin:
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response. CoRR abs/1508.01575 (2015) - [i5]Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou:
Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare Records. CoRR abs/1512.06578 (2015) - [i4]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search. CoRR abs/1512.06581 (2015) - 2014
- [j27]Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2): 114-121 (2014) - [j26]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Peng Zeng:
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security. Inf. Sci. 272: 223-237 (2014) - [j25]Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Lei Zhang, Jianwei Liu, Wenchang Shi:
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf. Sci. 275: 370-384 (2014) - [j24]Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks. J. Biomed. Informatics 50: 226-233 (2014) - [c53]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin:
Hierarchical Identity-Based Broadcast Encryption. ACISP 2014: 242-257 - [c52]Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. AsiaCCS 2014: 425-434 - [c51]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu:
Practical Distributed Signatures in the Standard Model. CT-RSA 2014: 307-326 - [c50]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yunya Zhou:
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS (2) 2014: 91-108 - [c49]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [c48]Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi:
Who Is Touching My Cloud. ESORICS (1) 2014: 362-379 - [c47]Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer:
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. ISPEC 2014: 388-402 - [c46]Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, Wenchang Shi:
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. ISPEC 2014: 496-510 - [c45]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. NSS 2014: 448-461 - 2013
- [j23]Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer:
Simultaneous authentication and secrecy in identity-based data upload to cloud. Clust. Comput. 16(4): 845-859 (2013) - [j22]Lei Zhang, Qianhong Wu, Bo Qin:
Identity-based optimistic fair exchange in the standard model. Secur. Commun. Networks 6(8): 1010-1020 (2013) - [j21]Peng Xu, Hai Jin, Qianhong Wu, Wei Wang:
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. IEEE Trans. Computers 62(11): 2266-2277 (2013) - [j20]Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Jesús A. Manjón:
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm. IEEE/ACM Trans. Netw. 21(2): 621-633 (2013) - [c44]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Peng Zeng, Jianwei Liu, Ruiying Du:
A Generic Construction of Proxy Signatures from Certificateless Signatures. AINA 2013: 259-266 - [c43]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi:
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. Inscrypt 2013: 239-254 - [c42]Jianwei Liu, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu:
Light Weight Network Coding Based Key Distribution Scheme for MANETs. NSS 2013: 521-534 - 2012
- [j19]Alexandre Viejo, Qianhong Wu, Josep Domingo-Ferrer:
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios. Inf. Fusion 13(4): 285-295 (2012) - [j18]Lei Zhang, Futai Zhang, Qianhong Wu:
Delegation of signing rights using certificateless proxy signatures. Inf. Sci. 184(1): 298-309 (2012) - [j17]Bo Qin, Qianhong Wu, Lei Zhang, Oriol Farràs, Josep Domingo-Ferrer:
Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Inf. Sci. 210: 67-80 (2012) - [c41]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks. IDCS 2012: 43-56 - [c40]Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer:
A New Identity Based Signcryption Scheme in the Standard Model. INCoS 2012: 606-611 - 2011
- [j16]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Úrsula González-Nicolás:
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Comput. Networks 55(15): 3246-3255 (2011) - [j15]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - [j14]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. Inf. Sci. 181(19): 4318-4329 (2011) - [c39]Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs:
Bridging Broadcast Encryption and Group Key Agreement. ASIACRYPT 2011: 143-160 - [c38]Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang:
Preserving Security and Privacy in Large-Scale VANETs. ICICS 2011: 121-135 - [c37]Hu Xiong, Qianhong Wu, Zhong Chen:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. INCoS 2011: 92-99 - [c36]Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo:
Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication. INCoS 2011: 100-107 - [c35]Hu Xiong, Qianhong Wu, Zhong Chen:
Toward Pairing-Free Certificateless Authenticated Key Exchanges. ISC 2011: 79-94 - [c34]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks. ISC 2011: 293-308 - [c33]Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer:
Fully Distributed Broadcast Encryption. ProvSec 2011: 102-119 - [i3]Ming Tang, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu:
DPA Leakage Evaluation and Countermeasure Plug-in. IACR Cryptol. ePrint Arch. 2011: 77 (2011) - 2010
- [j13]Houzhen Wang, Huanguo Zhang, Qianhong Wu, Yu Zhang, Chunlei Li, Xinyu Zhang:
Design theory and method of multivariate hash function. Sci. China Inf. Sci. 53(10): 1977-1987 (2010) - [j12]Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang:
Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Networks 54(14): 2482-2491 (2010) - [j11]Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer:
Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6): 1020-1030 (2010) - [j10]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3): 421-449 (2010) - [j9]Qianhong Wu, Josep Domingo-Ferrer, Úrsula González-Nicolás:
Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications. IEEE Trans. Veh. Technol. 59(2): 559-573 (2010) - [j8]Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer:
A Scalable Robust Authentication Protocol for Secure Vehicular Communications. IEEE Trans. Veh. Technol. 59(4): 1606-1617 (2010) - [c32]Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer:
Ad hoc broadcast encryption. CCS 2010: 741-743 - [c31]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. COCOON 2010: 510-519 - [c30]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin:
Hierarchical Certificateless Signatures. EUC 2010: 572-577 - [c29]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311 - [c28]Lei Zhang, Qianhong Wu, Bo Qin:
Authenticated Asymmetric Group Key Agreement Protocol and Its Application. ICC 2010: 1-5 - [c27]Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer:
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts. ICICS 2010: 62-76 - [c26]Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer:
Secure compression of privacy-preserving witnesses in vehicular ad hoc networks. WiMob 2010: 541-547 - [i2]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2010: 209 (2010)
2000 – 2009
- 2009
- [j7]Josep Domingo-Ferrer, Maria Bras-Amorós, Qianhong Wu, Jesús A. Manjón:
User-private information retrieval based on a peer-to-peer community. Data Knowl. Eng. 68(11): 1237-1252 (2009) - [c25]Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang:
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. IAS 2009: 483-486 - [c24]Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang:
Novel Efficient Certificateless Aggregate Signatures. AAECC 2009: 235-238 - [c23]Josep Domingo-Ferrer, Qianhong Wu:
Safety and Privacy in Vehicular Communications. Privacy in Location-Based Applications 2009: 173-189 - [c22]Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer:
Asymmetric Group Key Agreement. EUROCRYPT 2009: 153-170 - [c21]Lei Zhang, Qianhong Wu, Bo Qin:
Identity-Based Verifiably Encrypted Signatures without Random Oracles. ProvSec 2009: 76-89 - 2008
- [c20]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu:
Publicly Verifiable Privacy-Preserving Group Decryption. Inscrypt 2008: 72-83 - [c19]Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo:
Privacy for Private Key in Signatures. Inscrypt 2008: 84-95 - [c18]Josep Domingo-Ferrer, Qianhong Wu:
Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications. PiLBA 2008 - 2007
- [j6]Baocang Wang, Qianhong Wu, Yupu Hu:
A knapsack-based probabilistic encryption scheme. Inf. Sci. 177(19): 3981-3994 (2007) - [j5]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang, Zhengtao Jiang:
Short Group Signatures Without Random Oracles. J. Comput. Sci. Technol. 22(6): 805-821 (2007) - [c17]Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin:
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. ATC 2007: 32-41 - [c16]Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu:
Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195 - [c15]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 - [c14]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105 - [i1]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Group Decryption. IACR Cryptol. ePrint Arch. 2007: 17 (2007) - 2006
- [c13]Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang:
Efficient Signcryption Without Random Oracles. ATC 2006: 449-458 - [c12]Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). ATC 2006: 531-540 - [c11]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354 - [c10]Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang:
Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378 - [c9]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Ad Hoc Group Signatures. IWSEC 2006: 120-135 - 2005
- [j4]Jianhong Zhang, Qianhong Wu:
An Improved Nominative Proxy Signature for Mobile Communication. IEICE Trans. Inf. Syst. 88-D(7): 1697-1699 (2005) - [j3]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 29(3): 321-326 (2005) - [j2]Qianhong Wu, Bo Qin, Yumin Wang:
Extended Methodology of RS Design and Instances Based on GIP. J. Comput. Sci. Technol. 20(2): 270-275 (2005) - [c8]Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu:
An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423 - [c7]Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421 - 2004
- [j1]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 28(2): 153-157 (2004) - [c6]Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang:
An Improved Nominative Proxy Signature Scheme for Mobile Communication. AINA (2) 2004: 23-26 - [c5]Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang:
Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389 - [c4]Qianhong Wu, Bo Qin, Yumin Wang:
How to conduct a sealed bargain on the internet. InfoSecu 2004: 130-135 - [c3]Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang:
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341 - 2003
- [c2]Qianhong Wu, Jianhong Zhang, Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications. ICICS 2003: 226-237 - [c1]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A Novel Efficient Group Signature Scheme with Forward Security. ICICS 2003: 292-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint