default search action
Wenjie Yang 0001
Person information
- affiliation: Fujian Normal University, College of Mathematics and Informatics, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- affiliation: PLA Strategic Support Force Information Engineering University, Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China
- affiliation (PhD 2018): Jinan University, College of Cyber Security / College of Information Science and Technology, China
- affiliation (former): Nanjing University of Science and Technology of PLA, Computer Science Department, China
Other persons with the same name
- Wenjie Yang — disambiguation page
- Wenjie Yang 0002 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, China
- Wenjie Yang 0003 — University of Electronic Science and Technology of China, Chengdu, China
- Wenjie Yang 0004 — Hong Kong University of Science and Technology, Hong Kong
- Wenjie Yang 0005 — University of Chinese Academy of SciencesSchool of Artificial Intelligence, Beijing, China (and 1 more)
- Wenjie Yang 0006 — Fudan University, School of Data Science, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Shiyang Li, Wenjie Yang, Futai Zhang, Xinyi Huang, Rongmao Chen:
Practical two-party SM2 signing using multiplicative-to-additive functionality. Comput. Stand. Interfaces 92: 103928 (2025) - [j14]Wenjie Yang, Peiwei Cao, Futai Zhang:
A Secure Pairing-Free Certificateless Online/Offline Signcryption Scheme With Batch Verification for Edge Computing-Based VANETs. IEEE Trans. Veh. Technol. 74(1): 1570-1583 (2025) - 2024
- [j13]Jiaomei Zhang, Ayong Ye, Jianwei Chen, Yuexin Zhang, Wenjie Yang:
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain. Comput. J. 67(4): 1298-1308 (2024) - [j12]Wenjie Yang, Junzhe Fan, Futai Zhang:
An Efficient Aggregate Signature Scheme With Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks. IEEE Internet Things J. 11(20): 33788-33797 (2024) - [j11]Wenjie Yang, Junzhe Fan, Kai Song, Yun Zheng, Futai Zhang:
An Efficient and Practical Conditional Privacy-Preserving Aggregate Authentication for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 25(12): 20256-20267 (2024) - 2021
- [j10]Wenjie Yang, Shangpeng Wang, Yi Mu:
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System. IEEE Internet Things J. 8(6): 5000-5008 (2021) - [j9]Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, Xinyi Huang:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - 2020
- [j8]Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang:
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. Comput. J. 63(8): 1139-1147 (2020)
2010 – 2019
- 2019
- [j7]Wenjie Yang, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j6]Wenjie Yang, Shangpeng Wang, Wei Wu, Yi Mu:
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC. IEEE Access 7: 112870-112878 (2019) - [j5]Fatemeh Rezaeibagha, Yi Mu, Xinyi Huang, Wenjie Yang, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - 2018
- [j4]Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, Anjia Yang:
Fully distributed certificateless threshold signature without random oracles. Sci. China Inf. Sci. 61(9): 098101:1-098101:3 (2018) - [j3]Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang:
Notes on a provably-secure certificate-based encryption against malicious CA attacks. Inf. Sci. 463-464: 86-91 (2018) - 2017
- [j2]Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang:
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Secur. Commun. Networks 2017: 5704865:1-5704865:8 (2017) - [c2]Wenjie Yang, Jian Weng, Futai Zhang:
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ICICS 2017: 236-247 - 2014
- [j1]Wenjie Yang, Futai Zhang, Limin Shen:
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. Secur. Commun. Networks 7(2): 445-454 (2014) - 2012
- [c1]Wenjie Yang, Futai Zhang, Limin Shen:
Practical Certificateless Public Key Encryption in the Standard Model. NSS 2012: 320-333
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint