default search action
Caifen Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j43]Caihui Lan, Haifeng Li, Caifen Wang, Xiaodong Yang, Hailong Yao:
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse. Comput. Stand. Interfaces 90: 103852 (2024) - [j42]Xiaodong Yang, Songyu Li, Muzi Li, Xiaoni Du, Caifen Wang:
Heterogeneous Signcryption Scheme From PKI to IBC With Multi-Ciphertext Equality Test in Internet of Vehicles. IEEE Internet Things J. 11(8): 14178-14191 (2024) - [j41]Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang:
Proxy re-signature scheme with cryptographic reverse firewall for medical data security. Peer Peer Netw. Appl. 17(5): 3459-3475 (2024) - [j40]Xiaodong Yang, Wenjia Wang, Tian Tian, Caifen Wang:
Cryptanalysis and Improvement of a Blockchain-Based Certificateless Signature for IIoT Devices. IEEE Trans. Ind. Informatics 20(2): 1884-1894 (2024) - [j39]Xiaodong Yang, Songyu Li, Lan Yang, Xiaoni Du, Caifen Wang:
Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme With Conditional Privacy Preservation for VANETs. IEEE Trans. Intell. Transp. Syst. 25(9): 12256-12268 (2024) - 2023
- [j38]Xiaodong Yang, Haoqi Wen, Runze Diao, Xiaoni Du, Caifen Wang:
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 10(12): 10881-10892 (2023) - [j37]Caihui Lan, Liangliang Liu, Caifen Wang, Haifeng Li:
An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom. Inf. Sci. 624: 435-450 (2023) - [j36]Shufen Niu, Honglin Shao, Yun Su, Caifen Wang:
Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things. J. Syst. Archit. 136: 102836 (2023) - [j35]Xiaodong Yang, Zhisong Wang, Caifen Wang:
Cryptanalysis of a Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Syst. J. 17(1): 601-604 (2023) - [j34]Shufen Niu, Ying Hu, Siwei Zhou, Honglin Shao, Caifen Wang:
Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices. IEEE Syst. J. 17(3): 3503-3514 (2023) - 2022
- [j33]Shufen Niu, Siwei Zhou, Lizhi Fang, Ying Hu, Caifen Wang:
Broadcast signcryption scheme based on certificateless in wireless sensor network. Comput. Networks 211: 108995 (2022) - [j32]Shufen Niu, Mi Song, Lizhi Fang, Fei Yu, Song Han, Caifen Wang:
Keyword search over encrypted cloud data based on blockchain in smart medical applications. Comput. Commun. 192: 33-47 (2022) - [j31]Xiaodong Yang, Wenjia Wang, Caifen Wang:
Security analysis and improvement of a privacy-preserving authentication scheme in VANET. Int. J. Inf. Sec. 21(6): 1361-1371 (2022) - [j30]Shufen Niu, Honglin Shao, Ying Hu, Siwei Zhou, Caifen Wang:
Privacy-Preserving Mutual Heterogeneous Signcryption Schemes Based on 5G Network Slicing. IEEE Internet Things J. 9(19): 19086-19100 (2022) - [j29]Xiaodong Yang, Jiaqi Wang, Wanting Xi, Tian Tian, Caifen Wang:
A blockchain-based keyword search scheme with dual authorization for electronic health record sharing. J. Inf. Secur. Appl. 66: 103154 (2022) - [j28]Xiaodong Yang, Tian Tian, Jiaqi Wang, Caifen Wang:
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. Peer-to-Peer Netw. Appl. 15(5): 2270-2288 (2022) - [j27]Shufen Niu, Fei Yu, Mi Song, Song Han, Caifen Wang:
Specified keywords search scheme for EHR sharing. Soft Comput. 26(18): 8949-8960 (2022) - 2021
- [j26]Xiaodong Yang, Xixi Li, Ting Li, Xiuxiu Wang, Caifen Wang, Baohui Li:
Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain. Trans. Emerg. Telecommun. Technol. 32(12) (2021) - [j25]Haifeng Li, Yuxin Wang, Xingbing Fu, Caihui Lan, Caifen Wang, Fagen Li, He Guo:
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage. J. Inf. Secur. Appl. 61: 102927 (2021) - [j24]Bin Wu, Caifen Wang, Hailong Yao:
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT. Peer-to-Peer Netw. Appl. 14(2): 852-872 (2021) - [j23]Caihui Lan, Caifen Wang, Haifeng Li, Liangliang Liu:
Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing". IEEE Trans. Inf. Forensics Secur. 16: 2579-2580 (2021) - [j22]Caihui Lan, Haifeng Li, Caifen Wang:
Analysis of the Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage". IEEE Trans. Serv. Comput. 14(1): 44-46 (2021) - 2020
- [j21]Yulei Zhang, Xiangzhen Liu, Xiaoli Lang, Yongjie Zhang, Caifen Wang:
VCLPKES: Verifiable Certificateless Public Key Searchable Encryption Scheme for Industrial Internet of Things. IEEE Access 8: 20849-20861 (2020) - [j20]Xiaodong Yang, Ting Li, Xizhen Pei, Long Wen, Caifen Wang:
Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology. IEEE Access 8: 45468-45476 (2020) - [j19]Haifeng Li, Liangliang Liu, Caihui Lan, Caifen Wang, He Guo:
Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme. IEEE Access 8: 86797-86809 (2020) - [j18]Caifen Wang, Bin Wu, Hailong Yao:
Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures. IEEE Access 8: 119431-119447 (2020) - [j17]Xiaodong Yang, Meiding Wang, Ting Li, Rui Liu, Caifen Wang:
Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability. IEEE Access 8: 130866-130877 (2020) - [j16]Xiaodong Yang, Xizhen Pei, Meiding Wang, Ting Li, Caifen Wang:
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain. IEEE Access 8: 144809-144822 (2020) - [j15]Xiaodong Yang, Guilan Chen, Meiding Wang, Ting Li, Caifen Wang:
Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain. IEEE Access 8: 158765-158777 (2020) - [j14]Xiaodong Yang, Ting Li, Wanting Xi, Aijia Chen, Caifen Wang:
A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud. IEEE Access 8: 170713-170731 (2020) - [j13]Xiaodong Yang, Meiding Wang, Xiuxiu Wang, Guilan Chen, Caifen Wang:
Stateless Cloud Auditing Scheme for Non-Manager Dynamic Group Data With Privacy Preservation. IEEE Access 8: 212888-212903 (2020) - [j12]Yu-Lei Zhang, Long Wen, Yong-Jie Zhang, Caifen Wang:
Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing. Multim. Tools Appl. 79(37-38): 27075-27090 (2020) - [j11]Haifeng Li, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, He Guo:
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing. Sensors 20(17): 4720 (2020) - 2019
- [j10]Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li:
A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments. IEEE Access 7: 109597-109611 (2019) - [j9]Yulei Zhang, Long Wen, Yongjie Zhang, Caifen Wang:
Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search. IEEE Access 7: 146542-146551 (2019) - [j8]Xiaodong Yang, Xizhen Pei, Guilan Chen, Ting Li, Meiding Wang, Caifen Wang:
A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments. Sensors 19(12): 2692 (2019) - 2018
- [j7]Xiaodong Yang, Tingchun Ma, Ping Yang, Faying An, Caifen Wang:
Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme. Inf. Technol. Control. 47(3): 575-587 (2018) - [j6]Xiaodong Yang, Likun Xiao, Chunlin Chen, Caifen Wang:
A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments. Symmetry 10(11): 580 (2018) - 2017
- [j5]Caifen Wang, Chao Liu, Yahong Li, Hui Qiao, Li Chen:
Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks. Inf. Secur. J. A Glob. Perspect. 26(3): 136-152 (2017) - 2016
- [j4]Yahong Li, Caifen Wang, Yulei Zhang, Shufen Niu:
Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Secur. Commun. Networks 9(17): 4574-4584 (2016) - 2015
- [j3]Yulei Zhang, Yongjie Zhang, Yahong Li, Caifen Wang:
Strong Designated Verifier Signature Scheme Resisting Replay Attack. Inf. Technol. Control. 44(2): 165-171 (2015) - 2013
- [j2]Shufen Niu, Caifen Wang, Zhixuan Yu, Suzhen Cao:
Lossy data aggregation integrity scheme in wireless sensor networks. Comput. Electr. Eng. 39(6): 1726-1735 (2013) - [j1]Caifen Wang, Caihui Lan, Shufen Niu, Xiaojun Cao, Minan Gong:
An ID-Based Certified E-mail Protocol with STTP Suitable for Wireless Mobile Environments. J. Comput. 8(1): 3-9 (2013)
Conference and Workshop Papers
- 2019
- [c9]Hailong Yao, Xingbing Fu, Caifen Wang, Congcong Meng, Bo Hai, Shiqiang Zhu:
Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments. DSC 2019: 38-45 - 2018
- [c8]Hailong Yao, Caifen Wang:
A Novel Blockchain-Based Authenticated Key Exchange Protocol and Its Applications. DSC 2018: 609-614 - 2017
- [c7]Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. Inscrypt 2017: 196-208 - [c6]Shufen Niu, Zhenbin Li, Caifen Wang:
Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems. ICCCS (2) 2017: 216-229 - [c5]Caifen Wang, Chao Liu, Shufen Niu, Li Chen, Xu Wang:
An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. IWCMC 2017: 723-728 - 2015
- [c4]Caifen Wang, Yahong Li, Shih Yen Huang, Ting Xu, Chiou-Kou Tung:
A new forward secure content extraction signature scheme. FSKD 2015: 1698-1702 - 2011
- [c3]Caifen Wang, Xiaojun Cao:
An Improved Signcryption with Proxy Re-encryption and its Application. CIS 2011: 886-890 - [c2]Caifen Wang, Caihui Lan, Shufen Niu, Xiaojun Cao:
An ID-Based Certified E-mail Protocol Suitable for Wireless Mobile Environments. PAAP 2011: 146-150 - 2009
- [c1]Caifen Wang, Xiaodong Yang, Caihui Lan, Xiaojun Cao:
An Efficient Identity-Based Certified E-mail Protocol. IIH-MSP 2009: 1197-1200
Informal and Other Publications
- 2020
- [i1]Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li:
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT. IACR Cryptol. ePrint Arch. 2020: 143 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint