default search action
Xu An Wang 0001
Person information
- unicode name: 王绪安
- affiliation: Engineering University of Chinese Armed Police Force, Xi'an, China
- affiliation: Guizhou University, State Key Laboratory of Public Big Data, China
Other persons with the same name
- Xuan Wang — disambiguation page
- Xuan Wang 0001 — Hong Kong University of Science and Technology, Department of Electronic and Computer Engineering, Hong Kong (and 4 more)
- Xuan Wang 0002 — Harbin Institute of Technology, Shenzhen Graduate School, China (and 1 more)
- Xuan Wang 0003 — Hong Kong University of Science and Technology, Department of Information Systems, Business Statistics and Operations, Hong Kong (and 1 more)
- Xuan Wang 0004 — Ocean University of China, Qingdao Collaborative Innovation Center of Marine Science and Technology, Qingdao, China (and 1 more)
- Xuan Wang 0005 — Fujian Normal University, College of Photonic and Electronic Engineering, China
- Xuan Wang 0006 — Shaanxi Normal University, School of Physics and Information Technology, Xi'an, China
- Xuan Wang 0007 — University of Stuttgart, Germany
- Xuan Wang 0008 — Virginia Tech, VA, USA (and 1 more)
- Xuan Wang 0009 — Xi'an Jiaotong University, Institute of Artificial Intelligence and Robotics / School of Software Engineering, China
- Xuan Wang 0010 — Beijing University of Posts and Telecommunications, School of Automation, China
- Xuan Wang 0011 — Bath Spa University, Center for Creative Computing, Somerset, UK
- Xuan Wang 0012 — University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA
- Xuan Wang 0013 — George Mason University, Department of Electrical and Computer Engineering, Fairfax, VA 22030 USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j88]Jiasen Liu, Xu An Wang, Guofeng Li, Dan Yu, Jindan Zhang:
Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting. Comput. Intell. 40(1) (2024) - [j87]Shuanggen Liu, Yingzi Hu, Xu An Wang, Xukai Liu, Yuqing Yin, Teng Wang:
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing. J. Inf. Secur. Appl. 84: 103803 (2024) - [j86]Shuanggen Liu, Hailun Pan, Xu An Wang, Siyi Zhao, Qing Li:
A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT. J. Syst. Archit. 149: 103100 (2024) - [j85]Shuanggen Liu, Hui Song, Xu An Wang, Yuxin He, Yifan Song:
Secure Data Sharing in V2N Based on a Privacy-Preserving Identify-Based Broadcast Proxy Re-Encryption Plus Scheme. IEEE Netw. 38(3): 70-75 (2024) - [c130]Ziying Liu, Xu Chen, Xu-An Wang:
Research on Bitcoin Price Prediction Based on Text Analysis and Deep Learning. IMIS 2024: 58-68 - [c129]Feiyu Yao, Na Deng, Xu-An Wang:
Bird Recognition Based on Mixed Convolutional Neural Network. IMIS 2024: 235-246 - 2023
- [j84]Yunxuan Su, Xu An Wang, Weidong Du, Yu Ge, Kaiyang Zhao, Ming Lv:
A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT. J. High Speed Networks 29(1): 41-56 (2023) - [j83]Zheng Tu, Xu An Wang, Weidong Du, Zexi Wang, Ming Lv:
An improved multi-copy cloud data auditing scheme and its application. J. King Saud Univ. Comput. Inf. Sci. 35(3): 120-130 (2023) - [j82]Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j81]Xiuguang Li, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, Xiaoyuan Yang:
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. Sensors 23(9): 4307 (2023) - [c128]Xu An Wang, Mingyu Zhou, Wenyong Yuan:
Cryptanalysis of a Public Cloud Auditing Scheme. EIDWT 2023: 292-296 - [c127]Xu An Wang, Xindi Ma, Zhiwei Zhang, Jindan Zhang:
On the Security of a Cloud Auditing Storage Protocol. INCoS 2023: 234-243 - [c126]Mingyu Zhou, Xu An Wang, Xiong Zhang, Xiaoxuan Xu, Jindan Zhang, PengLin Li:
An Improved Data Integrity Verification Scheme for Cloud Storage. INCoS 2023: 393-401 - [i9]Xu An Wang, Lunhai Pan, Hao Liu, Xiaoyuan Yang:
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. IACR Cryptol. ePrint Arch. 2023: 1692 (2023) - 2022
- [j80]Daxin Huang, Qingqing Gan, Xiaoming Wang, Marek R. Ogiela, Xu An Wang:
Privacy preserving IoT-based crowd-sensing network with comparable homomorphic encryption and its application in combating COVID19. Internet Things 20: 100625 (2022) - [j79]Kaiyang Zhao, Xu An Wang, Bo Yang, Youliang Tian, Jindan Zhang:
A privacy preserving homomorphic computing toolkit for predictive computation. Inf. Process. Manag. 59(2): 102880 (2022) - [j78]Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient Intell. Humaniz. Comput. 13(1): 469-482 (2022) - [j77]Xiaoyi Ge, Mingshu Zhang, Xu An Wang, Jia Liu, Bin Wei:
Emotion-Drive Interpretable Fake News Detection. Int. J. Data Warehous. Min. 18(1): 1-17 (2022) - [j76]Ruifeng Li, Xu An Wang, Haibin Yang, Ke Niu, Dianhua Tang, Xiaoyuan Yang:
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8079-8089 (2022) - [j75]Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1518-1531 (2022) - [c125]Zheng Tu, Xu An Wang, Yunxuan Su, Ying Li, Jiasen Liu:
Toward Secure K-means Clustering Based on Homomorphic Encryption in Cloud. EIDWT 2022: 52-62 - [c124]Xu An Wang, Xiaozhong Pan, Lixian Wei, Yize Zhao:
On the Insecurity of a Certificateless Public Verification Protocol for the Outsourced Data Integrity in Cloud Storage. EIDWT 2022: 63-67 - [c123]Xu An Wang, Ruifeng Li:
Improved Secure Provable Data Possession Scheme for Cloud Storage. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 456-460 - 2021
- [j74]Jindan Zhang, Chuan Lin, Urszula Ogiela, Nadia Nedjah, Arun Kumar Sangaiah, Xuan Wang:
Improved publicly verifiable auditing protocol for cloud storage. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j73]Jiasen Liu, Xu An Wang, Bowei Chen, Zheng Tu, Kaiyang Zhao:
Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing. Int. J. Mob. Comput. Multim. Commun. 12(3): 27-43 (2021) - [j72]Han Wang, Xu An Wang, Shuai Xiao, Jiasen Liu:
Decentralized data outsourcing auditing protocol based on blockchain. J. Ambient Intell. Humaniz. Comput. 12(2): 2703-2714 (2021) - [j71]Kaiyang Zhao, Xu An Wang, Jiasen Liu, Yi Qiao, Yang Zhou:
Secure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City. J. Circuits Syst. Comput. 30(15): 2150267:1-2150267:25 (2021) - [j70]Haibin Yang, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui, Xiaoyuan Yang:
Improved Outsourced Provable Data Possession for Secure Cloud Storage. Secur. Commun. Networks 2021: 1805615:1-1805615:12 (2021) - [j69]Jindan Zhang, Rongxing Lu, Baocang Wang, Xu An Wang:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". IEEE Trans. Inf. Forensics Secur. 16: 1288-1289 (2021) - [j68]Haibin Yang, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, Xiaoyuan Yang:
Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data. Wirel. Commun. Mob. Comput. 2021: 8886763:1-8886763:13 (2021) - [c122]Xu An Wang:
Cryptanalysis of a Privacy Preserving Ranked Multi-keyword Search Scheme in Cloud Computing. AINA (3) 2021: 367-370 - [c121]Wenchao Liu, Yingnan Zhang, Xu An Wang, Zhong Wang:
Improvement of the Matrix for Simple Matrix Encryption Scheme. AINA (2) 2021: 509-521 - [c120]Yunxuan Su, Xu An Wang, Yu Ge:
A Scheme for Checking Similarity and Its Application in Outsourced Image Processing. IMIS 2021: 511-517 - [c119]Xu An Wang, Yunxuan Su, Jindan Zhang:
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. NaNA 2021: 278-281 - 2020
- [j67]Jiasen Liu, Xu An Wang, Zhiquan Liu, Han Wang, Xiaoyuan Yang:
Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles. IEEE Access 8: 79428-79439 (2020) - [j66]Jindan Zhang, Baocang Wang, Marek R. Ogiela, Xu An Wang, Arun Kumar Sangaiah:
New public auditing protocol based on homomorphic tags for secure cloud storage. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j65]Jindan Zhang, Baocang Wang, Xu An Wang, Han Wang, Shuai Xiao:
New group user based privacy preserving cloud auditing protocol. Future Gener. Comput. Syst. 106: 585-594 (2020) - [j64]Rui Ma, Yue Liu, Ke Ma, Xu An Wang:
Identification and addressing of internet of things based on distributed ID. Int. J. Embed. Syst. 12(2): 195-205 (2020) - [j63]Xiangsong Zhang, Zhenhua Liu, Xu An Wang, Fenghe Wang:
Constant-size ring signature scheme using multilinear maps. Int. J. Embed. Syst. 12(2): 206-215 (2020) - [j62]Jindan Zhang, Zhihu Li, Baocang Wang, Xu An Wang, Urszula Ogiela:
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation. Inf. Process. Manag. 57(6): 102287 (2020) - [j61]Xu An Wang, Kim-Kwang Raymond Choo, Jian Weng, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". IEEE Trans. Inf. Forensics Secur. 15: 1586-1588 (2020) - [c118]Zheng Tu, Yunxuan Su, Xu An Wang, Ruifeng Li:
Design and Implementation of Secure File Transfer System Based on Java. 3PGCIC 2020: 366-375 - [c117]Yunxuan Su, Zheng Tu, Xu An Wang, Ruifeng Li:
Secure Outsourcing Protocol Based on Paillier Algorithm for Cloud Computing. 3PGCIC 2020: 376-384 - [c116]Junke Nie, Xu An Wang, Yang Su, Bo Wang:
Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder. AINA Workshops 2020: 56-64 - [c115]Kaiyang Zhao, Xu An Wang, Yao Liu, Jiasen Liu, Songyin Zhao:
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing. AINA Workshops 2020: 138-148 - [c114]Jiasen Liu, Xu An Wang, Kaiyang Zhao, Han Wang:
Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure. EIDWT 2020: 290-300 - [c113]Han Wang, Xu An Wang, Jiasen Liu, Chuan Lin:
Identify-Based Outsourcing Data Auditing Scheme with Lattice. FCS 2020: 347-358 - [c112]Shudong Liu, Jiamin Wei, Xu Chen, Chuang Wang, Xu An Wang:
Credit Rating Based on Hybrid Sampling and Dynamic Ensemble. INCoS 2020: 338-347 - [c111]Yitao Yang, Yubao Wu, Xu An Wang:
Trusted Records Scheme in Scene Investigation. NBiS 2020: 303-308
2010 – 2019
- 2019
- [j60]Xu An Wang, Yudong Liu, Arun Kumar Sangaiah, Jindan Zhang:
Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. Computing 101(7): 773-790 (2019) - [j59]Yudong Liu, Shuai Xiao, Han Wang, Xu An Wang:
New provable data transfer from provable data possession and deletion for secure cloud storage. Int. J. Distributed Sens. Networks 15(4) (2019) - [j58]Xiangxin Liu, Xiaoyuan Yang, Yiliang Han, Xu An Wang:
A Secure and Efficient Code-Based Signature Scheme. Int. J. Found. Comput. Sci. 30(4): 635-645 (2019) - [j57]Xu An Wang, Jian Weng, Jianfeng Ma, Xiaoyuan Yang:
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf. Sci. 488: 13-18 (2019) - [j56]Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang, Cong Li:
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J. Ambient Intell. Humaniz. Comput. 10(2): 429-438 (2019) - [j55]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Zhiheng Zheng:
Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. J. Parallel Distributed Comput. 130: 153-165 (2019) - [j54]Jindan Zhang, Baocang Wang, Debiao He, Xu An Wang:
Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput. 23(10): 3411-3422 (2019) - [c110]Bo Wang, Xu An Wang, Yang Su, Junke Nie:
Detection of Malicious Code Variants Based on a Flexible and Lightweight Net. 3PGCIC 2019: 367-377 - [c109]Peng Ma, Zeyu Wang, Weidong Zhong, Xu An Wang:
Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet. 3PGCIC 2019: 378-388 - [c108]Yanjing Hu, Xu An Wang:
Perception Mining of Network Protocol's Stealth Attack Behaviors. BWCCA 2019: 657-669 - [c107]Songyin Zhao, Xu An Wang:
A Survey of Malicious HID Devices. BWCCA 2019: 777-786 - [c106]Zeyu Wang, Wei Zhang, Peng Ma, Xu An Wang:
Power Consumption Attack Based on Improved Principal Component Analysis. BWCCA 2019: 787-799 - [c105]Wenchao Liu, Feng Pan, Xu An Wang, Guangsheng Tu, Weidong Zhong:
Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE. CISIS 2019: 660-668 - [c104]Han Wang, Xu An Wang, Shuai Xiao, Zichen Zhou:
Blockchain-Based Public Auditing Scheme for Shared Data. IMIS 2019: 197-206 - [c103]Zhongshi Gao, Yang Su, Yi Ding, Yudong Liu, Xu An Wang, Junwei Shen:
Key Technologies of Anomaly Detection Using PCA-LSTM. IMIS 2019: 246-254 - [c102]Shuai Xiao, Xu An Wang, Han Wang:
Large-Scale Electronic Voting Based on Conflux Consensus Mechanism. IMIS 2019: 291-299 - [c101]Han Wang, Xu An Wang, Wei Wang, Shuai Xiao:
A Basic Framework of Blockchain-Based Decentralized Verifiable Outsourcing. INCoS 2019: 415-421 - [c100]Shuai Xiao, Xu An Wang, Wei Wang, Han Wang:
Survey on Blockchain-Based Electronic Voting. INCoS 2019: 559-567 - [p1]Shuaishuai Zhu, Xu An Wang, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Dynamic public opinion evolvement modeling and supervision in social networks. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 239-262 - 2018
- [j53]Xu An Wang, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding:
Improved functional proxy re-encryption schemes for secure cloud data sharing. Comput. Sci. Inf. Syst. 15(3): 585-614 (2018) - [j52]Xiaoyuan Yang, Xiaoshuang Luo, Xu An Wang, Shuaiwei Zhang:
Improved outsourced private set intersection protocol based on polynomial interpolation. Concurr. Comput. Pract. Exp. 30(1) (2018) - [j51]Xu An Wang, Yudong Liu, Jindan Zhang, Xiaoyuan Yang, Minqing Zhang:
Improved group-oriented proofs of cloud storage in IoT setting. Concurr. Comput. Pract. Exp. 30(21) (2018) - [j50]Liming Zheng, Xu An Wang, Xiaobo Tian, Xiaodong Li:
TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems. Int. J. Comput. Sci. Eng. 16(3): 242-254 (2018) - [j49]Shuanggen Liu, Huatong Yao, Xu An Wang:
Fast elliptic curve scalar multiplication for resisting against SPA. Int. J. Comput. Sci. Eng. 17(3): 343-352 (2018) - [j48]Shuanggen Liu, Guanglu Qi, Xu An Wang:
Fast elliptic curve algorithm using deformed Fibonacci-type series. Int. J. Embed. Syst. 10(2): 104-112 (2018) - [j47]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Leonard Barolli, Yunlong Ge:
PRE+: dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 14(1): 44-69 (2018) - [j46]Zhiqiang Gao, Yixiao Sun, Xiaolong Cui, Yutao Wang, Yanyu Duan, Xu An Wang:
Privacy-Preserving Hybrid K-Means. Int. J. Data Warehous. Min. 14(2): 1-17 (2018) - [j45]Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Liqun Lv, Yitao Ding, Xu An Wang:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. Secur. Commun. Networks 2018: 4635715:1-4635715:12 (2018) - [j44]Xu An Wang, Fatos Xhafa, Xiaoshuang Luo, Shuaiwei Zhang, Yong Ding:
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks. Soft Comput. 22(8): 2517-2526 (2018) - [c99]Xu An Wang, Arun Kumar Sangaiah, Nadia Nedjah, Chun Shan, Zuliang Wang:
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme. 3PGCIC 2018: 192-198 - [c98]Yanjing Hu, Xu An Wang, Haining Luo, Shuaishuai Zhu:
Mining and Utilizing Network Protocol's Stealth Attack Behaviors. 3PGCIC 2018: 212-222 - [c97]Xu An Wang, Shuaishuai Zhu, Arun Kumar Sangaiah, Shuai Xue, Yunfei Cao:
More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing. 3PGCIC 2018: 293-299 - [c96]Xu An Wang, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan, Zuliang Wang:
Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing. 3PGCIC 2018: 478-485 - [c95]Wenwu Chen, Su Yang, Xu An Wang, Wei Zhang, Jindan Zhang:
Network Malicious Behavior Detection Using Bidirectional LSTM. CISIS 2018: 627-635 - [c94]Jingcheng Miao, Xiao-ou Song, Zili Wang, Xu An Wang:
Improved Cooperative Spectrum Sensing Algorithm with Artificial Neural Network. CISIS 2018: 639-649 - [c93]Wen-shuai Yang, Xu An Wang, Sha Zhou, Hong-xu Zhao, Jiaxing Huang:
An Improved Method for Voiceprint Recognition. CISIS 2018: 735-746 - [c92]Yun Wang, Xu An Wang, Jindan Zhang, Chenghai Yu:
Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis. CISIS 2018: 780-790 - [c91]Yanyu Duan, Xu An Wang, Fang Li, Jindan Zhang:
Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data. CISIS 2018: 1069-1076 - [c90]Deyang Zhang, Xu An Wang, Xiaolong Li, Chunfen Xu:
Threshold Model Based on Relative Influence Weight of User. EIDWT 2018: 437-448 - [c89]Yudong Liu, Xu An Wang, Arun Kumar Sangaiah, Heshuai Shao:
Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting. EIDWT 2018: 462-469 - [c88]Cong Li, Xu An Wang, Arun Kumar Sangaiah, Haibing Yang, Chun Shan:
Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size. EIDWT 2018: 792-800 - [c87]Ping Bai, Wei Zhang, Xu An Wang, Yudong Liu, Haibin Yang, Chun Shan:
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. EIDWT 2018: 841-848 - [c86]Wenwu Chen, Xu An Wang, Wei Zhang, Chunfen Xu:
Phishing Detection Research Based on PSO-BP Neural Network. EIDWT 2018: 990-998 - [c85]Cong Li, Xiaoyuan Yang, Yazhou Liu, Xu An Wang:
The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. ICCCS (3) 2018: 707-719 - [c84]Xu An Wang, Jindan Zhang, Guangming Wu, Chenghai Yu:
Improved Functional Encryption Schemes by Using Novel Techniques. INCoS 2018: 437-444 - [c83]Yudong Liu, Xu An Wang, Yunfei Cao, Dianhua Tang, Xiaoyuan Yang:
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage. INCoS 2018: 445-452 - [c82]Wenchao Liu, Feng Pan, Xu An Wang, Yunfei Cao, Dianhua Tang:
Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption. NBiS 2018: 752-762 - [e1]Leonard Barolli, Mingwu Zhang, Xu An Wang:
Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. Lecture Notes on Data Engineering and Communications Technologies 6, Springer 2018, ISBN 978-3-319-59462-0 [contents] - 2017
- [j43]Fushan Wei, Jianfeng Ma, Ruijie Zhang, Chuangui Ma, Xu An Wang:
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model. Sci. China Inf. Sci. 60(7): 72103 (2017) - [j42]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo:
Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Gener. Comput. Syst. 67: 242-254 (2017) - [j41]Taiming Zhu, Yuanbo Guo, Ankang Ju, Jun Ma, Xu An Wang:
An Insider Threat Detection Method Based on Business Process Mining. Int. J. Bus. Data Commun. Netw. 13(2): 83-98 (2017) - [j40]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Yunfei Cao, Dianhua Tang:
Reusable garbled gates for new fully homomorphic encryption service. Int. J. Web Grid Serv. 13(1): 25-48 (2017) - [j39]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang:
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. Int. J. Web Grid Serv. 13(3): 246-269 (2017) - [j38]Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu, Xu An Wang, Cunbo Lu:
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Netw. Appl. 10(4): 995-1007 (2017) - [c81]Xiurong Chen, Xu An Wang, Xuguang Wu:
Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development. 3PGCIC 2017: 191-198 - [c80]Xiurong Chen, Yixiang Tian, Xu An Wang, Xuguang Wu:
RBF Model Based on the KECDBN. 3PGCIC 2017: 199-205 - [c79]Ping Bai, Wei Zhang, Zhenlin Li, Xu An Wang:
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm. EIDWT 2017: 199-211 - [c78]Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xu An Wang:
Key Encapsulation Mechanism from Multilinear Maps. EIDWT 2017: 349-357 - [c77]Jindan Zhang, Baocang Wang, Xu An Wang:
Improved Online/Offline Attribute Based Encryption and More. EIDWT 2017: 603-610 - [c76]Xu An Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. EIDWT 2017: 611-617 - [c75]Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang:
Cyber-Attack Risks Analysis Based on Attack-Defense Trees. EIDWT 2017: 667-678 - 2016
- [j37]Xu An Wang, Fatos Xhafa, Weiyi Cai, Jianfeng Ma, Fushan Wei:
Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 56: 871-883 (2016) - [j36]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A public cloud storage auditing scheme for resource-constrained clients. Int. J. High Perform. Syst. Archit. 6(3): 121-130 (2016) - [j35]Fei Li, Dongqing Xie, Wei Gao, Jianhua Yan, Xu An Wang:
Round-optimal ID-based dynamic authenticated group key agreement. Int. J. High Perform. Syst. Archit. 6(3): 153-161 (2016) - [j34]Qingli Zhao, Jin Li, Juxin Chen, Xu An Wang:
Efficient expanded mixed finite element method for the quasilinear elliptic problems. Int. J. High Perform. Syst. Archit. 6(3): 162-170 (2016) - [j33]Yiqun Liu, Xiaorui Wang, Jianqi Zhang, Minqing Zhang, Peng Luo, Xu An Wang:
An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem. Int. J. Technol. Hum. Interact. 12(2): 1-21 (2016) - [j32]Kai Yang, Shuguang Liu, Xiuguang Li, Xu An Wang:
D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks. Int. J. Technol. Hum. Interact. 12(2): 48-59 (2016) - [j31]Yuechuan Wei, Yisheng Rong, Xu An Wang:
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack. Int. J. Technol. Hum. Interact. 12(2): 60-71 (2016) - [j30]Yingnan Zhang, Minqing Zhang, Xu An Wang, Ke Niu, Jia Liu:
A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC. Informatica (Slovenia) 40(1) (2016) - [j29]Minqing Zhang, Liqiang Wu, Xu An Wang, Xiaoyuan Yang:
Unidirectional IBPRE scheme from lattice for cloud computation. J. Ambient Intell. Humaniz. Comput. 7(5): 623-631 (2016) - [j28]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Fushan Wei, Zhiquan Liu, Xu An Wang:
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting. J. Medical Syst. 40(11): 246:1-246:12 (2016) - [c74]Xiao-hui Zeng, Man-sheng Long, Qing Liu, Xu An Wang, Wen-lang Luo:
Intelligent Management System for Small Gardens Based on Wireless Sensor Network. 3PGCIC 2016: 49-56 - [c73]Hongxia Li, Hongxi Di, Xu An Wang:
An AHP Based Study of Coal-Mine Zero Harm Safety Culture Evaluation. 3PGCIC 2016: 57-68 - [c72]Xu An Wang:
Toward Construction of Efficient Privacy Preserving Reusable Garbled Circuits. 3PGCIC 2016: 81-92 - [c71]Siyu Xiao, Aijun Ge, Jie Zhang, Chuangui Ma, Xu An Wang:
Asymmetric Searchable Encryption from Inner Product Encryption. 3PGCIC 2016: 123-132 - [c70]Zhipeng Hu, Jing Zhang, Xu An Wang:
Intrusion Detection for WSN Based on Kernel Fisher Discriminant and SVM. 3PGCIC 2016: 197-208 - [c69]Shengdong Mu, Yixiang Tian, Li Li, Xu An Wang:
Research on Decisive Mechanism of Internet Financial Interest Rate. 3PGCIC 2016: 269-280 - [c68]Xu An Wang, Fatos Xhafa, Guangming Wu, Wei Wang:
Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage. 3PGCIC 2016: 281-291 - [c67]Tingqin He, Lijun Cai, Ziyun Deng, Tao Meng, Xu An Wang:
Queuing-Oriented Job Optimizing Scheduling In Cloud Mapreduce. 3PGCIC 2016: 435-446 - [c66]Sheng-dong Mu, Yixiang Tian, Lili, Xu An Wang:
A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud Computing. 3PGCIC 2016: 801-812 - [c65]Yanjing Hu, Xu An Wang:
Hybrid Analysis for Mining Network Protocol's Hidden Behavior. CISIS 2016: 363-366 - [c64]Yuanyuan Zhang, Jinbo Xiong, Xuan Li, Biao Jin, Suping Li, Xu An Wang:
A Multi-replica Associated Deleting Scheme in Cloud. CISIS 2016: 444-448 - [c63]Fei Li, Dongqing Xie, Wei Gao, Xu An Wang, Jianhua Yan:
An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings. CISIS 2016: 468-472 - [c62]Xu An Wang, Fatos Xhafa, Zhiheng Zheng, Jinting Nie:
Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing. INCoS 2016: 44-48 - [c61]Lei Chen, Jing Zhang, Lijun Cai, Ziyun Deng, Tinqing He, Xu An Wang:
Locality-Aware and Energy-Aware Job Pre-Assignment for Mapreduce. INCoS 2016: 59-65 - [c60]Kun Wu, Jianshe Kang, Xu An Wang:
Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine. INCoS 2016: 94-98 - [c59]Yutao Wu, Xisheng Jia, Liang Wen, Xu An Wang:
An Optimization Research on the Alternate Interval for Electronic Products. INCoS 2016: 125-129 - [c58]Feng Ye, Shengyan Wu, Qian Huang, Xu An Wang:
The Research of Enhancing the Dependability of Cloud Services Using Self-Healing Mechanism. INCoS 2016: 130-134 - [c57]Yuechuan Wei, Yisheng Rong, Xu An Wang:
New Differential Fault Attack on Lightweight Cipher LBlock. INCoS 2016: 285-288 - [c56]Feng Ye, Shengyan Wu, Qian Huang, Xu An Wang:
A Novel QoS-Aware Load Balancing Mechanism in Cloud Environment. INCoS 2016: 298-301 - [c55]Xu An Wang, Fatos Xhafa, Wei Hao, Wei He:
Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage Sharing. INCoS 2016: 328-331 - [c54]Jialin Ma, Yongjun Zhang, Jinling Liu, Kun Yu, Xu An Wang:
Intelligent SMS Spam Filtering Using Topic Model. INCoS 2016: 380-383 - [c53]Jianghao Jin, Xie Zhou, Chuangui Ma, Xu An Wang:
A Rational Secret Sharing Relying on Reputation. INCoS 2016: 384-387 - [c52]Haiming Cheng, Ling Huang, He Xu, Yifan Hu, Xu An Wang:
Design and Implementation of Library Books Search and Management System Using RFID Technology. INCoS 2016: 392-397 - [c51]Jianshe Kang, Kun Wu, Kuo Chi, Xu An Wang:
A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector Machine. INCoS 2016: 402-406 - [c50]Kuo Chi, Jianshe Kang, Kun Wu, Xu An Wang:
Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo Search. INCoS 2016: 411-414 - [c49]Yang Lei, Xu An Wang, Hongyan Yin:
Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection. INCoS 2016: 498-503 - [c48]Tanping Zhou, Xiaoyuan Yang, Xu An Wang, Yiliang Han:
Some Practical Properties of AP14. INCoS 2016: 527-531 - 2015
- [j27]Haining Luo, Xu An Wang:
New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption. Int. J. Inf. Commun. Technol. 7(2/3): 235-246 (2015) - [j26]Qingyu Chen, Longsheng Wu, Li Li, Xuhan Ma, Xu An Wang:
Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart. Int. J. Inf. Technol. Web Eng. 10(3): 17-32 (2015) - [j25]Hua-Chun Yang, Xu An Wang:
A Study on Components and Features in Face Detection. Int. J. Inf. Technol. Web Eng. 10(3): 33-45 (2015) - [j24]Hui Tian, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
A High-Capacity Covering Code for Voice-Over-IP Steganography. Int. J. Inf. Technol. Web Eng. 10(3): 46-63 (2015) - [j23]Hu Chen, Yupu Hu, Zhizhu Lian, Huiwen Jia, Xu An Wang:
An Additively Homomorphic Encryption over Large Message Space. Int. J. Inf. Technol. Web Eng. 10(3): 82-102 (2015) - [j22]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
A new proxy re-encryption scheme for protecting critical information systems. J. Ambient Intell. Humaniz. Comput. 6(6): 699-711 (2015) - [j21]Fatos Xhafa, Xu An Wang:
Guest Editor's Foreword. J. Interconnect. Networks 15(3-4): 1502001:1-1502001:3 (2015) - [j20]Xianming Gao, Baosheng Wang, Xu An Wang, Xiaozhe Zhang:
FE-brick: Re-definition and Re-design of FE Model in Next-Generation Router Architecture. J. Interconnect. Networks 15(3-4): 1540001:1-1540001:16 (2015) - [j19]Fenghe Wang, Xu An Wang, Chunxiao Wang:
Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks. J. Interconnect. Networks 15(3-4): 1540005:1-1540005:14 (2015) - [j18]Dakun Zhang, Guozhi Song, Kunliang Liu, Yong Ma, Chenglong Zhao, Xu An Wang:
Comprehensive Improved Simulated Annealing Optimization for Floorplanning of Heterogeneous 3D Networks-on-Chip. J. Interconnect. Networks 15(3-4): 1540006:1-1540006:19 (2015) - [j17]Minqing Zhang, Xu An Wang, Xiaoyuan Yang, Weihua Li:
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication. Mob. Inf. Syst. 2015: 430797:1-430797:10 (2015) - [j16]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei:
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks. Trans. Comput. Collect. Intell. 19: 69-88 (2015) - [j15]Xu An Wang, Jianfeng Ma, Yinbin Miao, Kai Zhang:
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles. Trans. Comput. Collect. Intell. 19: 126-139 (2015) - [c47]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 3PGCIC 2015: 36-39 - [c46]Kunliang Liu, Dakun Zhang, Xu An Wang, Guozhi Song, Shuxia Ren:
Research and Implementation on Visual Analysis of Geological Volume. 3PGCIC 2015: 146-150 - [c45]Guozhi Song, Shuxia Ren, Dakun Zhang, Kunliang Liu, Yumeng Sun, Xu An Wang:
Research on War Strategy Games on Mobile Phone Based on Cocos2d-JS. 3PGCIC 2015: 151-155 - [c44]Qingyu Chen, Longsheng Wu, Li Li, Xuhan Ma, Xu An Wang:
Enhanced Reliability Scheduling Method for the Data in Register File. 3PGCIC 2015: 188-193 - [c43]Xianming Gao, Baosheng Wang, Xiaozhe Zhang, Xu An Wang:
Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture. 3PGCIC 2015: 194-199 - [c42]Qingli Zhao, Jin Li, Juxin Chen, Xu An Wang:
Efficient Numerical Simulation for the Quasilinear Elliptic Problems. 3PGCIC 2015: 231-235 - [c41]Shuanggen Liu, Guanglu Qi, Xu An Wang:
Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series. 3PGCIC 2015: 398-402 - [c40]Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:
Analyze Network Protocol's Hidden Behavior. 3PGCIC 2015: 403-406 - [c39]Xu An Wang, Jianfeng Ma, Fatos Xhafa:
Another Look at Ciphertext Updating Algorithms for Cloud Storage. 3PGCIC 2015: 424-429 - [c38]Xu An Wang, Jianfeng Ma, Fatos Xhafa:
Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency. 3PGCIC 2015: 444-448 - [c37]Jie Qin, Hui Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang:
An Efficient VoIP Steganography Based on Random Binary Matrix. 3PGCIC 2015: 462-465 - [c36]Hua-Chun Yang, Xu An Wang:
Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector Machine. 3PGCIC 2015: 766-770 - [c35]Huiwen Jia, Yupu Hu, Xu An Wang, Zheliang Liu, Wei Xiong:
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps. 3PGCIC 2015: 771-774 - [c34]Shuanggen Liu, Huatong Yao, Xu An Wang:
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem. 3PGCIC 2015: 785-790 - [c33]Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:
Instruction Clustering Analysis for Network Protocol's Abnormal Behavior. 3PGCIC 2015: 791-794 - [c32]Zhiping Peng, Bo Xu, Delong Cui, Weiwei Lin, Xu An Wang:
Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts Theory. 3PGCIC 2015: 800-803 - [c31]Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang:
Research on Identification and Addressing of the Internet of Things. 3PGCIC 2015: 810-814 - [c30]Jiuru Wang, Haifeng Wang, Xu An Wang, Yunpeng Cao:
An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter. 3PGCIC 2015: 815-820 - [c29]Jihua Yang, Longjun Zhang, Xu An Wang:
On Cloud Computing Middleware Architecture. 3PGCIC 2015: 832-835 - [c28]Fanyu Kong, Jie Wang, Jia Yu, Xu An Wang:
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase. 3PGCIC 2015: 840-843 - [c27]Xu An Wang:
Proxy Re-signature Supporting Conditional Delegation. 3PGCIC 2015: 844-848 - [c26]Fenghe Wang, Xu An Wang, Chunxiao Wang:
Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme. 3PGCIC 2015: 853-858 - [c25]Xiangsong Zhang, Zhenhua Liu, Xu An Wang:
Ring Signature Scheme from Multilinear Maps in the Standard Model. 3PGCIC 2015: 859-864 - [c24]Jindan Zhang, Xu An Wang, Jianfeng Ma:
Data Owner Based Attribute Based Encryption. INCoS 2015: 144-148 - [c23]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
New Compact CCA Secure Elgamal Scheme in the Random Oracle Model. INCoS 2015: 379-383 - 2013
- [j14]Jindan Zhang, Xu An Wang, Yi Ding, Xiaoyuan Yang:
On the security of two multi-use CCA-secure proxy re-encryption schemes. Int. J. Intell. Inf. Database Syst. 7(5): 422-440 (2013) - [j13]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG. J. Comput. 8(5): 1230-1239 (2013) - [j12]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Identity Based Proxy Re-encryption From BB1 IBE. J. Comput. 8(6): 1618-1626 (2013) - [j11]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Hybrid Proxy Re-encryption Between IBE And CBE. J. Comput. 8(7): 1873-1881 (2013) - [j10]Minqing Zhang, Xu An Wang, Weihua Li, Xiaoyuan Yang:
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications. J. Comput. 8(8): 1987-1994 (2013) - [j9]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes. J. Comput. 8(9): 2304-2312 (2013) - [j8]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
DDos Attack against Proxy in PRE and PRS. J. Softw. 8(3): 617-626 (2013) - [c22]Jindan Zhang, Xu An Wang:
Yet Another Way to Construct Digital Signature in the Standard Model. INCoS 2013: 430-433 - [c21]Jindan Zhang, Xu An Wang:
New Construction of PVPKE Scheme Based on Signed Quadratic Residues. INCoS 2013: 434-437 - [c20]Minqing Zhang, Xu An Wang, Xiaoyuan Yang, Weiyi Cai:
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. INCoS 2013: 438-442 - [c19]Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang:
Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures. INCoS 2013: 521-527 - [c18]Xu An Wang, Jinting Nie, Yi Ding, Junru Hu:
Toward Construction of PVPKE in the Standard Model Based on Factoring Assumption. INCoS 2013: 677-680 - 2012
- [j7]Xu An Wang, Xiaoyuan Yang, Minqing Zhang, Yong Yu:
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model. Informatica 23(2): 299-314 (2012) - [j6]Xu An Wang, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3): 643-654 (2012) - [c17]Xu An Wang, Liqiang Wu, Jinting Nie, Wei Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. CIS 2012: 469-472 - [c16]Xu An Wang, Jinting Nie, Wei Wang:
Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes. CIS 2012: 507-510 - [c15]Jindan Zhang, Xu An Wang:
On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme. INCoS 2012: 571-576 - [c14]Jindan Zhang, Xu An Wang:
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme. INCoS 2012: 581-586 - [i8]Xu An Wang, Xiaoyuan Yang:
New Identity Based Encryption And Its Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2012: 250 (2012) - 2011
- [j5]Xu An Wang, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model. Fundam. Informaticae 109(2): 189-200 (2011) - [j4]Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang:
Cryptanalysis of an identity based broadcast encryption scheme without random oracles. Inf. Process. Lett. 111(10): 461-464 (2011) - [j3]Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. J. Syst. Softw. 84(2): 219-225 (2011) - [c13]Huixian Li, Ping Yin, Xuan Wang, Liaojun Pang:
A Novel Hash-based RFID Mutual Authentication Protocol. CIS 2011: 774-778 - [c12]Xu An Wang, Ziqing Wang, Yi Ding, Shujun Bai:
K-times Proxy Re-encryption. CIS 2011: 949-953 - [c11]Weidong Zhong, Xu An Wang, Ziqing Wang, Yi Ding:
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. CIS 2011: 969-973 - [i7]Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. IACR Cryptol. ePrint Arch. 2011: 224 (2011) - 2010
- [j2]Xu An Wang, Xiaoyuan Yang:
On the Insecurity of an Identity Based Proxy Re-encryption Scheme. Fundam. Informaticae 98(2-3): 277-281 (2010) - [j1]Xu An Wang, Xiaoyuan Yang, Jindan Zhang:
Provable Secure Generalized Signcryption. J. Comput. 5(5): 807-814 (2010) - [c10]Ping Wei, Xu An Wang, Xiaoyuan Yang:
Proxy Re-encryption from CLE to CBE. CIS 2010: 339-342 - [c9]Xu An Wang, Ping Wei, Minqing Zhang:
New CCA-Secure Proxy Re-encryption Scheme without Random Oracles. CIS 2010: 377-381 - [c8]Ping Wei, Xu An Wang, Xiaoyuan Yang:
Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys. DBTA 2010: 1-4 - [i6]Xu An Wang, Xiaoyuan Yang:
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model. IACR Cryptol. ePrint Arch. 2010: 113 (2010)
2000 – 2009
- 2009
- [c7]Xu An Wang, Xiaoyuan Yang:
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature. CIT (2) 2009: 213-218 - [c6]Xu An Wang, Xiaoyuan Yang, Qingquan Peng:
On Security Notions for Verifiably Encrypted Signature. IAS 2009: 37-40 - [c5]Xu An Wang, Xiaoyuan Yang:
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. IAS 2009: 657-660 - [c4]Ke Niu, Xu An Wang, Minqing Zhang:
How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE. DBTA 2009: 95-98 - [c3]Xu An Wang, Xiaoyuan Yang, Minqing Zhang:
Proxy Re-encryption Scheme from IBE to CBE. DBTA 2009: 99-102 - 2008
- [c2]Xu An Wang, Xinyi Huang, Xiaoyuan Yang:
Further Observations on Certificateless Public Key Encryption. Inscrypt 2008: 217-239 - [i5]Xu An Wang, Xiaoyuan Yang, Yiliang Han:
On Security Notions for Verifiable Encrypted Signature. IACR Cryptol. ePrint Arch. 2008: 98 (2008) - [i4]Yiliang Han, Xiaolin Gui, Xu An Wang:
Multi-Recipient Signcryption for Secure Wireless Group Communication. IACR Cryptol. ePrint Arch. 2008: 253 (2008) - [i3]Xu An Wang, Xiaoyuan Yang, Fagen Li:
On the Role of PKG for Proxy Re-encryption in Identity Based Setting. IACR Cryptol. ePrint Arch. 2008: 410 (2008) - [i2]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008) - 2007
- [i1]Xu An Wang, Xiaoyuan Yang, Yiliang Han:
Provable Secure Generalized Signcryption. IACR Cryptol. ePrint Arch. 2007: 173 (2007) - 2004
- [c1]Xiaoyuan Yang, Xu An Wang, Wei Zhang:
New multi-signature and proxy multi-signature schemes from the Weil pairings. InfoSecu 2004: 240-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint