关注
qianhong wu
qianhong wu
beihang university
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
A scalable robust authentication protocol for secure vehicular communications
L Zhang, Q Wu, A Solanas, J Domingo-Ferrer
IEEE Transactions on vehicular Technology 59 (4), 1606-1617, 2009
3882009
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
P Xu, H Jin, Q Wu, W Wang
IEEE Transactions on computers 62 (11), 2266-2277, 2012
3312012
Distributed aggregate privacy-preserving authentication in VANETs
L Zhang, Q Wu, J Domingo-Ferrer, B Qin, C Hu
IEEE Transactions on Intelligent Transportation Systems 18 (3), 516-526, 2016
2942016
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
Q Wu, J Domingo-Ferrer, U Gonzalez-Nicolas
IEEE Transactions on Vehicular Technology 59 (2), 559-573, 2009
2942009
Asymmetric group key agreement
Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
2532009
Identity‐based remote data possession checking in public clouds
H Wang, Q Wu, B Qin, J Domingo‐Ferrer
IET Information Security 8 (2), 114-121, 2014
1772014
Efficient many-to-one authentication with certificateless aggregate signatures
L Zhang, B Qin, Q Wu, F Zhang
Computer Networks 54 (14), 2482-2491, 2010
1682010
Conditional identity-based broadcast proxy re-encryption and its application to cloud email
P Xu, T Jiao, Q Wu, W Wang, H Jin
IEEE Transactions on Computers 65 (1), 66-79, 2015
1642015
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
H Deng, Q Wu, B Qin, J Domingo-Ferrer, L Zhang, J Liu, W Shi
Information Sciences 275, 370-384, 2014
1622014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
1582007
Bitcoin-based fair payments for outsourcing computations of fog devices
H Huang, X Chen, Q Wu, X Huang, J Shen
Future Generation Computer Systems 78, 850-858, 2018
1372018
Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response
L Zhang, C Hu, Q Wu, J Domingo-Ferrer, B Qin
IEEE Transactions on Computers 65 (8), 2562-2574, 2015
1372015
Identity-based data outsourcing with comprehensive auditing in clouds
Y Wang, Q Wu, B Qin, W Shi, RH Deng, J Hu
IEEE transactions on information forensics and security 12 (4), 940-952, 2016
1282016
Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs
Y Wang, Y Ding, Q Wu, Y Wei, B Qin, H Wang
IEEE Transactions on Information Forensics and Security 14 (7), 1779-1790, 2018
1252018
Securely outsourcing exponentiations with single untrusted program for cloud storage
Y Wang, Q Wu, DS Wong, B Qin, SSM Chow, Z Liu, X Tan
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
1252014
Secure and efficient cloud data deduplication with randomized tag
T Jiang, X Chen, Q Wu, J Ma, W Susilo, W Lou
IEEE transactions on information forensics and security 12 (3), 532-543, 2016
1232016
Simulatable certificateless two-party authenticated key agreement protocol
L Zhang, F Zhang, Q Wu, J Domingo-Ferrer
Information Sciences 180 (6), 1020-1030, 2010
1082010
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments
K He, J Chen, R Du, Q Wu, G Xue, X Zhang
IEEE Transactions on Computers 65 (12), 3631-3645, 2016
1022016
User-private information retrieval based on a peer-to-peer community
J Domingo-Ferrer, M Bras-Amorós, Q Wu, J Manjón
Data & Knowledge Engineering 68 (11), 1237-1252, 2009
1002009
Identity-based encryption transformation for flexible sharing of encrypted data in public cloud
H Deng, Z Qin, Q Wu, Z Guan, RH Deng, Y Wang, Y Zhou
IEEE Transactions on Information Forensics and Security 15, 3168-3180, 2020
912020
系统目前无法执行此操作,请稍后再试。
文章 1–20