
Qianhong Wu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j87]Haibin Zheng, Qianhong Wu, Jan Xie
, Zhenyu Guan, Bo Qin, Zhiqiang Gu:
An organization-friendly blockchain system. Comput. Secur. 88 (2020) - [j86]Ya-Nan Li
, Xiaotao Feng, Jan Xie, Hanwen Feng, Zhenyu Guan, Qianhong Wu:
A decentralized and secure blockchain platform for open fair data trading. Concurr. Comput. Pract. Exp. 32(7) (2020) - [j85]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [j84]Hua Deng
, Zheng Qin, Qianhong Wu
, Zhenyu Guan, Yunya Zhou:
Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511: 94-113 (2020) - [j83]Yujue Wang, HweeHwa Pang
, Robert H. Deng
, Yong Ding, Qianhong Wu, Bo Qin, Kefeng Fan:
Secure server-aided data sharing clique with attestation. Inf. Sci. 522: 80-98 (2020) - [j82]Xingguang Zhou, Jianwei Liu, Zongyang Zhang
, Qianhong Wu:
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System. Secur. Commun. Networks 2020: 8347213:1-8347213:20 (2020) - [j81]Hua Deng
, Zheng Qin
, Qianhong Wu, Zhenyu Guan
, Robert H. Deng
, Yujue Wang
, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3168-3180 (2020) - [c93]Tongchen Wang, Jianwei Liu, Dawei Li, Qianhong Wu:
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models. ACISP 2020: 285-305 - [c92]Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu:
Exploring the Security of Certificate Transparency in the Wild. ACNS Workshops 2020: 453-470 - [c91]Hanwen Feng
, Jianwei Liu, Qianhong Wu, Ya-Nan Li:
Traceable Ring Signatures with Post-quantum Security. CT-RSA 2020: 442-468 - [c90]Yizhong Liu, Jianwei Liu, Jiayuan Yin, Geng Li, Hui Yu, Qianhong Wu:
Cross-shard Transaction Processing in Sharding Blockchains. ICA3PP (3) 2020: 324-339 - [c89]Yizhong Liu, Jianwei Liu, Dawei Li, Hui Yu, Qianhong Wu:
FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding. ICA3PP (3) 2020: 409-425 - [c88]Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:
Experimental Comparisons of Verifiable Delay Functions. ICICS 2020: 510-527
2010 – 2019
- 2019
- [j80]Ali Metiaf
, Qianhong Wu, Yazan Aljeroudi:
Searching With Direction Awareness: Multi-Objective Genetic Algorithm Based on Angle Quantization and Crowding Distance MOGA-AQCD. IEEE Access 7: 10196-10207 (2019) - [j79]Dawei Li
, Jianwei Liu, Qianhong Wu, Zhenyu Guan:
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing. IEEE Access 7: 11688-11697 (2019) - [j78]Haibin Zheng, Qianhong Wu, Zhenyu Guan, Bo Qin, Shuangyu He, Jianwei Liu:
Achieving liability in anonymous communication: Auditing and tracing. Comput. Commun. 145: 1-13 (2019) - [j77]Lin Zhong, Qianhong Wu, Jan Xie
, Zhenyu Guan, Bo Qin:
A secure large-scale instant payment system based on blockchain. Comput. Secur. 84: 349-364 (2019) - [j76]Ziyu Wang, Jianwei Liu, Qianhong Wu, Yanting Zhang, Hui Yu, Ziyu Zhou:
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network. Comput. Secur. 87 (2019) - [j75]Lin Zhong, Qianhong Wu, Jan Xie
, Jin Li, Bo Qin:
A secure versatile light payment system based on blockchain. Future Gener. Comput. Syst. 93: 327-337 (2019) - [j74]Yujue Wang, HweeHwa Pang
, Robert H. Deng
, Yong Ding, Qianhong Wu, Bo Qin:
Securing messaging services through efficient signcryption with designated equality test. Inf. Sci. 490: 146-165 (2019) - [j73]Waqas Haider, Jiankun Hu
, Yi Xie, Xinghuo Yu
, Qianhong Wu
:
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization. IEEE Trans. Big Data 5(3): 305-316 (2019) - [j72]Yujue Wang, Yong Ding
, Qianhong Wu
, Yongzhuang Wei, Bo Qin
, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. IEEE Trans. Inf. Forensics Secur. 14(7): 1779-1790 (2019) - [j71]Han Zhang
, Haijun Geng
, Yahui Li
, Xia Yin, Xingang Shi
, Zhiliang Wang
, Qianhong Wu
, Jianwei Liu:
DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs. IEEE/ACM Trans. Netw. 27(6): 2458-2471 (2019) - [j70]Zhiliang Wang
, Han Zhang
, Xingang Shi
, Xia Yin, Yahui Li
, Haijun Geng, Qianhong Wu
, Jianwei Liu:
Efficient Scheduling of Weighted Coflows in Data Centers. IEEE Trans. Parallel Distributed Syst. 30(9): 2003-2017 (2019) - [c87]Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu:
A Flexible Instant Payment System Based on Blockchain. ACISP 2019: 289-306 - [c86]Hanwen Feng
, Jianwei Liu, Qianhong Wu, Tongge Xu:
Two-Layer Group Signature and Application to E-Cash. DASC/PiCom/DataCom/CyberSciTech 2019: 193-200 - [c85]Hanwen Feng
, Jianwei Liu, Qianhong Wu, Tongge Xu:
Traceable Decentralized Anonymous E-Cash System Against Active Attackers. DASC/PiCom/DataCom/CyberSciTech 2019: 344-349 - [c84]Hanwen Feng
, Jianwei Liu, Qianhong Wu:
Secure Stern Signatures in Quantum Random Oracle Model. ISC 2019: 425-444 - [c83]Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. NSS 2019: 255-271 - [c82]Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. NSS 2019: 596-614 - [c81]Zhipeng Wang, Qianhong Wu:
A Practical Lattice-Based Sequential Aggregate Signature. ProvSec 2019: 94-109 - [c80]Dawei Li, Jianwei Liu, Zongxun Tang, Qianhong Wu, Zhenyu Guan:
AgentChain: A Decentralized Cross-Chain Exchange System. TrustCom/BigDataSE 2019: 491-498 - [i12]Mingming Wang, Qianhong Wu:
Lever: Breaking the Shackles of Scalable On-chain Validation. IACR Cryptol. ePrint Arch. 2019: 1172 (2019) - 2018
- [j69]Shuangyu He
, Qianhong Wu, Xizhao Luo, Zhi Liang, Dawei Li, Hanwen Feng
, Haibin Zheng, Yanan Li:
A Social-Network-Based Cryptocurrency Wallet-Management Scheme. IEEE Access 6: 7654-7663 (2018) - [j68]Xingguang Zhou
, Jianwei Liu, Qianhong Wu, Zongyang Zhang:
Privacy Preservation for Outsourced Medical Data With Flexible Access Control. IEEE Access 6: 14827-14841 (2018) - [j67]Hui Huang
, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78: 850-858 (2018) - [j66]Hua Deng
, Yunya Zhou, Qianhong Wu, Bo Qin, Jianwei Liu:
Secure pay-TV for chained hotels. Int. J. Inf. Sec. 17(1): 33-42 (2018) - [j65]Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang
, Jianwei Liu, Zhenyu Guan:
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin. J. Comput. Sci. Technol. 33(3): 568-586 (2018) - [j64]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Jungang Lou:
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures. Peer Peer Netw. Appl. 11(2): 235-251 (2018) - [j63]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Efficient subtree-based encryption for fuzzy-entity data sharing. Soft Comput. 22(23): 7961-7976 (2018) - [j62]Wencheng Yang
, Jiankun Hu
, Song Wang, Qianhong Wu:
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection. Wirel. Commun. Mob. Comput. 2018: 7107295:1-7107295:17 (2018) - [c79]Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu:
Linkable Group Signature for Auditing Anonymous Communication. ACISP 2018: 304-321 - [c78]Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu:
Auditable Hierarchy-Private Public-Key Encryption. ACISP 2018: 322-340 - 2017
- [j61]Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu:
Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds. Comput. J. 60(12): 1871-1888 (2017) - [j60]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu:
Confidentiality-Preserving Publicly Verifiable Computation. Int. J. Found. Comput. Sci. 28(6): 799-818 (2017) - [j59]Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi:
Certificateless and identity-based authenticated asymmetric group key agreement. Int. J. Inf. Sec. 16(5): 559-576 (2017) - [j58]Haohao Nie, Yan-Ping Li, Qianhong Wu:
A Privacy-Preserving V2I Authentication Scheme Without Certificates. J. Inf. Sci. Eng. 33(4): 1025-1040 (2017) - [j57]Xiling Luo, Yili Ren, Jiankun Hu, Qianhong Wu, Jungang Lou:
Privacy-preserving identity-based file sharing in smart city. Pers. Ubiquitous Comput. 21(5): 923-936 (2017) - [j56]Jian Mao
, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, Jianwei Liu:
A position-aware Merkle tree for dynamic cloud data integrity verification. Soft Comput. 21(8): 2151-2164 (2017) - [j55]Qianhong Wu, Xiuwen Zhou, Bo Qin, Jiankun Hu, Jianwei Liu, Yong Ding:
Secure joint Bitcoin trading with partially blind fuzzy signatures. Soft Comput. 21(11): 3123-3134 (2017) - [j54]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo
, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - [j53]Yujue Wang, Qianhong Wu, Bo Qin
, Wenchang Shi, Robert H. Deng
, Jiankun Hu
:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. IEEE Trans. Inf. Forensics Secur. 12(4): 940-952 (2017) - [j52]Yujue Wang, Qianhong Wu, Bo Qin
, Shaohua Tang, Willy Susilo
:
Online/Offline Provable Data Possession. IEEE Trans. Inf. Forensics Secur. 12(5): 1182-1194 (2017) - [j51]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Chuanyan Hu:
Distributed Aggregate Privacy-Preserving Authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3): 516-526 (2017) - [c77]Peng Xu, Shuai Liang, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. ACISP (1) 2017: 207-226 - [c76]Hanwen Feng
, Jianwei Liu, Qianhong Wu, Weiran Liu:
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext. Inscrypt 2017: 278-298 - [c75]Dawei Li, Jie Chen, Jianwei Liu, Qianhong Wu, Weiran Liu:
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption. CSS 2017: 103-118 - [c74]Xingguang Zhou, Jie Chen, Zongyang Zhang, Jianwei Liu, Qianhong Wu:
Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage. CSS 2017: 411-426 - [c73]Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li:
TTP-free Fair Exchange of Digital Signatures with Bitcoin. ISPEC 2017: 62-81 - [c72]Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu:
EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System. ISPEC 2017: 435-453 - [c71]Ya-Nan Li
, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang
, Meixia Miao:
Outsourcing Encrypted Excel Files. ISPEC 2017: 506-524 - [c70]Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Ya-Nan Li:
Secure Communications in Unmanned Aerial Vehicle Network. ISPEC 2017: 601-620 - [c69]Zhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao:
Provably Secure Self-Extractable Encryption. ProvSec 2017: 3-23 - [c68]Zhen Wang, Xiling Luo, Qianhong Wu:
Verifiably Encrypted Group Signatures. ProvSec 2017: 107-126 - [i11]Xiaofei Wang, Qianhong Wu, Yuqing Zhang:
T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework. CoRR abs/1708.08191 (2017) - [i10]Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. IACR Cryptol. ePrint Arch. 2017: 741 (2017) - 2016
- [j50]Shuangyu He, Qianhong Wu, Bo Qin, Jianwei Liu, Yan Li:
Efficient group key management for secure big data in predictable large-scale networks. Concurr. Comput. Pract. Exp. 28(4): 1174-1192 (2016) - [j49]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurr. Comput. Pract. Exp. 28(10): 2920-2939 (2016) - [j48]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. Future Gener. Comput. Syst. 62: 29-39 (2016) - [j47]Yunya Zhou, Hua Deng, Qianhong Wu, Bo Qin, Jianwei Liu, Yong Ding:
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud. Future Gener. Comput. Syst. 62: 128-139 (2016) - [j46]Qianhong Wu, Yang Sun, Bo Qin, Jiankun Hu, Weiran Liu, Jianwei Liu, Yong Ding:
Batch Public Key Cryptosystem with batch multi-exponentiation. Future Gener. Comput. Syst. 62: 196-204 (2016) - [j45]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yan Li:
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption. Int. J. Inf. Sec. 15(1): 35-50 (2016) - [j44]Jianwei Liu, Weiran Liu, Qianhong Wu, Dawei Li, Shigang Chen:
Survey on key security technologies for space information networks. J. Commun. Inf. Networks 1(1): 72-85 (2016) - [j43]Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng, Bo Qin:
SAKE: scalable authenticated key exchange for mobile e-health networks. Secur. Commun. Networks 9(15): 2754-2765 (2016) - [j42]Haibin Zheng, Jing Qin
, Jiankun Hu, Qianhong Wu:
Threshold attribute-based signcryption and its application to authenticated key agreement. Secur. Commun. Networks 9(18): 4914-4923 (2016) - [j41]Yi Liu, Jie Ling
, Qianhong Wu, Bo Qin:
Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks. Soft Comput. 20(8): 3335-3346 (2016) - [j40]Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, Hai Jin:
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans. Computers 65(1): 66-79 (2016) - [j39]Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
, Jesús A. Manjón:
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts. IEEE Trans. Computers 65(2): 466-479 (2016) - [j38]Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin:
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response. IEEE Trans. Computers 65(8): 2562-2574 (2016) - [j37]Kun He, Jing Chen
, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang:
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Trans. Computers 65(12): 3631-3645 (2016) - [c67]Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. ACISP (2) 2016: 87-102 - [c66]Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu:
Accelerating Oblivious Transfer with Batch Multi-exponentiation. ACISP (1) 2016: 310-326 - [c65]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - [c64]Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu:
Anonymous Role-Based Access Control on E-Health Records. AsiaCCS 2016: 559-570 - [c63]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang
:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605 - [c62]Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang:
Towards Certificate-Based Group Encryption. ProvSec 2016: 296-305 - [c61]Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu:
Vulnerability analysis of iPhone 6. PST 2016: 457-463 - [c60]Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu:
Distributed Bitcoin Account Management. Trustcom/BigDataSE/ISPA 2016: 105-112 - [i9]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing. IACR Cryptol. ePrint Arch. 2016: 634 (2016) - 2015
- [j36]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu:
Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7): 1-13 (2015) - [j35]Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Bao Liu:
Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 71: 50-60 (2015) - [j34]Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou:
Flexible attribute-based encryption applicable to secure e-healthcare records. Int. J. Inf. Sec. 14(6): 499-511 (2015) - [j33]Chen Yang, Yang Sun, Qianhong Wu:
Batch Attribute-Based Encryption for Secure Clouds. Inf. 6(4): 704-718 (2015) - [j32]Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. Secur. Commun. Networks 8(8): 1485-1493 (2015) - [j31]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow
, Bo Qin, Jianwei Liu, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j30]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search. IEEE Trans. Inf. Forensics Secur. 10(9): 1993-2006 (2015) - [j29]Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer:
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids. IEEE Trans. Inf. Forensics Secur. 10(11): 2340-2351 (2015) - [j28]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Zheming Dong:
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications. IEEE Trans. Inf. Forensics Secur. 10(11): 2352-2364 (2015) - [c59]Chen Yang, Bo Qin, Xiuwen Zhou, Yang Sun, Shuangyu He, Qianhong Wu:
Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks. AINA Workshops 2015: 22-24 - [c58]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou:
Group-oriented Proofs of Storage. AsiaCCS 2015: 73-84 - [c57]Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu
, Wenchang Shi:
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. AsiaCCS 2015: 393-404 - [c56]Haibin Zheng, Jing Qin
, Jiankun Hu, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. CSCloud 2015: 187-193 - [c55]Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu, Jun Zhang, Yan Li:
Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs. HPCC/CSS/ICESS 2015: 336-341 - [c54]Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu:
Batch Blind Signatures on Elliptic Curves. ISPEC 2015: 192-206 - [c53]Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia
:
Flexible and Robust Privacy-Preserving Implicit Authentication. SEC 2015: 18-34 - [i8]Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia:
Flexible and Robust Privacy-Preserving Implicit Authentication. CoRR abs/1503.00454 (2015) - [i7]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Chuanyan Hu:
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures). CoRR abs/1506.08548 (2015) - [i6]Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin:
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response. CoRR abs/1508.01575 (2015) - [i5]Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou:
Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare Records. CoRR abs/1512.06578 (2015) - [i4]Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin:
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search. CoRR abs/1512.06581 (2015) - 2014
- [j27]Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2): 114-121 (2014) - [j26]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Peng Zeng:
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security. Inf. Sci. 272: 223-237 (2014) - [j25]Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Lei Zhang, Jianwei Liu, Wenchang Shi:
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf. Sci. 275: 370-384 (2014) - [j24]Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks. J. Biomed. Informatics 50: 226-233 (2014) - [c52]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin:
Hierarchical Identity-Based Broadcast Encryption. ACISP 2014: 242-257 - [c51]Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow
, Josep Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. AsiaCCS 2014: 425-434 - [c50]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow
, Bo Qin, Jianwei Liu:
Practical Distributed Signatures in the Standard Model. CT-RSA 2014: 307-326 - [c49]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yunya Zhou:
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS (2) 2014: 91-108 - [c48]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow
, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [c47]