default search action
Wei Wu 0001
Person information
- affiliation: Fujian Normal University, School of Mathematics and Computer Science, Fuzhou, China
- affiliation (former): University of Wollongong, School of Computer Science and Software Engineering, Australia
Other persons with the same name
- Wei Wu — disambiguation page
- Wei Wu 0002 — Sichuan University, College of Electronics and Information Engineering, Chengdu, China
- Wei Wu 0003 — Chinese Academy of Sciences, Institute of Automation, Beijing, China (and 3 more)
- Wei Wu 0004 — University of Texas at San Antonio, TX, USA
- Wei Wu 0005 — Nanjing University of Posts and Telecommunications, College of Telecommunications and Information Engineering, Nanjing, China (and 1 more)
- Wei Wu 0006 — Florida State University, Department of Statistics, Tallahassee, FL, USA
- Wei Wu 0007 — Hainan University, College of Information Science and Technology, Haikou, China (and 1 more)
- Wei Wu 0008 — Beihang University, State Key Lab of Virtual Reality Technology and Systems, Beijing, China (and 1 more)
- Wei Wu 0009 — Changsha University of Science and Technology, School of Traffic and Transportation Engineering, China
- Wei Wu 0010 — Dalian University of Technology, School of Mathematical Sciences, China (and 1 more)
- Wei Wu 0011 — Central South University, School of Computer Science and Engineering, Changsha, China (and 2 more)
- Wei Wu 0012 — Beijing Institute of Technology, School of Mechanical Engineering, National Key Laboratory of Vehicular Transmission, China
- Wei Wu 0013 — Naval University of Engineering, College of Weaponry Engineering, Wuhan, China (and 1 more)
- Wei Wu 0014 — Meituan Inc, Beijing, China (and 2 more)
- Wei Wu 0015 — National University of Defense Technology, School of Electronic Science, Changsha, China
- Wei Wu 0016 — Los Alamos National Laboratory, NM, USA (and 2 more)
- Wei Wu 0017 — Seikei University, Tokyo, Japan (and 1 more)
- Wei Wu 0018 — Jilin University, School of Communication Engineering, Changchun, China (and 1 more)
- Wei Wu 0019 — Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- Wei Wu 0020 — Visa Inc, Singapore (and 2 more)
- Wei Wu 0021 — SenseTime Group Ltd, Urban Computing Group, China
- Wei Wu 0022 — South China University of Technology, College of Automation Science and Engineering, Guangzhou, China (and 2 more)
- Wei Wu 0023 — Carnegie Mellon University, School of Computer Science, Computational Biology Department, Pittsburgh, PA, USA (and 2 more)
- Wei Wu 0024 — Intel Research Laboratory, Hillsboro, OR, USA (and 1 more)
- Wei Wu 0025 — National Cancer Institute, Rockville, MD, USA (and 1 more)
- Wei Wu 0026 — Tongji University, CMIS Research Center, Shanghai, China
- Wei Wu 0027 — 54th Research Institute of China Electronics Technology Group Corporation, China (and 1 more)
- Wei Wu 0028 — University of California San Diego, Center for Memory and Recording Research, La Jolla, CA, USA
- Wei Wu 0029 — Zhejiang University of Technology, College of Computer Science and Technology, Hangzhou, China (and 1 more)
- Wei Wu 0030 — Xiamen University, Department of Chemistry, China
- Wei Wu 0031 — Liaoning University of Technology, College of Science, China
- Wei Wu 0032 — Inner Mongolia University, School of Computer Science, Huhhot, China
- Wei Wu 0033 — Beijing University of Posts and Telecommunications, Beijing Laboratory of Advanced Information Network / Beijing Key Laboratory of Network System Architecture and Convergence, China
- Wei Wu 0034 — Qingdao Agricultural University, College of Food Science and Engineering, China
- Wei Wu 0036 — Nanjing University of Posts and Telecommunications, College of Telecommunication and Information Engineering, MOE Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, China
- Wei Wu 0037 — Chinese Academy of Sciences, Changchun Institute of Applied Chemistry, State Key Laboratory of Electroanalytical Chemistry, China
- Wei Wu 0038 — Southeast University, School of Instrument Science and Engineering, Nanjing, China
- Wei Wu 0039 — Lanzhou Jiaotong University, School of Electronic and Information Engineering, China
- Wei Wu 0041 — University of Hong Kong, Department of Industrial and Manufacturing Systems Engineering, Hong Kong
- Wei Wu 0042 — Peking University, Key Laboratory of High Confidence Software Technologies of Ministry of Education, Beijing, China (and 1 more)
- Wei Wu 0043 — University of Technology, Austin, USA
- Wei Wu 0044 — ShannonAI (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. Comput. J. 67(3): 1060-1075 (2024) - [j61]Xiuyuan Chen, Chao Lin, Wei Wu, Debiao He:
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability. Comput. J. 67(6): 2219-2229 (2024) - [j60]Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu, Xuewei Wang:
Inner product encryption from Middle-Product Learning With Errors. Comput. Stand. Interfaces 87: 103755 (2024) - [j59]Mengqi Feng, Chao Lin, Wei Wu, Debiao He:
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size. Comput. Stand. Interfaces 87: 103763 (2024) - [j58]Yuchen Xiao, Lei Zhang, Yafang Yang, Wei Wu, Jianting Ning, Xinyi Huang:
Provably secure multi-signature scheme based on the standard SM2 signature scheme. Comput. Stand. Interfaces 89: 103819 (2024) - [j57]Wei Wu, Li Ye:
Research on Real Scene Robot 3d Visualization of Historical Architectural Heritage Based on Big Data Objects. Informatica (Slovenia) 48(8) (2024) - [j56]Xu Yang, Xuechao Yang, Junwei Luo, Xun Yi, Ibrahim Khalil, Shangqi Lai, Wei Wu, Albert Y. Zomaya:
Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System. IEEE Trans. Sustain. Comput. 9(1): 88-99 (2024) - [j55]Mengjie Zhou, Xiaotong Zhou, Wei Wu, Debiao He:
LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems. IEEE Trans. Veh. Technol. 73(4): 5100-5112 (2024) - 2023
- [j54]Yong Zhao, Shao-Jun Yang, Wei Wu, Xinyi Huang:
A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees. Comput. J. 66(12): 2961-2973 (2023) - [j53]Xiuyuan Chen, Chao Lin, Wei Wu, Jianting Ning, Junzuo Lai, Debiao He:
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions. IEEE Commun. Mag. 61(8): 130-136 (2023) - [j52]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j51]Jianghua Liu, Jian Yang, Wei Wu, Xinyi Huang, Yang Xiang:
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT. IEEE Trans. Computers 72(5): 1384-1395 (2023) - [j50]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haining Yang:
Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge. Theor. Comput. Sci. 952: 113731 (2023) - [j49]Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin, Xuemin Sherman Shen:
Dual-Anonymous Off-Line Electronic Cash for Mobile Payment. IEEE Trans. Mob. Comput. 22(6): 3303-3317 (2023) - [j48]Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo:
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 72(1): 81-92 (2023) - [c32]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. ASIACRYPT (7) 2023: 284-316 - [i3]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. IACR Cryptol. ePrint Arch. 2023: 1387 (2023) - 2022
- [j47]Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. Comput. J. 65(7): 1692-1701 (2022) - [j46]Yuxian Li, Jian Weng, Ming Li, Wei Wu, Jiasi Weng, Jia-Nan Liu, Shun Hu:
ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero. J. Parallel Distributed Comput. 169: 301-316 (2022) - [j45]Pengfei Wu, Qi Li, Jianting Ning, Xinyi Huang, Wei Wu:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. IEEE Trans. Dependable Secur. Comput. 19(6): 3741-3758 (2022) - [c31]Wei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao:
A Combination Reduction Algorithm and Its Application. NSS 2022: 667-683 - [c30]Niao Yang, Shaojun Yang, Yong Zhao, Wei Wu:
Inner Product Encryption from Middle-Product Learning with Errors. SocialSec 2022: 94-113 - 2021
- [j44]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. Comput. J. 64(8): 1178-1192 (2021) - [j43]Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu, Yongcheng Song:
Verifiable image revision from chameleon hashes. Cybersecur. 4(1): 34 (2021) - [j42]Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, Xinyi Huang:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - 2020
- [j41]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j40]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Efficient and secure image authentication with robustness and versatility. Sci. China Inf. Sci. 63(12) (2020) - [j39]Min Wang, Yuexin Zhang, Jinhua Ma, Wei Wu:
A universal designated multi verifiers content extraction signature scheme. Int. J. Comput. Sci. Eng. 21(1): 49-59 (2020) - [j38]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j37]Jinhua Ma, Jianghua Liu, Xinyi Huang, Yang Xiang, Wei Wu:
Authenticated Data Redaction with Fine-Grained Control. IEEE Trans. Emerg. Top. Comput. 8(2): 291-302 (2020)
2010 – 2019
- 2019
- [j36]Wenjie Yang, Shangpeng Wang, Wei Wu, Yi Mu:
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC. IEEE Access 7: 112870-112878 (2019) - [j35]Zhiyong Zhang, Ranran Sun, Kim-Kwang Raymond Choo, Kefeng Fan, Wei Wu, Manhua Zhang, Changwei Zhao:
A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks. IEEE Access 7: 117749-117760 (2019) - [j34]Fei Zhu, Wei Wu, Yuexin Zhang, Xiaofeng Chen:
Privacy-preserving authentication for general directed graphs in industrial IoT. Inf. Sci. 502: 218-228 (2019) - 2018
- [j33]Yuexin Zhang, Yang Xiang, Wei Wu, Abdulhameed Alelaiwi:
A variant of password authenticated key exchange protocol. Future Gener. Comput. Syst. 78: 699-711 (2018) - [j32]Ayong Ye, Qiuling Chen, Li Xu, Wei Wu:
The flexible and privacy-preserving proximity detection in mobile social network. Future Gener. Comput. Syst. 79: 271-283 (2018) - [j31]Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen:
An over-the-air key establishment protocol using keyless cryptography. Future Gener. Comput. Syst. 79: 284-294 (2018) - [j30]Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu:
GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption. Int. J. Embed. Syst. 10(1): 62-70 (2018) - [c29]Haixia Chen, Shangpeng Wang, Hongyan Zhang, Wei Wu:
Image Authentication for Permissible Cropping. Inscrypt 2018: 308-325 - [c28]Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:
A New Design of Online/Offline Signatures Based on Lattice. ISPEC 2018: 198-212 - 2017
- [j29]Jing Zhang, Li Xu, Xingsi Xue, Wei Wu, Hong Yang:
Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 38(1-4): 169-198 (2017) - [j28]Chao Lin, Wei Wu, Xinyi Huang, Li Xu:
A new universal designated verifier transitive signature scheme for big graph data. J. Comput. Syst. Sci. 83(1): 73-83 (2017) - [j27]Li Xu, Jing Zhang, Pei-Wei Tsai, Wei Wu, Dajin Wang:
Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks. Soft Comput. 21(10): 2619-2629 (2017) - [j26]Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au:
Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput. 21(10): 2643-2649 (2017) - [j25]Xiaoding Wang, Li Xu, Shuming Zhou, Wei Wu:
Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks. Sci. Program. 2017: 5807289:1-5807289:19 (2017) - [j24]Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. ACM Trans. Embed. Comput. Syst. 16(2): 57:1-57:20 (2017) - [j23]Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. IEEE Trans. Inf. Forensics Secur. 12(2): 454-464 (2017) - [c27]Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, Ru Meng:
A Universal Designated Multi-Verifier Transitive Signature Scheme. Inscrypt 2017: 180-195 - [c26]Jinhua Ma, Jianghua Liu, Min Wang, Wei Wu:
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control. GPC 2017: 38-52 - [c25]Ye Li, Kaitai Liang, Chunhua Su, Wei Wu:
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. GPC 2017: 611-626 - [c24]Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang:
Linearly Homomorphic Signatures with Designated Entities. ISPEC 2017: 375-390 - [e1]Sheng Wen, Wei Wu, Aniello Castiglione:
Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10581, Springer 2017, ISBN 978-3-319-69470-2 [contents] - [i2]Lei Zhang, Futai Zhang, Wei Wu:
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. CoRR abs/1712.09145 (2017) - 2016
- [j22]Zhide Chen, Meng Wang, Li Xu, Wei Wu:
Worm propagation model in mobile network. Concurr. Comput. Pract. Exp. 28(4): 1134-1144 (2016) - [j21]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116: 101-112 (2016) - [j20]Zhide Chen, Jiyun Wu, Aniello Castiglione, Wei Wu:
Human continuous activity recognition based on energy-efficient schemes considering cloud security technology. Secur. Commun. Networks 9(16): 3585-3601 (2016) - [j19]Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu:
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 11(9): 2052-2064 (2016) - [c23]Jiao Jiao Jiang, Youyang Qu, Shui Yu, Wanlei Zhou, Wei Wu:
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks. CIT 2016: 431-435 - [c22]Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo:
A New Transitive Signature Scheme. NSS 2016: 156-167 - [c21]Tingting Wang, Man Ho Au, Wei Wu:
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. NSS 2016: 251-265 - 2015
- [j18]Hui Lin, Li Xu, Xinyi Huang, Wei Wu, Yijie Huang:
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks 35: 51-64 (2015) - [j17]Jing Zhang, Shuming Zhou, Li Xu, Wei Wu, Xiucai Ye:
An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube. Int. J. Appl. Math. Comput. Sci. 25(2): 295-309 (2015) - [j16]Hui Lin, Li Xu, Yi Mu, Wei Wu:
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing. Future Gener. Comput. Syst. 52: 125-136 (2015) - [j15]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu:
Cooperative attribute-based access control for enterprise computing system. Int. J. Embed. Syst. 7(3/4): 191-202 (2015) - [j14]Jinhua Ma, Zhide Chen, Wei Wu, Rongjun Zheng, Jianghua Liu:
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies. Inf. 6(3): 536-549 (2015) - [c20]Yong Yu, Jianbing Ni, Wei Wu, Yilei Wang:
Provable Data Possession Supporting Secure Data Transfer for Cloud Storage. BWCCA 2015: 38-42 - [c19]Xu Yang, Joseph K. Liu, Wei Wu, Man Ho Au, Willy Susilo:
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme. ICPADS 2015: 282-289 - [c18]Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen:
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. ProvSec 2015: 215-226 - [i1]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptol. ePrint Arch. 2015: 314 (2015) - 2014
- [j13]Zhide Chen, Cheng Qiao, Li Xu, Wei Wu:
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory. Concurr. Comput. Pract. Exp. 26(5): 1130-1141 (2014) - [j12]Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu:
Dynamics stability in wireless sensor networks active defense model. J. Comput. Syst. Sci. 80(8): 1534-1548 (2014) - [j11]Yuan He, Li Xu, Wei Wu:
A local joint fast handoff scheme in cognitive wireless mesh networks. Secur. Commun. Networks 7(2): 455-465 (2014) - [c17]Limei Lin, Li Xu, Shuming Zhou, Wei Wu:
The Social Feature-Based Priority Relation Graph of Mobile Social Networks. CSE 2014: 1921-1926 - [c16]Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. ISPEC 2014: 359-372 - 2013
- [j10]Li Xu, Xi Cao, Yuexin Zhang, Wei Wu:
Software Service Signature (S3) for authentication in cloud computing. Clust. Comput. 16(4): 905-914 (2013) - [j9]Wei Wu, Jianying Zhou, Yang Xiang, Li Xu:
How to achieve non-repudiation of origin with privacy protection in cloud computing. J. Comput. Syst. Sci. 79(8): 1200-1213 (2013) - [c15]Jing Zhang, Li Xu, Shuming Zhou, Wei Wu:
Constructing Connected Dominating Set Based on Crossed Cube in WSN. INCoS 2013: 443-447 - 2012
- [j8]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4): 457-474 (2012) - [j7]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Comput. J. 55(10): 1157-1168 (2012) - [c14]Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu:
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network. INCoS 2012: 259-263 - [c13]Xi Cao, Li Xu, Yuexin Zhang, Wei Wu:
Identity-Based Proxy Signature for Cloud Service in SaaS. INCoS 2012: 594-599 - 2011
- [j6]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Provably secure server-aided verification signatures. Comput. Math. Appl. 61(7): 1705-1723 (2011) - [j5]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang:
Optimistic Fair Exchange with Strong Resolution-Ambiguity. IEEE J. Sel. Areas Commun. 29(7): 1491-1502 (2011) - [j4]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Trans. Inf. Forensics Secur. 6(2): 498-512 (2011) - 2010
- [c12]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang:
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Public Key Cryptography 2010: 124-141
2000 – 2009
- 2009
- [j3]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-based Signatures Revisited. J. Univers. Comput. Sci. 15(8): 1659-1684 (2009) - 2008
- [j2]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Secure universal designated verifier signature without random oracles. Int. J. Inf. Sec. 7(3): 171-183 (2008) - [j1]Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu:
Cryptanalysis and improvement of an efficient certificateless signature scheme. J. Commun. Networks 10(1): 10-17 (2008) - [c11]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 - [c10]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. WISA 2008: 99-114 - 2007
- [c9]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited. ACISP 2007: 308-322 - [c8]Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. ATC 2007: 22-31 - [c7]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
A Generic Construction for Universally-Convertible Undeniable Signatures. CANS 2007: 15-33 - [c6]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Inscrypt 2007: 25-39 - [c5]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu:
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. Pairing 2007: 367-391 - [c4]Lei Zhang, Futai Zhang, Wei Wu:
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. ProvSec 2007: 103-121 - [c3]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. WISA 2007: 16-29 - 2006
- [c2]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Universal Designated Verifier Signature Without Delegatability. ICICS 2006: 479-498 - [c1]Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Proxy Signature Without Random Oracles. MSN 2006: 473-484
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint