default search action
Xu An Wang 0001
Xu-An Wang 0001 – Xuan Wang 0014 – 王 绪安
Person information
- unicode name:
王 绪安 - affiliation: Engineering University of Chinese Armed Police Force, Xi'an, China
- affiliation: Guizhou University, State Key Laboratory of Public Big Data, China
Other persons with the same name
- Xuan Wang — disambiguation page
- Xuan Wang 0001 — Hong Kong University of Science and Technology, Department of Electronic and Computer Engineering, Hong Kong (and 4 more)
- Xuan Wang 0002 — Harbin Institute of Technology, Shenzhen Graduate School, China (and 1 more)
- Xuan Wang 0003 — Hong Kong University of Science and Technology, Department of Information Systems, Business Statistics and Operations, Hong Kong (and 1 more)
- Xuan Wang 0004 — Ocean University of China, Qingdao Collaborative Innovation Center of Marine Science and Technology, Qingdao, China (and 1 more)
- Xuan Wang 0005 — Fujian Normal University, College of Photonic and Electronic Engineering, China
- Xuan Wang 0006 — Shaanxi Normal University, School of Physics and Information Technology, Xi'an, China
- Xuan Wang 0007 — University of Stuttgart, Germany
- Xuan Wang 0008 — Virginia Tech, VA, USA (and 1 more)
- Xuan Wang 0009 — Xi'an Jiaotong University, Institute of Artificial Intelligence and Robotics / School of Software Engineering, China
- Xuan Wang 0010 — Beijing University of Posts and Telecommunications, School of Automation, China
- Xuan Wang 0011 — Bath Spa University, Center for Creative Computing, Somerset, UK
- Xuan Wang 0012 — University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA
- Xuan Wang 0013 — George Mason University, Department of Electrical and Computer Engineering, Fairfax, VA 22030 USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j88]Jiasen Liu, Xu An Wang, Guofeng Li, Dan Yu, Jindan Zhang:
Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting. Comput. Intell. 40(1) (2024) - [j87]Shuanggen Liu, Yingzi Hu, Xu An Wang, Xukai Liu, Yuqing Yin, Teng Wang:
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing. J. Inf. Secur. Appl. 84: 103803 (2024) - [j86]Shuanggen Liu, Hailun Pan, Xu An Wang, Siyi Zhao, Qing Li:
A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT. J. Syst. Archit. 149: 103100 (2024) - [j85]Shuanggen Liu, Hui Song, Xu An Wang, Yuxin He, Yifan Song:
Secure Data Sharing in V2N Based on a Privacy-Preserving Identify-Based Broadcast Proxy Re-Encryption Plus Scheme. IEEE Netw. 38(3): 70-75 (2024) - [c130]Ziying Liu, Xu Chen, Xu-An Wang:
Research on Bitcoin Price Prediction Based on Text Analysis and Deep Learning. IMIS 2024: 58-68 - [c129]Feiyu Yao, Na Deng, Xu-An Wang:
Bird Recognition Based on Mixed Convolutional Neural Network. IMIS 2024: 235-246 - 2023
- [j84]Yunxuan Su, Xu An Wang, Weidong Du, Yu Ge, Kaiyang Zhao, Ming Lv:
A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT. J. High Speed Networks 29(1): 41-56 (2023) - [j83]Zheng Tu, Xu An Wang, Weidong Du, Zexi Wang, Ming Lv:
An improved multi-copy cloud data auditing scheme and its application. J. King Saud Univ. Comput. Inf. Sci. 35(3): 120-130 (2023) - [j82]Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j81]Xiuguang Li, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, Xiaoyuan Yang:
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. Sensors 23(9): 4307 (2023) - [c128]Xu An Wang, Mingyu Zhou, Wenyong Yuan:
Cryptanalysis of a Public Cloud Auditing Scheme. EIDWT 2023: 292-296 - [c127]Xu An Wang, Xindi Ma, Zhiwei Zhang, Jindan Zhang:
On the Security of a Cloud Auditing Storage Protocol. INCoS 2023: 234-243 - [c126]Mingyu Zhou, Xu An Wang, Xiong Zhang, Xiaoxuan Xu, Jindan Zhang, PengLin Li:
An Improved Data Integrity Verification Scheme for Cloud Storage. INCoS 2023: 393-401 - [i9]Xu An Wang, Lunhai Pan, Hao Liu, Xiaoyuan Yang:
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. IACR Cryptol. ePrint Arch. 2023: 1692 (2023) - 2022
- [j80]Daxin Huang, Qingqing Gan, Xiaoming Wang, Marek R. Ogiela, Xu An Wang:
Privacy preserving IoT-based crowd-sensing network with comparable homomorphic encryption and its application in combating COVID19. Internet Things 20: 100625 (2022) - [j79]Kaiyang Zhao, Xu An Wang, Bo Yang, Youliang Tian, Jindan Zhang:
A privacy preserving homomorphic computing toolkit for predictive computation. Inf. Process. Manag. 59(2): 102880 (2022) - [j78]Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient Intell. Humaniz. Comput. 13(1): 469-482 (2022) - [j77]Xiaoyi Ge, Mingshu Zhang, Xu An Wang, Jia Liu, Bin Wei:
Emotion-Drive Interpretable Fake News Detection. Int. J. Data Warehous. Min. 18(1): 1-17 (2022) - [j76]Ruifeng Li, Xu An Wang, Haibin Yang, Ke Niu, Dianhua Tang, Xiaoyuan Yang:
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8079-8089 (2022) - [j75]Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1518-1531 (2022) - [c125]Zheng Tu, Xu An Wang, Yunxuan Su, Ying Li, Jiasen Liu:
Toward Secure K-means Clustering Based on Homomorphic Encryption in Cloud. EIDWT 2022: 52-62 - [c124]Xu An Wang, Xiaozhong Pan, Lixian Wei, Yize Zhao:
On the Insecurity of a Certificateless Public Verification Protocol for the Outsourced Data Integrity in Cloud Storage. EIDWT 2022: 63-67 - [c123]Xu An Wang, Ruifeng Li:
Improved Secure Provable Data Possession Scheme for Cloud Storage. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 456-460 - 2021
- [j74]Jindan Zhang, Chuan Lin, Urszula Ogiela, Nadia Nedjah, Arun Kumar Sangaiah, Xuan Wang:
Improved publicly verifiable auditing protocol for cloud storage. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j73]Jiasen Liu, Xu An Wang, Bowei Chen, Zheng Tu, Kaiyang Zhao:
Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing. Int. J. Mob. Comput. Multim. Commun. 12(3): 27-43 (2021) - [j72]Han Wang, Xu An Wang, Shuai Xiao, Jiasen Liu:
Decentralized data outsourcing auditing protocol based on blockchain. J. Ambient Intell. Humaniz. Comput. 12(2): 2703-2714 (2021) - [j71]Kaiyang Zhao, Xu An Wang, Jiasen Liu, Yi Qiao, Yang Zhou:
Secure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City. J. Circuits Syst. Comput. 30(15): 2150267:1-2150267:25 (2021) - [j70]Haibin Yang, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui, Xiaoyuan Yang:
Improved Outsourced Provable Data Possession for Secure Cloud Storage. Secur. Commun. Networks 2021: 1805615:1-1805615:12 (2021) - [j69]Jindan Zhang, Rongxing Lu, Baocang Wang, Xu An Wang:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". IEEE Trans. Inf. Forensics Secur. 16: 1288-1289 (2021) - [j68]Haibin Yang, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, Xiaoyuan Yang:
Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data. Wirel. Commun. Mob. Comput. 2021: 8886763:1-8886763:13 (2021) - [c122]Xu An Wang:
Cryptanalysis of a Privacy Preserving Ranked Multi-keyword Search Scheme in Cloud Computing. AINA (3) 2021: 367-370 - [c121]Wenchao Liu, Yingnan Zhang, Xu An Wang, Zhong Wang:
Improvement of the Matrix for Simple Matrix Encryption Scheme. AINA (2) 2021: 509-521 - [c120]Yunxuan Su, Xu An Wang, Yu Ge:
A Scheme for Checking Similarity and Its Application in Outsourced Image Processing. IMIS 2021: 511-517 - [c119]Xu An Wang, Yunxuan Su, Jindan Zhang:
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. NaNA 2021: 278-281 - 2020
- [j67]Jiasen Liu, Xu An Wang, Zhiquan Liu, Han Wang, Xiaoyuan Yang:
Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles. IEEE Access 8: 79428-79439 (2020) - [j66]Jindan Zhang, Baocang Wang, Marek R. Ogiela, Xu An Wang, Arun Kumar Sangaiah:
New public auditing protocol based on homomorphic tags for secure cloud storage. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j65]Jindan Zhang, Baocang Wang, Xu An Wang, Han Wang, Shuai Xiao:
New group user based privacy preserving cloud auditing protocol. Future Gener. Comput. Syst. 106: 585-594 (2020) - [j64]Rui Ma, Yue Liu, Ke Ma, Xu An Wang:
Identification and addressing of internet of things based on distributed ID. Int. J. Embed. Syst. 12(2): 195-205 (2020) - [j63]Xiangsong Zhang, Zhenhua Liu, Xu An Wang, Fenghe Wang:
Constant-size ring signature scheme using multilinear maps. Int. J. Embed. Syst. 12(2): 206-215 (2020) - [j62]Jindan Zhang, Zhihu Li, Baocang Wang, Xu An Wang, Urszula Ogiela:
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation. Inf. Process. Manag. 57(6): 102287 (2020) - [j61]Xu An Wang, Kim-Kwang Raymond Choo, Jian Weng, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". IEEE Trans. Inf. Forensics Secur. 15: 1586-1588 (2020) - [c118]Zheng Tu, Yunxuan Su, Xu An Wang, Ruifeng Li:
Design and Implementation of Secure File Transfer System Based on Java. 3PGCIC 2020: 366-375 - [c117]Yunxuan Su, Zheng Tu, Xu An Wang, Ruifeng Li:
Secure Outsourcing Protocol Based on Paillier Algorithm for Cloud Computing. 3PGCIC 2020: 376-384 - [c116]Junke Nie, Xu An Wang, Yang Su, Bo Wang:
Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder. AINA Workshops 2020: 56-64 - [c115]Kaiyang Zhao, Xu An Wang, Yao Liu, Jiasen Liu, Songyin Zhao:
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing. AINA Workshops 2020: 138-148 - [c114]Jiasen Liu, Xu An Wang, Kaiyang Zhao, Han Wang:
Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure. EIDWT 2020: 290-300 - [c113]Han Wang, Xu An Wang, Jiasen Liu, Chuan Lin:
Identify-Based Outsourcing Data Auditing Scheme with Lattice. FCS 2020: 347-358 - [c112]Shudong Liu, Jiamin Wei, Xu Chen, Chuang Wang, Xu An Wang:
Credit Rating Based on Hybrid Sampling and Dynamic Ensemble. INCoS 2020: 338-347 - [c111]Yitao Yang, Yubao Wu, Xu An Wang:
Trusted Records Scheme in Scene Investigation. NBiS 2020: 303-308
2010 – 2019
- 2019
- [j60]Xu An Wang, Yudong Liu, Arun Kumar Sangaiah, Jindan Zhang:
Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. Computing 101(7): 773-790 (2019) - [j59]Yudong Liu, Shuai Xiao, Han Wang, Xu An Wang:
New provable data transfer from provable data possession and deletion for secure cloud storage. Int. J. Distributed Sens. Networks 15(4) (2019) - [j58]Xiangxin Liu, Xiaoyuan Yang, Yiliang Han, Xu An Wang:
A Secure and Efficient Code-Based Signature Scheme. Int. J. Found. Comput. Sci. 30(4): 635-645 (2019) - [j57]Xu An Wang, Jian Weng, Jianfeng Ma, Xiaoyuan Yang:
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf. Sci. 488: 13-18 (2019) - [j56]Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang, Cong Li:
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J. Ambient Intell. Humaniz. Comput. 10(2): 429-438 (2019) - [j55]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Zhiheng Zheng:
Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. J. Parallel Distributed Comput. 130: 153-165 (2019) - [j54]Jindan Zhang, Baocang Wang, Debiao He, Xu An Wang:
Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput. 23(10): 3411-3422 (2019) - [c110]Bo Wang, Xu An Wang, Yang Su, Junke Nie:
Detection of Malicious Code Variants Based on a Flexible and Lightweight Net. 3PGCIC 2019: 367-377 - [c109]Peng Ma, Zeyu Wang, Weidong Zhong, Xu An Wang:
Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet. 3PGCIC 2019: 378-388 - [c108]Yanjing Hu, Xu An Wang:
Perception Mining of Network Protocol's Stealth Attack Behaviors. BWCCA 2019: 657-669 - [c107]Songyin Zhao, Xu An Wang:
A Survey of Malicious HID Devices. BWCCA 2019: 777-786 - [c106]Zeyu Wang, Wei Zhang, Peng Ma, Xu An Wang:
Power Consumption Attack Based on Improved Principal Component Analysis. BWCCA 2019: 787-799 - [c105]Wenchao Liu, Feng Pan, Xu An Wang, Guangsheng Tu, Weidong Zhong:
Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE. CISIS 2019: 660-668 - [c104]Han Wang, Xu An Wang, Shuai Xiao, Zichen Zhou:
Blockchain-Based Public Auditing Scheme for Shared Data. IMIS 2019: 197-206 - [c103]Zhongshi Gao, Yang Su, Yi Ding, Yudong Liu, Xu An Wang, Junwei Shen:
Key Technologies of Anomaly Detection Using PCA-LSTM. IMIS 2019: 246-254 - [c102]Shuai Xiao, Xu An Wang, Han Wang:
Large-Scale Electronic Voting Based on Conflux Consensus Mechanism. IMIS 2019: 291-299 - [c101]Han Wang, Xu An Wang, Wei Wang, Shuai Xiao:
A Basic Framework of Blockchain-Based Decentralized Verifiable Outsourcing. INCoS 2019: 415-421 - [c100]Shuai Xiao, Xu An Wang, Wei Wang, Han Wang:
Survey on Blockchain-Based Electronic Voting. INCoS 2019: 559-567 - [p1]Shuaishuai Zhu, Xu An Wang, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Dynamic public opinion evolvement modeling and supervision in social networks. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 239-262 - 2018
- [j53]Xu An Wang, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding:
Improved functional proxy re-encryption schemes for secure cloud data sharing. Comput. Sci. Inf. Syst. 15(3): 585-614 (2018) - [j52]Xiaoyuan Yang, Xiaoshuang Luo, Xu An Wang, Shuaiwei Zhang:
Improved outsourced private set intersection protocol based on polynomial interpolation. Concurr. Comput. Pract. Exp. 30(1) (2018) - [j51]Xu An Wang, Yudong Liu, Jindan Zhang, Xiaoyuan Yang, Minqing Zhang:
Improved group-oriented proofs of cloud storage in IoT setting. Concurr. Comput. Pract. Exp. 30(21) (2018) - [j50]Liming Zheng, Xu An Wang, Xiaobo Tian, Xiaodong Li:
TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems. Int. J. Comput. Sci. Eng. 16(3): 242-254 (2018) - [j49]Shuanggen Liu, Huatong Yao, Xu An Wang:
Fast elliptic curve scalar multiplication for resisting against SPA. Int. J. Comput. Sci. Eng. 17(3): 343-352 (2018) - [j48]Shuanggen Liu, Guanglu Qi, Xu An Wang:
Fast elliptic curve algorithm using deformed Fibonacci-type series. Int. J. Embed. Syst. 10(2): 104-112 (2018) - [j47]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Leonard Barolli, Yunlong Ge:
PRE+: dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 14(1): 44-69 (2018) - [j46]Zhiqiang Gao, Yixiao Sun, Xiaolong Cui, Yutao Wang, Yanyu Duan, Xu An Wang:
Privacy-Preserving Hybrid K-Means. Int. J. Data Warehous. Min. 14(2): 1-17 (2018) - [j45]Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Liqun Lv, Yitao Ding, Xu An Wang:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. Secur. Commun. Networks 2018: 4635715:1-4635715:12 (2018) - [j44]Xu An Wang, Fatos Xhafa, Xiaoshuang Luo, Shuaiwei Zhang, Yong Ding:
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks. Soft Comput. 22(8): 2517-2526 (2018) - [c99]Xu An Wang, Arun Kumar Sangaiah, Nadia Nedjah, Chun Shan, Zuliang Wang:
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme. 3PGCIC 2018: 192-198 - [c98]Yanjing Hu, Xu An Wang, Haining Luo, Shuaishuai Zhu:
Mining and Utilizing Network Protocol's Stealth Attack Behaviors. 3PGCIC 2018: 212-222 - [c97]Xu An Wang, Shuaishuai Zhu, Arun Kumar Sangaiah, Shuai Xue, Yunfei Cao:
More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing. 3PGCIC 2018: 293-299 - [c96]Xu An Wang, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan, Zuliang Wang:
Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing. 3PGCIC 2018: 478-485 - [c95]Wenwu Chen, Su Yang, Xu An Wang, Wei Zhang, Jindan Zhang:
Network Malicious Behavior Detection Using Bidirectional LSTM. CISIS 2018: 627-635 - [c94]Jingcheng Miao, Xiao-ou Song, Zili Wang, Xu An Wang:
Improved Cooperative Spectrum Sensing Algorithm with Artificial Neural Network. CISIS 2018: 639-649 - [c93]Wen-shuai Yang, Xu An Wang, Sha Zhou, Hong-xu Zhao, Jiaxing Huang:
An Improved Method for Voiceprint Recognition. CISIS 2018: 735-746 - [c92]Yun Wang, Xu An Wang, Jindan Zhang, Chenghai Yu:
Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis. CISIS 2018: 780-790 - [c91]Yanyu Duan, Xu An Wang, Fang Li, Jindan Zhang:
Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data. CISIS 2018: 1069-1076 - [c90]Deyang Zhang, Xu An Wang, Xiaolong Li, Chunfen Xu:
Threshold Model Based on Relative Influence Weight of User. EIDWT 2018: 437-448 - [c89]Yudong Liu, Xu An Wang, Arun Kumar Sangaiah, Heshuai Shao:
Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting. EIDWT 2018: 462-469 - [c88]Cong Li, Xu An Wang, Arun Kumar Sangaiah, Haibing Yang, Chun Shan:
Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size. EIDWT 2018: 792-800 - [c87]Ping Bai, Wei Zhang, Xu An Wang, Yudong Liu, Haibin Yang, Chun Shan:
Homomorphic Authentication Based on Rank-Based Merkle Hash Tree. EIDWT 2018: 841-848 - [c86]Wenwu Chen, Xu An Wang, Wei Zhang, Chunfen Xu:
Phishing Detection Research Based on PSO-BP Neural Network. EIDWT 2018: 990-998 - [c85]Cong Li, Xiaoyuan Yang, Yazhou Liu, Xu An Wang:
The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. ICCCS (3) 2018: 707-719 - [c84]Xu An Wang, Jindan Zhang, Guangming Wu, Chenghai Yu:
Improved Functional Encryption Schemes by Using Novel Techniques. INCoS 2018: 437-444 - [c83]Yudong Liu, Xu An Wang, Yunfei Cao, Dianhua Tang, Xiaoyuan Yang:
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage. INCoS 2018: 445-452 - [c82]Wenchao Liu, Feng Pan, Xu An Wang, Yunfei Cao, Dianhua Tang:
Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption. NBiS 2018: 752-762 - [e1]Leonard Barolli, Mingwu Zhang, Xu An Wang:
Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. Lecture Notes on Data Engineering and Communications Technologies 6, Springer 2018, ISBN 978-3-319-59462-0 [contents] - 2017
- [j43]Fushan Wei, Jianfeng Ma, Ruijie Zhang, Chuangui Ma, Xu An Wang:
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model. Sci. China Inf. Sci. 60(7): 72103 (2017) - [j42]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo:
Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Gener. Comput. Syst. 67: 242-254 (2017) - [j41]Taiming Zhu, Yuanbo Guo, Ankang Ju, Jun Ma, Xu An Wang:
An Insider Threat Detection Method Based on Business Process Mining. Int. J. Bus. Data Commun. Netw. 13(2): 83-98 (2017) - [j40]Xu An Wang, Fatos Xhafa, Jianfeng Ma, Yunfei Cao, Dianhua Tang:
Reusable garbled gates for new fully homomorphic encryption service. Int. J. Web Grid Serv. 13(1): 25-48 (2017) - [j39]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang:
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. Int. J. Web Grid Serv. 13(3): 246-269 (2017) - [j38]Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu, Xu An Wang, Cunbo Lu:
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Netw. Appl. 10(4): 995-1007 (2017) - [c81]Xiurong Chen, Xu An Wang, Xuguang Wu:
Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development. 3PGCIC 2017: 191-198 - [c80]Xiurong Chen, Yixiang Tian, Xu An Wang, Xuguang Wu:
RBF Model Based on the KECDBN. 3PGCIC 2017: 199-205 - [c79]Ping Bai, Wei Zhang, Zhenlin Li, Xu An Wang:
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm. EIDWT 2017: 199-211 - [c78]Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xu An Wang:
Key Encapsulation Mechanism from Multilinear Maps. EIDWT 2017: 349-357 - [c77]Jindan Zhang, Baocang Wang, Xu An Wang:
Improved Online/Offline Attribute Based Encryption and More. EIDWT 2017: 603-610 - [c76]Xu An Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. EIDWT 2017: 611-617 - [c75]Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang:
Cyber-Attack Risks Analysis Based on Attack-Defense Trees. EIDWT 2017: 667-678 - 2016
- [j37]Xu An Wang, Fatos Xhafa, Weiyi Cai, Jianfeng Ma, Fushan Wei:
Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 56: 871-883 (2016) - [j36]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A public cloud storage auditing scheme for resource-constrained clients. Int. J. High Perform. Syst. Archit. 6(3): 121-130 (2016) - [j35]Fei Li, Dongqing Xie, Wei Gao, Jianhua Yan, Xu An Wang:
Round-optimal ID-based dynamic authenticated group key agreement. Int. J. High Perform. Syst. Archit. 6(3): 153-161 (2016) - [j34]Qingli Zhao, Jin Li, Juxin Chen, Xu An Wang:
Efficient expanded mixed finite element method for the quasilinear elliptic problems. Int. J. High Perform. Syst. Archit. 6(3): 162-170 (2016) - [j33]