Baocang Wang
Orcid: 0000-0002-2554-4464
According to our database1,
Baocang Wang
authored at least 157 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption.
Peer Peer Netw. Appl., September, 2024
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine.
Peer Peer Netw. Appl., September, 2024
IEEE Internet Things J., May, 2024
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values.
IET Blockchain, March, 2024
Pattern Recognit., February, 2024
MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation.
Inf. Sci., February, 2024
IEEE Internet Things J., January, 2024
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024
Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class.
Inf. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
PEPFL: A framework for a practical and efficient privacy-preserving federated learning.
Digit. Commun. Networks, 2024
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
2023
IEEE Syst. J., December, 2023
Quantum Inf. Process., December, 2023
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption.
J. Syst. Archit., November, 2023
Comput. J., October, 2023
Perfect Data Protection, Storage, and Reputation Management Scheme for Ride-Sharing Services.
IEEE Syst. J., September, 2023
IEEE Internet Things J., September, 2023
Des. Codes Cryptogr., September, 2023
Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning.
Entropy, August, 2023
Comput. Stand. Interfaces, August, 2023
Comput. Stand. Interfaces, August, 2023
IEEE Syst. J., March, 2023
Entropy, March, 2023
IET Inf. Secur., January, 2023
Comput. J., January, 2023
IACR Trans. Symmetric Cryptol., 2023
IEEE Trans. Cloud Comput., 2023
Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting.
Quantum Inf. Process., 2023
Quantum Inf. Comput., 2023
J. Syst. Archit., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Comput. Stand. Interfaces, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Wirel. Networks, 2022
Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE J. Biomed. Health Informatics, 2022
IEEE Syst. J., 2022
IEEE Syst. J., 2022
PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System.
IEEE Syst. J., 2022
Secur. Commun. Networks, 2022
Peer-to-Peer Netw. Appl., 2022
Inf. Sci., 2022
Inf. Sci., 2022
IEEE Internet Things J., 2022
Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Internet Things J., 2022
Privacy-preserving convolutional neural network prediction with low latency and lightweight users.
Int. J. Intell. Syst., 2022
Applications of the indirect sum in the design of several special classes of bent functions outside the completed <i>MM</i> class.
IACR Cryptol. ePrint Arch., 2022
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices.
IACR Cryptol. ePrint Arch., 2022
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud.
Expert Syst. Appl., 2022
Comput. Stand. Interfaces, 2022
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix.
Sci. China Inf. Sci., 2022
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021
Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment.
IEEE Syst. J., 2021
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021
Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT.
Neural Comput. Appl., 2021
J. Cloud Comput., 2021
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption.
KSII Trans. Internet Inf. Syst., 2021
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains.
Inf. Sci., 2021
Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2021
Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature.
IET Inf. Secur., 2021
Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018.
IET Inf. Secur., 2021
Lattice-based revocable attribute-based encryption with decryption key exposure resistance.
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
2020
Improvement on a privacy-preserving outsourced classification protocol over encrypted data.
Wirel. Networks, 2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020
IEEE Syst. J., 2020
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing.
Secur. Commun. Networks, 2020
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks.
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation.
Inf. Process. Manag., 2020
IEEE Internet Things J., 2020
A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data.
Inf., 2020
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves.
Int. J. Secur. Networks, 2020
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System.
Int. J. Netw. Secur., 2020
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid.
IEEE Access, 2020
A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT.
IEEE Access, 2020
2019
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.
J. Ambient Intell. Humaniz. Comput., 2019
Inf. Sci., 2019
Inf., 2019
Int. J. Web Grid Serv., 2019
Int. J. Found. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability.
IEEE Access, 2019
Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Secur. Commun. Networks, 2018
IET Inf. Secur., 2018
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking.
Fundam. Informaticae, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Secur. Commun. Networks, 2017
Pattern Recognit., 2017
Int. Arab J. Inf. Technol., 2017
Proceedings of the Advances in Internetworking, 2017
2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the Advances on P2P, 2016
2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
2014
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
Secur. Commun. Networks, 2014
J. Appl. Math., 2014
Int. J. Comput. Math., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
Frontiers Comput. Sci., 2014
2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Secur. Commun. Networks, 2013
Sci. China Inf. Sci., 2013
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013
2012
J. Parallel Distributed Comput., 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
Frontiers Comput. Sci. China, 2011
2010
2009
IET Inf. Secur., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
2007
2006
Proceedings of the Information Security Practice and Experience, 2006