Chen Wang
Orcid: 0000-0002-3951-3159Affiliations:
- Nanjing University of Information Science and Technology, School of Computer and Software, China
According to our database1,
Chen Wang
authored at least 42 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Veh. Technol., January, 2024
2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
An effective revocable and traceable public auditing scheme for sensor-based urban cities.
J. King Saud Univ. Comput. Inf. Sci., 2023
Future Gener. Comput. Syst., 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022
2021
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Emerg. Top. Comput., 2021
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019
Soft Comput., 2019
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.
Peer-to-Peer Netw. Appl., 2019
Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks.
Wirel. Commun. Mob. Comput., 2018
Secur. Commun. Networks, 2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
IEEE Netw., 2018
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017
An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2014
Proceedings of the Intelligent Systems and Applications, 2014
2007
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007