Feng Wang
Orcid: 0000-0003-0801-8726Affiliations:
- Fujian Normal University, College of Mathematics and Informatics, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
According to our database1,
Feng Wang
authored at least 23 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
Efficient Blockchain-Based Data Aggregation Scheme With Privacy-Preserving on the Smart Grid.
IEEE Trans. Smart Grid, November, 2024
A new authentication scheme for dynamic charging system of electric vehicles in fog environment.
Secur. Priv., 2024
2022
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
2020
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
2019
IEEE Access, 2019
2018
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Soc. Syst., 2018
An anonymous batch handover authentication protocol for big flow wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2018
Comput. Electr. Eng., 2018
2017
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.
J. Inf. Sci. Eng., 2017
Int. J. Commun. Syst., 2017
2016
Secur. Commun. Networks, 2016
J. Inf. Hiding Multim. Signal Process., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format.
IET Image Process., 2016
2015
Multim. Tools Appl., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Int. J. Netw. Secur., 2015
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
Secur. Commun. Networks, 2014