Fenghe Wang

Orcid: 0000-0002-5510-3133

According to our database1, Fenghe Wang authored at least 26 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service.
J. Syst. Archit., 2024

Secure and efficient vehicle data downloading scheme with privacy-preserving in VANETs.
Comput. Networks, 2024

2022
Efficient Data Sharing With Privacy Preservation Over Lattices for Secure Cloud Storage.
IEEE Syst. J., 2022

2021
TABLF-based adaptive control for uncertain nonlinear systems with time-varying asymmetric full-state constraints.
Int. J. Control, 2021

Efficient incremental authentication for the updated data in fog computing.
Future Gener. Comput. Syst., 2021

2020
Constant-size ring signature scheme using multilinear maps.
Int. J. Embed. Syst., 2020

A heat and mass transfer model based on multi-component heterogeneity for corn kernel tempering drying: Development and application.
Comput. Electron. Agric., 2020

Lattice-Based Incremental Signature Scheme for the Authenticated Data Update in Fog Computing.
IEEE Access, 2020

2019
BLF-based asymptotic tracking control for a class of time-varying full state constrained nonlinear systems.
Trans. Inst. Meas. Control, 2019

An anti-eavesdropping scheme for hybrid multicast services with massive MIMO in 5G.
J. Comput. Methods Sci. Eng., 2019

Lattice-Based Encrypted Verifiably Encryption Signature Scheme for the Fair and Private Electronic Commence.
IEEE Access, 2019

Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2017
Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search.
J. Inf. Sci. Eng., 2017

High-performance multicast services in 5G big data network with massive MIMO.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Short and provable secure lattice-based signature scheme in the standard model.
Secur. Commun. Networks, 2016

Efficient hierarchical identity based encryption scheme in the standard model over lattices.
Frontiers Inf. Technol. Electron. Eng., 2016

Full secure identity-based encryption scheme with short public key size over lattices in the standard model.
Int. J. Comput. Math., 2016

2015
New method of key-dependent message security for asymmetric encryption.
Secur. Commun. Networks, 2015

Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks.
J. Interconnect. Networks, 2015

Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme.
Proceedings of the 10th International Conference on P2P, 2015

2014
Gaussian sampling of lattices for cryptographic applications.
Sci. China Inf. Sci., 2014

2013
Lattice-based linearly homomorphic signature scheme over binary field.
Sci. China Inf. Sci., 2013

2012
Correlation power analysis of Trivium.
Secur. Commun. Networks, 2012

An Attack on a Fully Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2012

2011
On cross-correlation indicators of an S-box.
Frontiers Comput. Sci. China, 2011

New construction of identity-based encryption with wildcards.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...