Huaqun Wang
Orcid: 0000-0001-7254-6465
According to our database1,
Huaqun Wang
authored at least 132 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Conditional privacy-preserving spectrum trading scheme based on traceable ring signature for DSS system.
J. Supercomput., January, 2025
2024
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs.
IEEE Trans. Intell. Veh., February, 2024
ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs.
IEEE Trans. Veh. Technol., 2024
PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage.
IEEE Trans. Serv. Comput., 2024
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Fault-tolerant unicast using conditional local safe model in the data center network BCube.
J. Parallel Distributed Comput., November, 2023
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services.
IEEE Internet Things J., 2023
2022
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Sustain. Comput., 2022
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2022
O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks.
IEEE Trans. Netw. Serv. Manag., 2022
VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022
2021
IEEE Trans. Serv. Comput., 2021
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021
Fuzzy-Based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks.
IEEE Trans. Fuzzy Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Netw., 2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021
Inf. Sci., 2021
Application-Oriented Block Generation for Consortium Blockchain-Based IoT Systems With Dynamic Device Management.
IEEE Internet Things J., 2021
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Int. J. Sens. Networks, 2021
Comput. Stand. Interfaces, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Engineering Management, 2020
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Syst. J., 2020
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
Future Gener. Comput. Syst., 2020
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019
Secur. Commun. Networks, 2019
抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack).
计算机科学, 2019
Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019
IEEE Internet Things J., 2019
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019
Ann. des Télécommunications, 2019
Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain.
IEEE Access, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018
Future Gener. Comput. Syst., 2018
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018
Comput. Electr. Eng., 2018
Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-Health Record.
IEEE Access, 2018
2017
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks.
Symmetry, 2017
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017
J. Inf. Sci. Eng., 2017
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Inf. Secur., 2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017
2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the Provable Security, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
IEEE Trans. Serv. Comput., 2015
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015
IET Inf. Secur., 2015
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014
IET Inf. Secur., 2014
Comput. J., 2014
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext.
Proceedings of the IEEE 12th International Conference on Dependable, 2014
2013
Clust. Comput., 2013
2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2012
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012
IET Inf. Secur., 2012
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
IEEE Trans. Wirel. Commun., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
2009
IEEE Trans. Dependable Secur. Comput., 2009
2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007