Lihua Wang
Orcid: 0000-0002-7553-423XAffiliations:
- National Institute of Information and Communications Technology (NICT), Tokyo, Japan
- University of Tsukuba, Ibaraki, Japan (PhD 2006)
According to our database1,
Lihua Wang
authored at least 57 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEICE Trans. Inf. Syst., January, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022
IEEE Access, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
2021
Outlier Detection by Privacy-Preserving Ensemble Decision Tree U sing Homomorphic Encryption.
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
J. Internet Serv. Inf. Secur., 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
2019
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019
A Fast Privacy-Preserving Multi-Layer Perceptron Using Ring-LWE-Based Homomorphic Encryption.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEEE Commun. Mag., 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
2017
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption.
IEICE Trans. Inf. Syst., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014
2013
Inf. Sci., 2013
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
2012
Secur. Commun. Networks, 2012
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011
2010
IACR Cryptol. ePrint Arch., 2010
Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Inf. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol.
IEEE Commun. Lett., 2008
IACR Cryptol. ePrint Arch., 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Progress in Cryptology, 2007
2006
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
2005
SIAM J. Discret. Math., 2005
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
Proceedings of the Coding and Cryptography, International Workshop, 2005
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Transformation-free proxy cryptosystems and their applications to electronic commerce.
Proceedings of the 3rd International Conference on Information Security, 2004