Qianhong Wu
Orcid: 0000-0002-6407-4194Affiliations:
- Beihang University, School of Cyber Science and Technology, Beijing, China
- University of Rovira i Virgili, Department of Computer Science and Mathematics, Spain
- Wuhan University, School of Computer, China
- Wollongong University, Center for Computer and Information Security Research, NSW, Australia
- Xidian University, State Key Laboratory Of Integrated Service Networks, Xi'an, China (PhD 2005)
According to our database1,
Qianhong Wu
authored at least 242 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Smart Grid, January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network.
IEEE Trans. Dependable Secur. Comput., 2024
J. Syst. Archit., 2024
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain.
IEEE Internet Things J., 2024
Comput. Stand. Interfaces, 2024
Comput. Stand. Interfaces, 2024
Comput. Electr. Eng., 2024
Comput. Electr. Eng., 2024
A comprehensive physics-based model for the brachial Artery's full flow mediated dilation (FMD) response observed during the FMD test.
Comput. Biol. Medicine, 2024
Iterative Proof of Retrievability for Periodic Incremental Data Via Optimistic Tags Generation.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024
2023
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions.
Comput. Commun., May, 2023
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Internet Things J., 2023
Comput. Stand. Interfaces, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Cross-chain based Spectrum Resources Transfer Technology across Different Telecom Operators Towards 6G.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Distributed Sens. Networks, 2022
IEICE Trans. Inf. Syst., 2022
Future Gener. Comput. Syst., 2022
CoRR, 2022
Comput. Secur., 2022
Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Wirel. Pers. Commun., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Peer-to-Peer Netw. Appl., 2021
J. Inf. Secur. Appl., 2021
Des. Codes Cryptogr., 2021
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management.
Comput. Networks, 2021
Ad Hoc Networks, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.
Secur. Commun. Networks, 2020
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing.
KSII Trans. Internet Inf. Syst., 2020
Inf. Sci., 2020
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
IEEE/ACM Trans. Netw., 2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019
Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization.
IEEE Trans. Big Data, 2019
Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network.
Comput. Secur., 2019
Comput. Commun., 2019
Searching With Direction Awareness: Multi-Objective Genetic Algorithm Based on Angle Quantization and Crowding Distance MOGA-AQCD.
IEEE Access, 2019
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Peer-to-Peer Netw. Appl., 2018
J. Comput. Sci. Technol., 2018
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Soft Comput., 2017
Soft Comput., 2017
Pers. Ubiquitous Comput., 2017
J. Inf. Sci. Eng., 2017
Int. J. Inf. Sec., 2017
Int. J. Found. Comput. Sci., 2017
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Comput. J., 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Soft Comput., 2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
J. Commun. Inf. Networks, 2016
Int. J. Inf. Sec., 2016
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016
Efficient group key management for secure big data in predictable large-scale networks.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Provable Security, 2016
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015
Int. J. Inf. Sec., 2015
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015
Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015
Sci. China Inf. Sci., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Information Security Practice and Experience, 2015
Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014
Inf. Sci., 2014
IET Inf. Secur., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security Practice and Experience, 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IEEE/ACM Trans. Netw., 2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013
Secur. Commun. Networks, 2013
Clust. Comput., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012
Inf. Fusion, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
IEEE Trans. Veh. Technol., 2010
IEEE Trans. Veh. Technol., 2010
J. Comput. Secur., 2010
Inf. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Networks, 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Data Knowl. Eng., 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Applied Algebra, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
J. Comput. Sci. Technol., 2005
IEICE Trans. Inf. Syst., 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003