Qiaoyan Wen
Orcid: 0000-0001-7142-9726Affiliations:
- Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
- Xidian University, Xi'an, China (PhD 1997)
According to our database1,
Qiaoyan Wen
authored at least 241 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Intelligent analysis of android application privacy policy and permission consistency.
Artif. Intell. Rev., July, 2024
IEEE Trans. Software Eng., June, 2024
CoRR, 2024
2023
An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption for VANETs.
IEEE Internet Things J., October, 2023
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool.
IEEE Internet Things J., July, 2023
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023
Quantum Inf. Process., April, 2023
Quantum Inf. Process., February, 2023
IEEE Trans. Cloud Comput., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
ACM Trans. Cyber Phys. Syst., 2022
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022
Sensors, 2022
Quantum Inf. Process., 2022
Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Comput. J., 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
Secur. Commun. Networks, 2021
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources.
Quantum Inf. Process., 2021
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage.
Comput. J., 2021
2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020
Multim. Tools Appl., 2020
IEEE J. Sel. Areas Commun., 2020
Future Gener. Comput. Syst., 2020
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020
Ad Hoc Networks, 2020
IEEE Access, 2020
IEEE Access, 2020
Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions.
IEEE Access, 2020
2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity.
Sensors, 2019
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC.
Quantum Inf. Process., 2019
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities.
Quantum Inf. Process., 2019
Quantum Inf. Process., 2019
Multim. Tools Appl., 2019
IACR Cryptol. ePrint Arch., 2019
An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019
Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019
CoRR, 2019
Comput. J., 2019
IEEE Access, 2019
IEEE Access, 2019
An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network.
IEEE Access, 2019
2018
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security.
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
Soft Comput., 2018
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018
Quantum Inf. Process., 2018
Quantum Inf. Process., 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners.
J. Syst. Softw., 2018
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool.
CoRR, 2018
IEEE Access, 2018
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method.
IEEE Access, 2018
A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017
Secur. Commun. Networks, 2017
Quantum Inf. Process., 2017
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System.
J. Comput. Sci. Technol., 2017
J. Comput. Sci. Technol., 2017
KSII Trans. Internet Inf. Syst., 2017
Comput. Secur., 2017
A privacy-preserving authenticated key agreement protocol with smart cards for mobile emergency services.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017
2016
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications.
Wirel. Pers. Commun., 2016
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016
IEEE Trans. Broadcast., 2016
Quantum Inf. Process., 2016
Linear complexity of generalised cyclotomic quaternary sequences of length 2<i>p</i> <sup> <i>m</i>+1</sup> <i>q</i> <sup> <i>n</i>+1</sup>.
IET Inf. Secur., 2016
IEICE Trans. Inf. Syst., 2016
Comput. J., 2016
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption.
Sci. China Inf. Sci., 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Quantum Inf. Process., 2015
Quantum Inf. Process., 2015
Perfect discrimination of projective measurements with the rank of all projectors being one.
Quantum Inf. Process., 2015
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015
Inf. Sci., 2015
Int. J. Netw. Secur., 2015
Int. J. Inf. Commun. Technol., 2015
IET Inf. Secur., 2015
Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2<i>p</i><sup><i>m</i>+1</sup><i>q</i><sup><i>n</i>+1</sup>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015
Controlling the key by choosing the detection bits in quantum cryptographic protocols.
Sci. China Inf. Sci., 2015
2014
Quantum Inf. Process., 2014
Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement.
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization.
Int. J. Distributed Sens. Networks, 2014
Constructions of resilient rotation symmetric boolean functions on given number of variables.
IET Inf. Secur., 2014
IET Inf. Secur., 2014
Linear Complexity of Generalized Cyclotomic Quaternary Sequences with Period <i>pq</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
Frontiers Comput. Sci., 2014
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model.
Frontiers Comput. Sci., 2014
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks.
Comput. Math. Methods Medicine, 2014
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
2013
Quantum Inf. Process., 2013
The general theory of three-party quantum secret sharing protocols over phase-damping channels.
Quantum Inf. Process., 2013
Efficient quantum private comparison employing single photons and collective detection.
Quantum Inf. Process., 2013
Quantum Inf. Process., 2013
Quantum Inf. Process., 2013
Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states.
Quantum Inf. Process., 2013
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices.
Inf. Technol. Control., 2013
GLS: New class of generalized Legendre sequences with optimal arithmetic cross-correlation.
RAIRO Theor. Informatics Appl., 2013
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks.
Int. J. Netw. Manag., 2013
On the Linear Complexity of a Class of Quaternary Sequences with Low Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on <i>pq</i> Variables.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
A novel pairing-free certificateless authenticated key agreement protocol with provable security.
Frontiers Comput. Sci., 2013
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
Quantum Inf. Process., 2012
Quantum Inf. Comput., 2012
RAIRO Theor. Informatics Appl., 2012
Inf. Sci., 2012
Int. J. Approx. Reason., 2012
A General Construction of Low Correlation Zone Sequence Sets Based on Finite Fields and Balanced Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Fundam. Informaticae, 2012
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network.
Comput. Commun., 2012
On the construction of multi-output Boolean functions with optimal algebraic immunity.
Sci. China Inf. Sci., 2012
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012
A smart card-based secure software distribution scheme for mobile application market.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)].
Quantum Inf. Process., 2011
Quantum Inf. Comput., 2011
Quantum Inf. Comput., 2011
A steganographic method for digital images with four-pixel differencing and modified LSB substitution.
J. Vis. Commun. Image Represent., 2011
Int. J. Gen. Syst., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
New Constructions of Binary Sequences with Optimal Autocorrelation Magnitude Based on Interleaving Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing
CoRR, 2011
Appl. Algebra Eng. Commun. Comput., 2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
A Productive Time Length-Based Method for Multi-tenancy-Oriented Service Usage Metering and Billing.
Proceedings of the Advances in Computer Science, 2011
Study on the Technology of the Secure Computation in the Different Adversarial Models.
Proceedings of the Advances in Computer Science, 2011
Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology.
Proceedings of the Advances in Computer Science, 2011
Proceedings of the Advances in Computer Science, 2011
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
2010
J. Syst. Softw., 2010
New General Constructions of LCZ Sequence Sets Based on Interleaving Technique and Affine Transformations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model.
IACR Cryptol. ePrint Arch., 2010
An improved semantically-secure identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
2009
Security of quantum secret sharing with two-particle entanglement against individual attacks.
Quantum Inf. Comput., 2009
Int. J. Netw. Manag., 2009
Efficient and provably-secure certificateless short signature scheme from bilinear pairings.
Comput. Stand. Interfaces, 2009
2008
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Quantum Inf. Comput., 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Sci. China Ser. F Inf. Sci., 2005
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005