Tao Wang

Orcid: 0000-0001-8099-9704

Affiliations:
  • Shaanxi Normal University, School of Computer Science, Xian, China
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China
  • Ministry of Education, Key Laboratory of Modern Teaching Technology, Xian, Shaanxi, China


According to our database1, Tao Wang authored at least 15 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023

ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023

Multitask-Oriented Collaborative Crowdsensing Based on Reinforcement Learning and Blockchain for Intelligent Transportation System.
IEEE Trans. Ind. Informatics, 2023

2022
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022

An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT.
IEEE Internet Things J., 2022

Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach.
Concurr. Comput. Pract. Exp., 2022

2021
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection.
Wirel. Commun. Mob. Comput., 2021

Blockchain-based searchable encryption with efficient result verification and fair payment.
J. Inf. Secur. Appl., 2021

2020
Novel updatable identity-based hash proof system and its applications.
Theor. Comput. Sci., 2020

Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
Comput. J., 2020

2019
An alternative approach to public cloud data auditing supporting data dynamics.
Soft Comput., 2019

Anonymous and Updatable Identity-Based Hash Proof System.
IEEE Syst. J., 2019

An Approach Enabling Various Queries on Encrypted Industrial Data Stream.
Secur. Commun. Networks, 2019

Identity-based encryption resilient to continuous key leakage.
IET Inf. Secur., 2019

Continuous Leakage-Resilient Identity-Based Encryption with Tight Security.
Comput. J., 2019


  Loading...