Wanpeng Li
Orcid: 0000-0002-6396-9578
According to our database1,
Wanpeng Li
authored at least 25 papers
between 2013 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Research on Dynamic Scheduling Algorithm for Emergency Repair of Power Grid Disaster Relief Based on Improved Q-Learning.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
2022
2021
J. Syst. Archit., 2021
2020
Forecasting manufacturing industrial natural gas consumption of China using a novel time-delayed fractional grey model with multiple fractional order.
Comput. Appl. Math., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the 12th International Symposium on Communication Systems, 2020
2019
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019
2018
Proceedings of the Security Protocols XXVI, 2018
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Proceedings of the Advances in Information and Computer Security, 2017
2016
Int. J. Netw. Secur., 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the ISSE 2015, 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013
Frontiers Comput. Sci., 2013