Wei Wu
Orcid: 0000-0003-0343-4632Affiliations:
- Fujian Normal University, School of Mathematics and Computer Science, Fuzhou, China
- University of Wollongong, School of Computer Science and Software Engineering, Australia (former)
According to our database1,
Wei Wu
authored at least 94 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems.
IEEE Trans. Veh. Technol., April, 2024
Comput. Stand. Interfaces, January, 2024
Comput. Stand. Interfaces, January, 2024
IEEE Trans. Sustain. Comput., 2024
Research on Real Scene Robot 3d Visualization of Historical Architectural Heritage Based on Big Data Objects.
Informatica (Slovenia), 2024
Comput. Stand. Interfaces, 2024
Comput. J., 2024
Comput. J., 2024
2023
A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees.
Comput. J., December, 2023
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023
IEEE Trans. Mob. Comput., June, 2023
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT.
IEEE Trans. Computers, May, 2023
Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge.
Theor. Comput. Sci., March, 2023
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022
J. Parallel Distributed Comput., 2022
Comput. J., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
Theor. Comput. Sci., 2020
Int. J. Comput. Sci. Eng., 2020
Sci. China Inf. Sci., 2020
2019
Inf. Sci., 2019
A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019
IEEE Access, 2019
2018
Int. J. Embed. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017
Sci. Program., 2017
Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017
Soft Comput., 2017
J. Comput. Syst. Sci., 2017
Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017
Proceedings of the Information Security Practice and Experience, 2017
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016
Human continuous activity recognition based on energy-efficient schemes considering cloud security technology.
Secur. Commun. Networks, 2016
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015
Int. J. Embed. Syst., 2015
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015
An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Int. J. Appl. Math. Comput. Sci., 2015
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015
Proceedings of the Provable Security, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
Secur. Commun. Networks, 2014
J. Comput. Syst. Sci., 2014
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
J. Comput. Syst. Sci., 2013
Clust. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011
IEEE J. Sel. Areas Commun., 2011
2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010
2009
2008
J. Commun. Networks, 2008
Int. J. Inf. Sec., 2008
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Provable Security, Second International Conference, 2008
2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the Provable Security, 2007
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006