Wenbao Han
Orcid: 0000-0001-8955-8489
According to our database1,
Wenbao Han
authored at least 50 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
A metaheuristic image cryptosystem using improved parallel model and many-objective optimization.
IET Image Process., September, 2024
J. King Saud Univ. Comput. Inf. Sci., February, 2024
IEEE Trans. Circuits Syst. Video Technol., January, 2024
EVeCA: Efficient and Verifiable On-Chain Data Query Framework Using Challenge-Based Authentication.
CoRR, 2024
Comput. Electr. Eng., 2024
IEEE Access, 2024
2023
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain.
Connect. Sci., December, 2023
J. Netw. Comput. Appl., April, 2023
2022
A brain-inspired multibranch parallel interactive vision mechanism for advanced driver assistance systems.
Int. J. Sens. Networks, 2022
Frontiers Neurorobotics, 2022
A novel zero-watermarking scheme based on NSCT-SVD and blockchain for video copyright.
EURASIP J. Wirel. Commun. Netw., 2022
Comput. Networks, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Mob. Inf. Syst., 2021
2017
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud.
Int. J. Found. Comput. Sci., 2017
Sci. China Inf. Sci., 2017
2016
SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1).
计算机科学, 2016
Int. J. Netw. Secur., 2016
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation.
Proceedings of the Provable Security, 2016
2015
Wirel. Pers. Commun., 2015
缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher).
计算机科学, 2015
KSII Trans. Internet Inf. Syst., 2015
Sci. China Inf. Sci., 2015
Sci. China Inf. Sci., 2015
2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
2013
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013
2011
2010
Theor. Comput. Sci., 2010
2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.
Finite Fields Their Appl., 2007
Primitive normal polynomials with multiple coefficients prescribed: An asymptotic result.
Finite Fields Their Appl., 2007
Sci. China Ser. F Inf. Sci., 2007
2006
Proceedings of the Sequences and Their Applications, 2006
2005
Proceedings of the Networking, 2005
2004
Finite Fields Their Appl., 2004
Finite Fields Their Appl., 2004
Appl. Algebra Eng. Commun. Comput., 2004
2003
Random properties of the highest level sequences of primitive sequences over Z(2<sup>e</sup>).
IEEE Trans. Inf. Theory, 2003