Wenying Zheng

Orcid: 0000-0003-2225-5090

According to our database1, Wenying Zheng authored at least 20 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments.
IEEE Internet Things J., September, 2024

A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT.
IEEE Internet Things J., May, 2024

ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024

Efficient public auditing scheme for non-administrator group with secure user revocation.
J. Inf. Secur. Appl., February, 2024

2023
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

A Multinode Collaborative Decision-Making Scheme for Privacy Protection in IIoT.
IEEE Trans. Ind. Informatics, December, 2023

A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing.
Comput. Commun., September, 2023

Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs.
IEEE Trans. Intell. Transp. Syst., June, 2023

A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications.
IEEE Trans. Veh. Technol., March, 2023

Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Blockchain-based access control with k $k$ -times tamper resistance in cloud environment.
Int. J. Intell. Syst., 2022

Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces.
Int. J. Intell. Syst., 2022

An adaptive access control scheme based on trust degrees for edge computing.
Comput. Stand. Interfaces, 2022

An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment.
IEEE Trans. Ind. Informatics, 2021

2020
Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing.
Sustain. Comput. Informatics Syst., 2020

2018
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks.
Wirel. Commun. Mob. Comput., 2018

2013
Reliable and energy efficient cooperative relaying scheme (REECR) in wireless sensor networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
Effect of Lifestyle on the Adoption of Mobile Services.
Proceedings of the 11th Wuhan International Conference on E-Business, 2012

An exploratory study on lifestyles and the adoption of mobile services in China.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012


  Loading...