Xu An Wang
Orcid: 0000-0003-2070-4913Affiliations:
- Engineering University of Chinese Armed Police Force, Xi'an, China
- Guizhou University, State Key Laboratory of Public Big Data, China
According to our database1,
Xu An Wang
authored at least 228 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Secure Data Sharing in V2N Based on a Privacy-Preserving Identify-Based Broadcast Proxy Re-Encryption Plus Scheme.
IEEE Netw., May, 2024
Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting.
Comput. Intell., February, 2024
A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT.
J. Syst. Archit., 2024
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.
J. Inf. Secur. Appl., 2024
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
2023
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
J. King Saud Univ. Comput. Inf. Sci., March, 2023
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
Sensors, 2023
J. High Speed Networks, 2023
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023
Proceedings of the Advances in Internet, Data & Web Technologies, 2023
2022
Int. J. Data Warehous. Min., January, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.
J. King Saud Univ. Comput. Inf. Sci., 2022
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022
Inf. Process. Manag., 2022
Privacy preserving IoT-based crowd-sensing network with comparable homomorphic encryption and its application in combating COVID19.
Internet Things, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the Advances in Internet, Data & Web Technologies, 2022
On the Insecurity of a Certificateless Public Verification Protocol for the Outsourced Data Integrity in Cloud Storage.
Proceedings of the Advances in Internet, Data & Web Technologies, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021
Secur. Commun. Networks, 2021
Secure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City.
J. Circuits Syst. Comput., 2021
J. Ambient Intell. Humaniz. Comput., 2021
Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing.
Int. J. Mob. Comput. Multim. Commun., 2021
Concurr. Comput. Pract. Exp., 2021
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Cryptanalysis of a Privacy Preserving Ranked Multi-keyword Search Scheme in Cloud Computing.
Proceedings of the Advanced Information Networking and Applications, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation.
Inf. Process. Manag., 2020
Int. J. Embed. Syst., 2020
Int. J. Embed. Syst., 2020
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles.
IEEE Access, 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Advances in Internet, 2020
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2020
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2020
2019
Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme.
J. Parallel Distributed Comput., 2019
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.
J. Ambient Intell. Humaniz. Comput., 2019
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019
Int. J. Found. Comput. Sci., 2019
New provable data transfer from provable data possession and deletion for secure cloud storage.
Int. J. Distributed Sens. Networks, 2019
Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting.
Computing, 2019
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks.
Soft Comput., 2018
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.
Secur. Commun. Networks, 2018
Int. J. Web Grid Serv., 2018
Int. J. Embed. Syst., 2018
TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems.
Int. J. Comput. Sci. Eng., 2018
Int. J. Comput. Sci. Eng., 2018
Improved outsourced private set intersection protocol based on polynomial interpolation.
Concurr. Comput. Pract. Exp., 2018
Concurr. Comput. Pract. Exp., 2018
Comput. Sci. Inf. Syst., 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Advances in Internet, 2018
Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting.
Proceedings of the Advances in Internet, 2018
Proceedings of the Advances in Internet, 2018
Proceedings of the Advances in Internet, 2018
Proceedings of the Advances in Internet, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the Advances on P2P, 2018
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme.
Proceedings of the Advances on P2P, 2018
Proceedings of the Advances on P2P, 2018
Proceedings of the Advances on P2P, 2018
2017
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer-to-Peer Netw. Appl., 2017
Int. J. Web Grid Serv., 2017
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017
Int. J. Bus. Data Commun. Netw., 2017
Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
Sci. China Inf. Sci., 2017
Proceedings of the Advances in Internetworking, 2017
Proceedings of the Advances in Internetworking, 2017
Proceedings of the Advances in Internetworking, 2017
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm.
Proceedings of the Advances in Internetworking, 2017
Proceedings of the Advances in Internetworking, 2017
Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development.
Proceedings of the Advances on P2P, 2017
2016
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016
J. Ambient Intell. Humaniz. Comput., 2016
Informatica (Slovenia), 2016
Int. J. Technol. Hum. Interact., 2016
Int. J. Technol. Hum. Interact., 2016
An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem.
Int. J. Technol. Hum. Interact., 2016
Efficient expanded mixed finite element method for the quasilinear elliptic problems.
Int. J. High Perform. Syst. Archit., 2016
Int. J. High Perform. Syst. Archit., 2016
Int. J. High Perform. Syst. Archit., 2016
Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Comput. Electr. Eng., 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
The Research of Enhancing the Dependability of Cloud Services Using Self-Healing Mechanism.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage Sharing.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector Machine.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Design and Implementation of Library Books Search and Management System Using RFID Technology.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 10th International Conference on Complex, 2016
An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016
Proceedings of the 10th International Conference on Complex, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage.
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud Computing.
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mob. Inf. Syst., 2015
Comprehensive Improved Simulated Annealing Optimization for Floorplanning of Heterogeneous 3D Networks-on-Chip.
J. Interconnect. Networks, 2015
Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks.
J. Interconnect. Networks, 2015
FE-brick: Re-definition and Re-design of FE Model in Next-Generation Router Architecture.
J. Interconnect. Networks, 2015
J. Ambient Intell. Humaniz. Comput., 2015
Int. J. Inf. Technol. Web Eng., 2015
Int. J. Inf. Technol. Web Eng., 2015
Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart.
Int. J. Inf. Technol. Web Eng., 2015
Int. J. Inf. Technol. Web Eng., 2015
New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption.
Int. J. Inf. Commun. Technol., 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector Machine.
Proceedings of the 10th International Conference on P2P, 2015
An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts Theory.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem.
Proceedings of the 10th International Conference on P2P, 2015
Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series.
Proceedings of the 10th International Conference on P2P, 2015
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2013
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
J. Comput., 2013
J. Comput., 2013
Int. J. Intell. Inf. Database Syst., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
J. Syst. Softw., 2012
Informatica, 2012
IACR Cryptol. ePrint Arch., 2012
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011
Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011
IACR Cryptol. ePrint Arch., 2011
Fundam. Informaticae, 2011
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Fundam. Informaticae, 2010
Proceedings of the Second International Workshop on Database Technology and Applications, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
2004
Proceedings of the 3rd International Conference on Information Security, 2004