Zhiwei Wang

Orcid: 0000-0003-2932-890X

Affiliations:
  • Nanjing University of Posts and Telecommunications, School of Computer, Nanjing, China
  • Guizhou University, State Key Laboratory of Public Big Data, Guizhou, China
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China (PhD 2009)


According to our database1, Zhiwei Wang authored at least 40 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust Subgroup Multisignature with One-Time Public Keys in Order.
Int. J. Found. Comput. Sci., August, 2024

Efficient and Secure Whole-Network Authentication Protocol.
IEEE Trans. Veh. Technol., July, 2024

2023
Chameleon Hash Based Efficiently Updatable Oblivious Key Management.
IEEE Trans. Serv. Comput., 2023

Online/Offline and History Indexing Identity-Based Fuzzy Message Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol.
IEEE Internet Things J., 2023

2022
Blockchain-Based Edge Computing Data Storage Protocol Under Simplified Group Signature.
IEEE Trans. Emerg. Top. Comput., 2022

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing.
IEEE Trans. Cloud Comput., 2022

2021
Identity-Based Verifiable Aggregator Oblivious Encryption and Its Applications in Smart Grids.
IEEE Trans. Sustain. Comput., 2021

2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

Blind Batch Encryption-Based Protocol for Secure and Privacy-Preserving Medical Services in Smart Connected Health.
IEEE Internet Things J., 2019

Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud.
Future Gener. Comput. Syst., 2019

An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

2018
ID-based proxy re-signature without pairing.
Telecommun. Syst., 2018

Anonymous and secure aggregation scheme in fog-based public cloud computing.
Future Gener. Comput. Syst., 2018

Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing.
Future Gener. Comput. Syst., 2018

A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.
Future Gener. Comput. Syst., 2018

Security Analysis of an Identity-Based Data Aggregation Protocol for the Smart Grid.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

2017
Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices.
Wirel. Commun. Mob. Comput., 2017

A Secure and Efficient Framework to Read Isolated Smart Grid Devices.
IEEE Trans. Smart Grid, 2017

An Identity-Based Data Aggregation Protocol for the Smart Grid.
IEEE Trans. Ind. Informatics, 2017

ABE with improved auxiliary input for big data security.
J. Comput. Syst. Sci., 2017

Introduction to the Special Section on Challenges and Solutions in Mobile Systems Security.
Comput. Electr. Eng., 2017

2016
CP-ABE with outsourced decryption and directionally hidden policy.
Secur. Commun. Networks, 2016

Improvement on the fault-tolerant group key agreement protocol of Zhao <i>et al</i>.
Secur. Commun. Networks, 2016

CP-ABE with Hidden Policy from Waters Efficient Construction.
Int. J. Distributed Sens. Networks, 2016

2015
Attribute-Based Encryption Resilient to Auxiliary Input.
Proceedings of the Provable Security, 2015

CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency.
Proceedings of the Information Security - 18th International Conference, 2015

2014
A new definition of homomorphic signature for identity management in mobile cloud computing.
J. Comput. Syst. Sci., 2014

A privacy protection policy combined with privacy homomorphism in the Internet of Things.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

One-time symmetric key based cloud supported secure smart meter reading.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
Slight Homomorphic Signature for Access Controlling in Cloud Computing.
Wirel. Pers. Commun., 2013

Improved group key transfer protocols from the protocol of Harn <i>et al</i>.
Secur. Commun. Networks, 2013

An ID-based online/offline signature scheme without random oracles for wireless sensor networks.
Pers. Ubiquitous Comput., 2013

A new authenticated group key transfer protocol for actual network environment.
Int. J. Ad Hoc Ubiquitous Comput., 2013

2012
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012

Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2012

2010
Comment on Wu et al.'s Server-aided Verification Signature Schemes.
Int. J. Netw. Secur., 2010

2009
Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008


  Loading...