huaqun Wang
TitleCited byYear
Proxy provable data possession in public clouds
H Wang
IEEE Transactions on services Computing 6 (4), 551-559, 2012
2432012
Identity-based distributed provable data possession in multicloud storage
H Wang
IEEE Transactions on Services Computing 8 (2), 328-340, 2014
1922014
Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
H Wang, D He, S Tang
IEEE Transactions on Information Forensics and Security 11 (6), 1165-1176, 2016
932016
Identity-based remote data possession checking in public clouds
H Wang, Q Wu, B Qin, J Domingo-Ferrer
IET Information Security 8 (2), 114-121, 2013
822013
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network
D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel
IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016
602016
Anonymous and secure aggregation scheme in fog-based public cloud computing
H Wang, Z Wang, J Domingo-Ferrer
Future Generation Computer Systems 78, 712-719, 2018
562018
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
H Wang, Y Zhang, H Xiong, B Qin
IET Information Security 6 (1), 20-27, 2012
522012
Strong key-exposure resilient auditing for secure cloud storage
J Yu, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017
512017
On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
H Wang, Y Zhang
IEEE Transactions on Parallel and Distributed Systems 25 (1), 264-267, 2013
512013
NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data, 2017
482017
TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids
H Wang, B Qin, Q Wu, L Xu, J Domingo-Ferrer
IEEE Transactions on Information Forensics and Security 10 (11), 2340-2351, 2015
402015
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks
H Wang, Q Wu, B Qin, J Domingo-Ferrer
Journal of biomedical informatics 50, 226-233, 2014
402014
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
372016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
372016
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Q Feng, D He, S Zeadally, H Wang
Future Generation Computer Systems 84, 239-251, 2018
292018
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
D He, N Kumar, H Wang, L Wang, KKR Choo
Applied Mathematics and Computation 314, 31-43, 2017
282017
Certificateless provable data possession scheme for cloud-based smart grid data management systems
D He, N Kumar, S Zeadally, H Wang
IEEE Transactions on Industrial Informatics 14 (3), 1232-1241, 2017
272017
Incentive and unconditionally anonymous identity-based public provable data possession
H Wang, D He, J Yu, Z Wang
IEEE Transactions on Services Computing, 2016
252016
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
252016
An anonymous data aggregation scheme for smart grid systems
X Liu, Y Zhang, B Wang, H Wang
Security and communication networks 7 (3), 602-610, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20