Follow
huaqun Wang
Title
Cited by
Cited by
Year
Identity-based distributed provable data possession in multicloud storage
H Wang
IEEE Transactions on Services Computing 8 (2), 328-340, 2014
3492014
Proxy provable data possession in public clouds
H Wang
IEEE Transactions on Services Computing 6 (4), 551-559, 2012
3482012
Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
H Wang, D He, S Tang
IEEE Transactions on Information Forensics and Security 11 (6), 1165-1176, 2016
2102016
Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain
Y Wang, A Zhang, P Zhang, H Wang
Ieee Access 7, 136704-136719, 2019
1962019
Privacy-preserving federated learning in fog computing
C Zhou, A Fu, S Yu, W Yang, H Wang, Y Zhang
IEEE Internet of Things Journal 7 (11), 10782-10793, 2020
1812020
Identity‐based remote data possession checking in public clouds
H Wang, Q Wu, B Qin, J Domingo‐Ferrer
IET Information Security 8 (2), 114-121, 2014
1672014
Anonymous and secure aggregation scheme in fog-based public cloud computing
H Wang, Z Wang, J Domingo-Ferrer
Future Generation Computer Systems 78, 712-719, 2018
1642018
An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks
M Ma, D He, H Wang, N Kumar, KKR Choo
IEEE Internet of Things Journal 6 (5), 8065-8075, 2019
1572019
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT
A Fu, X Zhang, N Xiong, Y Gao, H Wang, J Zhang
IEEE Transactions on Industrial Informatics 18 (5), 3316-3326, 2020
1502020
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
1492016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
1492016
Strong key-exposure resilient auditing for secure cloud storage
J Yu, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017
1452017
NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data 8 (1), 14-24, 2017
1412017
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network
D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel
IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016
1402016
Incentive and unconditionally anonymous identity-based public provable data possession
H Wang, D He, J Yu, Z Wang
IEEE Transactions on Services Computing 12 (5), 824-835, 2016
1062016
Certificateless provable data possession scheme for cloud-based smart grid data management systems
D He, N Kumar, S Zeadally, H Wang
IEEE Transactions on Industrial Informatics 14 (3), 1232-1241, 2017
892017
A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks
B Chen, L Wu, H Wang, L Zhou, D He
IEEE Transactions on Vehicular Technology 69 (6), 5813-5825, 2019
842019
TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids
H Wang, B Qin, Q Wu, L Xu, J Domingo-Ferrer
IEEE Transactions on Information Forensics and Security 10 (11), 2340-2351, 2015
832015
Blockchain-based privacy-preserving and rewarding private data sharing for IoT
T Li, H Wang, D He, J Yu
IEEE Internet of Things Journal 9 (16), 15138-15149, 2022
772022
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Q Feng, D He, S Zeadally, H Wang
Future Generation Computer Systems 84, 239-251, 2018
762018
The system can't perform the operation now. Try again later.
Articles 1–20