default search action
Fenghe Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Chengliang Cao, Fenghe Wang, Han Xiao, Ye Wang:
Secure and efficient vehicle data downloading scheme with privacy-preserving in VANETs. Comput. Networks 250: 110610 (2024) - [j20]Fenghe Wang, Han Xiao, Junquan Wang, Ye Wang, Chengliang Cao:
Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service. J. Syst. Archit. 149: 103089 (2024) - 2022
- [j19]Fenghe Wang, Junquan Wang, Shaoquan Shi:
Efficient Data Sharing With Privacy Preservation Over Lattices for Secure Cloud Storage. IEEE Syst. J. 16(2): 2507-2517 (2022) - 2021
- [j18]Fenghe Wang, Junquan Wang, Wenfeng Yang:
Efficient incremental authentication for the updated data in fog computing. Future Gener. Comput. Syst. 114: 130-137 (2021) - [j17]Chunxiao Wang, Yuqiang Wu, Fenghe Wang, Yan Zhao:
TABLF-based adaptive control for uncertain nonlinear systems with time-varying asymmetric full-state constraints. Int. J. Control 94(5): 1238-1246 (2021) - 2020
- [j16]Junquan Wang, Fenghe Wang, Shaoquan Shi, Wenfeng Yang:
Lattice-Based Incremental Signature Scheme for the Authenticated Data Update in Fog Computing. IEEE Access 8: 89595-89602 (2020) - [j15]Shuo Wei, Zhenhua Wang, Weijun Xie, Fenghe Wang, Pengxiao Chen, Deyong Yang:
A heat and mass transfer model based on multi-component heterogeneity for corn kernel tempering drying: Development and application. Comput. Electron. Agric. 171: 105335 (2020) - [j14]Xiangsong Zhang, Zhenhua Liu, Xu An Wang, Fenghe Wang:
Constant-size ring signature scheme using multilinear maps. Int. J. Embed. Syst. 12(2): 206-215 (2020)
2010 – 2019
- 2019
- [j13]Fenghe Wang, Shaoquan Shi:
Lattice-Based Encrypted Verifiably Encryption Signature Scheme for the Fair and Private Electronic Commence. IEEE Access 7: 147481-147489 (2019) - [j12]Ke Xiao, Jianyu Zhao, Moqi Jiang, Fenghe Wang:
An anti-eavesdropping scheme for hybrid multicast services with massive MIMO in 5G. J. Comput. Methods Sci. Eng. 19(1): 71-81 (2019) - [j11]Chunxiao Wang, Fenghe Wang, Jiali Yu:
BLF-based asymptotic tracking control for a class of time-varying full state constrained nonlinear systems. Trans. Inst. Meas. Control 41(11): 3043-3052 (2019) - [c4]Fenghe Wang, Shaoquan Shi, Chunxiao Wang:
Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding. FCS 2019: 84-94 - 2017
- [j10]Yang Yang, Shu-Lve Yang, Fenghe Wang, Jin Sun:
Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search. J. Inf. Sci. Eng. 33(2): 485-497 (2017) - [c3]Ke Xiao, Fenghe Wang, Humphrey Rutagemwa, Michel Kadoch, Bo Rong:
High-performance multicast services in 5G big data network with massive MIMO. ICC 2017: 1-6 - 2016
- [j9]Fenghe Wang, Zhen Hua Liu, Chunxiao Wang:
Full secure identity-based encryption scheme with short public key size over lattices in the standard model. Int. J. Comput. Math. 93(6): 854-863 (2016) - [j8]Fenghe Wang, Chunxiao Wang, Zhen Hua Liu:
Efficient hierarchical identity based encryption scheme in the standard model over lattices. Frontiers Inf. Technol. Electron. Eng. 17(8): 781-791 (2016) - [j7]Fenghe Wang, Zhenhua Liu:
Short and provable secure lattice-based signature scheme in the standard model. Secur. Commun. Networks 9(16): 3627-3632 (2016) - 2015
- [j6]Fenghe Wang, Xu An Wang, Chunxiao Wang:
Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks. J. Interconnect. Networks 15(3-4): 1540005:1-1540005:14 (2015) - [j5]Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:
New method of key-dependent message security for asymmetric encryption. Secur. Commun. Networks 8(13): 2157-2170 (2015) - [c2]Fenghe Wang, Xu An Wang, Chunxiao Wang:
Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme. 3PGCIC 2015: 853-858 - 2014
- [j4]Yupu Hu, Hao Lei, Fenghe Wang, Wenzheng Zhang:
Gaussian sampling of lattices for cryptographic applications. Sci. China Inf. Sci. 57(7): 1-8 (2014) - 2013
- [j3]Fenghe Wang, Yupu Hu, Baocang Wang:
Lattice-based linearly homomorphic signature scheme over binary field. Sci. China Inf. Sci. 56(11): 1-9 (2013) - 2012
- [j2]Yanyan Jia, Yupu Hu, Fenghe Wang, Hongxian Wang:
Correlation power analysis of Trivium. Secur. Commun. Networks 5(5): 479-484 (2012) - [i1]Yupu Hu, Fenghe Wang:
An Attack on a Fully Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2012: 561 (2012) - 2011
- [j1]Sheng Gao, Wenping Ma, Zepeng Zhuo, Fenghe Wang:
On cross-correlation indicators of an S-box. Frontiers Comput. Sci. China 5(4): 448-453 (2011) - [c1]Yang Yang, Yupu Hu, Fengrong Zhang, Fenghe Wang:
New construction of identity-based encryption with wildcards. EMEIT 2011: 4728-4731
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-22 23:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint