![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Baocang Wang
Person information
Refine list
![note](https://dblp.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j134]Jiacheng Zhou, Zhenhua Liu, Baocang Wang:
Updatable Signature Scheme With Weakened Token and No-Directional Key Update. Int. J. Netw. Manag. 35(1) (2025) - [j133]Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based matchmaking encryption with stronger security and instantiation on lattices. Theor. Comput. Sci. 1029: 115048 (2025) - 2024
- [j132]Liu Zhang
, Zilong Wang
, Baocang Wang
:
Improving Differential-Neural Cryptanalysis. IACR Commun. Cryptol. 1(3): 13 (2024) - [j131]Yange Chen, Baocang Wang
, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. Digit. Commun. Networks 10(2): 355-368 (2024) - [j130]Fengrong Zhang
, Enes Pasalic, Amar Bapic
, Baocang Wang:
Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class. Inf. Comput. 297: 105149 (2024) - [j129]Linqing Xiao, Juntao Gao
, Baocang Wang
, Xuelian Li
:
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values. IET Blockchain 4(1): 1-17 (2024) - [j128]Momeng Liu
, Yupu Hu
, Qiqi Lai
, Shanshan Zhang
, Huiwen Jia
, Wen Gao
, Baocang Wang
:
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. IET Inf. Secur. 2024: 1-16 (2024) - [j127]Xiaoying Shen
, Xue Luo, Feng Yuan
, Baocang Wang
, Yange Chen
, Dianhua Tang
, Le Gao
:
Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys. IEEE Internet Things J. 11(2): 3430-3445 (2024) - [j126]Yunzhen Zhang
, Baocang Wang
, Zhen Zhao
:
Secure k-NN Query With Multiple Keys Based on Random Projection Forests. IEEE Internet Things J. 11(9): 15205-15218 (2024) - [j125]Sensen Guo
, Xiaoyu Li
, Peican Zhu
, Baocang Wang, Zhiying Mu, Jinxiong Zhao:
MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation. Inf. Sci. 657: 119918 (2024) - [j124]Runze Wu, Baocang Wang, Zhen Zhao:
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine. Peer Peer Netw. Appl. 17(5): 3094-3109 (2024) - [j123]Wenju Xu, Xin Li, Yunxuan Su, Baocang Wang, Wei Zhao:
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption. Peer Peer Netw. Appl. 17(5): 3182-3199 (2024) - [j122]Yuan Ping
, Huina Li, Bin Hao, Chun Guo, Baocang Wang:
Beyond k-Means++: Towards better cluster exploration with geometrical information. Pattern Recognit. 146: 110036 (2024) - [j121]Wenjuan Jia
, Jiang Zhang, Binwu Xiang, Baocang Wang:
Hardness of (M)LWE with semi-uniform seeds. Theor. Comput. Sci. 994: 114481 (2024) - [j120]Baocang Wang
, Yange Chen
, Furong Li
, Jian Song
, Rongxing Lu
, Pu Duan
, Zhihong Tian
:
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. IEEE Trans. Serv. Comput. 17(1): 322-335 (2024) - [c15]Yingfei Yan
, Yongjun Zhao
, Wen Gao
, Baocang Wang
:
Lattice-Based Threshold, Accountable, and Private Signature. CT-RSA 2024: 249-274 - [c14]Wenwen Xia
, Leizhang Wang
, Geng Wang
, Dawu Gu
, Baocang Wang
:
A Refined Hardness Estimation of LWE in Two-Step Mode. Public Key Cryptography (3) 2024: 3-35 - [i16]Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. IACR Cryptol. ePrint Arch. 2024: 67 (2024) - 2023
- [j119]Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:
Multi-key Fully Homomorphic Encryption from Additive Homomorphism. Comput. J. 66(1): 197-207 (2023) - [j118]Wenju Xu, Baocang Wang, Quanbo Qu, Tanping Zhou, Pu Duan:
Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model. Comput. J. 66(10): 2355-2364 (2023) - [j117]Momeng Liu, Zeyu Zhang, Wenqiang Chai, Baocang Wang:
Privacy-preserving COVID-19 contact tracing solution based on blockchain. Comput. Stand. Interfaces 83: 103643 (2023) - [j116]Quanbo Qu
, Baocang Wang
, Leizhang Wang
, Yuejun Wang
, Yingfei Yan
:
More efficient tightly-secure lattice-based IBE with equality test. Comput. Stand. Interfaces 86: 103736 (2023) - [j115]Zhen Zhao
, Willy Susilo
, Fuchun Guo
, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j114]Yu Zhan, Ziqian Zhang, Qian Liu, Baocang Wang
:
Hiding the input-size in multi-party private set intersection. Des. Codes Cryptogr. 91(9): 2893-2915 (2023) - [j113]Xiaoying Shen, Hang Jiang, Yange Chen, Baocang Wang, Le Gao
:
PLDP-FL: Federated Learning with Personalized Local Differential Privacy. Entropy 25(3): 485 (2023) - [j112]Kaixin Peng, Xiaoying Shen, Le Gao
, Baocang Wang, Yichao Lu:
Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning. Entropy 25(8): 1125 (2023) - [j111]Jun Liu
, Dachao Wang, Yupu Hu, Jie Chen
, Baocang Wang
:
Improved integral cryptanalysis of SPNbox in digital rights management systems. IET Inf. Secur. 17(1): 147-158 (2023) - [j110]Wenjuan Jia
, Baocang Wang
:
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence. IET Inf. Secur. 2023: 1-15 (2023) - [j109]Wenjuan Jia
, Jiang Zhang
, Baocang Wang
:
Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU. IET Inf. Secur. 2023: 1-16 (2023) - [j108]Baocang Wang
, Yange Chen
, Hang Jiang, Zhen Zhao
:
PPeFL: Privacy-Preserving Edge Federated Learning With Local Differential Privacy. IEEE Internet Things J. 10(17): 15488-15500 (2023) - [j107]Xiaoliang Che
, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j106]Zhenhua Liu, Jingwan Gong
, Yuanju Ma, Yaxin Niu, Baocang Wang:
Forward and backward secure updatable ElGamal encryption scheme for cloud storage. J. Syst. Archit. 141: 102926 (2023) - [j105]Xiaoying Shen
, Xue Luo, Feng Yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao:
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption. J. Syst. Archit. 144: 102983 (2023) - [j104]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak. Quantum Inf. Comput. 23(3&4): 223-234 (2023) - [j103]Runsong Wang, Xuelian Li, Juntao Gao
, Hui Li, Baocang Wang:
Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting. Quantum Inf. Process. 22(6): 228 (2023) - [j102]Yangru Zheng
, Juntao Gao
, Xuelian Li, Baocang Wang:
A polynomial system for bit-based division property solving by quantum algorithm. Quantum Inf. Process. 22(12): 448 (2023) - [j101]Zhenhua Liu, Yingying Ding
, Ming Yuan
, Baocang Wang
:
Black-Box Accountable Authority CP-ABE Scheme for Cloud-Assisted E-Health System. IEEE Syst. J. 17(1): 756-767 (2023) - [j100]Zhenhua Liu, Yaxin Niu
, Jingwan Gong, Yuanju Ma, Baocang Wang
:
Perfect Data Protection, Storage, and Reputation Management Scheme for Ride-Sharing Services. IEEE Syst. J. 17(3): 3834-3845 (2023) - [j99]Xiaoying Shen, Zhen Wang, Baocang Wang
, Licheng Wang
, Qingqi Pei
:
A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server. IEEE Syst. J. 17(4): 6413-6424 (2023) - [j98]Zhen Zhao
, Willy Susilo
, Baocang Wang
, Kai Zeng:
Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing. IEEE Trans. Cloud Comput. 11(4): 3396-3406 (2023) - [j97]Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers. IACR Trans. Symmetric Cryptol. 2023(1): 152-191 (2023) - [c13]Leizhang Wang
, Yuntao Wang
, Baocang Wang
:
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. AsiaCCS 2023: 664-677 - [i15]Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper). IACR Cryptol. ePrint Arch. 2023: 202 (2023) - [i14]Yangru Zheng, Juntao Gao, Baocang Wang:
New Quantum Search Model on Symmetric Ciphers and Its Applications. IACR Cryptol. ePrint Arch. 2023: 327 (2023) - [i13]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes. IACR Cryptol. ePrint Arch. 2023: 692 (2023) - [i12]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited. IACR Cryptol. ePrint Arch. 2023: 1291 (2023) - 2022
- [j96]Jun Liu, Vincent Rijmen
, Yupu Hu, Jie Chen, Baocang Wang:
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci. China Inf. Sci. 65(3) (2022) - [j95]Zhiyong Hong, Liguo Zhou, Yu Zhan, Chengdong Liu, Baocang Wang:
Cryptanalysis of an additively homomorphic public key encryption scheme. Comput. Stand. Interfaces 82: 103623 (2022) - [j94]Jun Liu
, Dachao Wang, Yupu Hu, Jie Chen
, Baocang Wang
:
Improved key-recovery attacks on reduced-round WEM-8. Des. Codes Cryptogr. 90(10): 2419-2448 (2022) - [j93]Yange Chen, Qingqing Zhao, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang
:
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. Expert Syst. Appl. 201: 117086 (2022) - [j92]Furong Li
, Yange Chen
, Pu Duan
, Benyu Zhang
, Zhiyong Hong
, Yupu Hu
, Baocang Wang
:
Privacy-preserving convolutional neural network prediction with low latency and lightweight users. Int. J. Intell. Syst. 37(1): 568-595 (2022) - [j91]Yange Chen, SuYu He, Baocang Wang
, Pu Duan, Benyu Zhang, Zhiyong Hong
, Yuan Ping
:
Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Internet Things J. 9(21): 21958-21970 (2022) - [j90]Zhen Zhao
, Fuchun Guo
, Ge Wu
, Willy Susilo
, Baocang Wang
:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j89]Yu Zhan, Danfeng Shen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
MDOPE: Efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595: 334-343 (2022) - [j88]Wenju Xu, Baocang Wang, Jiasen Liu
, Yange Chen, Pu Duan, Zhiyong Hong:
Toward practical privacy-preserving linear regression. Inf. Sci. 596: 119-136 (2022) - [j87]Xiaoying Shen, Baocang Wang, Licheng Wang, Pu Duan, Benyu Zhang:
Group public key encryption supporting equality test without bilinear pairings. Inf. Sci. 605: 202-224 (2022) - [j86]Songyang Wu, Wenju Xu
, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [j85]Juntao Gao, Hao Li, Baocang Wang, Xuelian Li:
AES-128 under HHL algorithm. Quantum Inf. Comput. 22(3&4): 209-240 (2022) - [j84]Wenjuan Jia
, Guanhao Xue, Baocang Wang
, Yupu Hu:
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism. Secur. Commun. Networks 2022: 8299232:1-8299232:7 (2022) - [j83]Yange Chen, Baocang Wang
, Zhili Zhang
:
PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System. IEEE Syst. J. 16(2): 2032-2043 (2022) - [j82]Juntao Gao
, Xinxiang Liu
, Xuelian Li
, Baocang Wang
:
Leakage-Suppressed Range Query Scheme for Structured Data in IoT. IEEE Syst. J. 16(3): 3531-3542 (2022) - [j81]Qinyu Mao, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong
, Baocang Wang
:
Privacy-Preserving Classification Scheme Based on Support Vector Machine. IEEE Syst. J. 16(4): 5906-5916 (2022) - [j80]Yange Chen, Qinyu Mao, Baocang Wang
, Pu Duan, Benyu Zhang, Zhiyong Hong:
Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis. IEEE J. Biomed. Health Informatics 26(7): 3342-3353 (2022) - [j79]Yu Zhan, Liguo Zhou, Baocang Wang, Pu Duan, Benyu Zhang:
Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid. IEEE Trans. Parallel Distributed Syst. 33(12): 3430-3441 (2022) - [j78]Wenju Xu
, Qingqing Zhao, Yu Zhan, Baocang Wang, Yupu Hu:
Privacy-preserving association rule mining based on electronic medical system. Wirel. Networks 28(1): 303-317 (2022) - [c12]Zhenhua Liu, Yuanju Ma, Yaxin Niu, Jingwan Gong, Baocang Wang:
Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage. CSS 2022: 71-85 - [c11]Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. FCS 2022: 324-345 - [i11]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2022: 13 (2022) - [i10]Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. IACR Cryptol. ePrint Arch. 2022: 468 (2022) - [i9]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. IACR Cryptol. ePrint Arch. 2022: 977 (2022) - [i8]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
Notes on Reusable Garbling. IACR Cryptol. ePrint Arch. 2022: 1208 (2022) - [i7]Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang:
Improved Progressive BKZ with Lattice Sieving. IACR Cryptol. ePrint Arch. 2022: 1343 (2022) - [i6]Fengrong Zhang, Enes Pasalic, Amar Bapic, Baocang Wang:
Applications of the indirect sum in the design of several special classes of bent functions outside the completed MM class. IACR Cryptol. ePrint Arch. 2022: 1587 (2022) - [i5]Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices. IACR Cryptol. ePrint Arch. 2022: 1718 (2022) - 2021
- [j77]Zhiyong Hong, Zhili Zhang
, Pu Duan, Benyu Zhang, Baocang Wang
, Wen Gao, Zhen Zhao
:
Secure Privacy-Preserving Association Rule Mining With Single Cloud Server. IEEE Access 9: 165090-165102 (2021) - [j76]Guanhao Xue
, Baocang Wang, Quanbo Qu, Weidong Zhang:
Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature. IET Inf. Secur. 15(1): 107-116 (2021) - [j75]Dachao Wang, Baocang Wang, Yuan Ping
:
Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018. IET Inf. Secur. 15(5): 395-400 (2021) - [j74]Xingting Dong
, Yupu Hu, Baocang Wang
, Momeng Liu, Wen Gao:
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. IET Inf. Secur. 15(6): 428-441 (2021) - [j73]Yu Zhan
, Baocang Wang
, Rongxing Lu
:
Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 8(7): 5973-5984 (2021) - [j72]Yu Zhan, Baocang Wang, Rongxing Lu, Yong Yu
:
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf. Sci. 559: 8-21 (2021) - [j71]Zhenhua Liu, Jiaqi Ji, Fangfang Yin, Baocang Wang:
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. KSII Trans. Internet Inf. Syst. 15(1): 323-342 (2021) - [j70]Yange Chen, Hequn Liu, Baocang Wang
, Baljinnyam Sonompil, Yuan Ping
, Zhili Zhang:
A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 10(1): 3 (2021) - [j69]Yange Chen, Yuan Ping
, Zhili Zhang
, Baocang Wang, SuYu He:
Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT. Neural Comput. Appl. 33(10): 4677-4694 (2021) - [j68]Wenju Xu
, Baocang Wang
, Rongxing Lu
, Quanbo Qu
, Yange Chen
, Yupu Hu
:
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials. Secur. Commun. Networks 2021: 5553256:1-5553256:14 (2021) - [j67]Hongping Pang
, Baocang Wang
:
Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment. IEEE Syst. J. 15(2): 3131-3141 (2021) - [j66]Jindan Zhang
, Rongxing Lu
, Baocang Wang
, Xu An Wang
:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". IEEE Trans. Inf. Forensics Secur. 16: 1288-1289 (2021) - [j65]Huilin Li, Yannan Li
, Yong Yu
, Baocang Wang
, Kefei Chen
:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. IEEE Trans. Netw. Sci. Eng. 8(2): 1019-1032 (2021) - [j64]Zhenhua Liu, Ming Yuan
, Yingying Ding, Baocang Wang
:
Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs. IEEE Trans. Veh. Technol. 70(12): 12836-12846 (2021) - [i4]Yupu Hu, Xingting Dong, Baocang Wang:
Size of IK00 Branching Program. IACR Cryptol. ePrint Arch. 2021: 400 (2021) - [i3]Yupu Hu, Jun Liu, Baocang Wang, Xingting Dong, Yanbin Pan:
P/poly Invalidity of the Agr17 Functional Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1442 (2021) - [i2]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1602 (2021) - 2020
- [j63]Leyou Zhang
, Juan Ren
, Yi Mu
, Baocang Wang
:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j62]Zhenhua Liu, Changbo Guo
, Baocang Wang
:
A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT. IEEE Access 8: 195914-195928 (2020) - [j61]Zhen Zhao, Ge Wu, Fuchun Guo
, Willy Susilo
, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j60]Jindan Zhang
, Baocang Wang, Marek R. Ogiela
, Xu An Wang
, Arun Kumar Sangaiah
:
New public auditing protocol based on homomorphic tags for secure cloud storage. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j59]Jindan Zhang, Baocang Wang, Xu An Wang
, Han Wang, Shuai Xiao:
New group user based privacy preserving cloud auditing protocol. Future Gener. Comput. Syst. 106: 585-594 (2020) - [j58]Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. Int. J. Netw. Secur. 22(5): 845-856 (2020) - [j57]Yuan Ping
, Xuyang Guo, Baocang Wang, Jingxian Zhou:
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves. Int. J. Secur. Networks 15(2): 101-110 (2020) - [j56]Yuan Ping
, Wei Song, Zhili Zhang, Weiping Wang
, Baocang Wang
:
A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data. Inf. 11(8): 394 (2020) - [j55]Yuan Ping
, Yu Zhan, Ke Lu, Baocang Wang
:
Public Data Integrity Verification Scheme for Secure Cloud Storage. Inf. 11(9): 409 (2020) - [j54]Zhong Shen
, Hai Jiang
, Qingkuan Dong, Baocang Wang
:
Energy-Efficient Neighbor Discovery for the Internet of Things. IEEE Internet Things J. 7(1): 684-698 (2020) - [j53]Jindan Zhang, Zhihu Li, Baocang Wang, Xu An Wang
, Urszula Ogiela:
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation. Inf. Process. Manag. 57(6): 102287 (2020) - [j52]Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping
, Baocang Wang
:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. Secur. Commun. Networks 2020: 1238505:1-1238505:11 (2020) - [j51]Xingting Dong, Yanhua Zhang
, Baocang Wang
, Jiangshan Chen
:
Server-Aided Revocable Attribute-Based Encryption from Lattices. Secur. Commun. Networks 2020: 1460531:1-1460531:13 (2020) - [j50]Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping
, Baocang Wang
:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. Secur. Commun. Networks 2020: 4938736:1-4938736:12 (2020) - [j49]Yu Zhan
, Baocang Wang
, Zheng Wang, Tao Pei, Yuan Chen
, Quanbo Qu, Zhili Zhang
:
Improved Proxy Re-Encryption With Delegatable Verifiability. IEEE Syst. J. 14(1): 592-602 (2020) - [j48]Chenyang Ma
, Baocang Wang
, Kyle Jooste, Zhili Zhang
, Yuan Ping
:
Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions. IEEE Syst. J. 14(2): 1992-2002 (2020) - [j47]Zhen Zhao
, Fuchun Guo
, Jianchang Lai, Willy Susilo
, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - [j46]Mwitende Gervais, Ikram Ali
, Nabeil Eltayieb
, Baocang Wang, Fagen Li
:
Authenticated key agreement for blockchain-based WBAN. Telecommun. Syst. 74(3): 347-365 (2020) - [j45]