default search action
Changji Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Changji Wang, Zhen Liu:
Online/offline remote data auditing with strong key-exposure resilience for cloud storage. Comput. Stand. Interfaces 88: 103798 (2024) - 2017
- [j10]Changji Wang, Yuan Li, Jian Fang, Jianguo Xie:
Cloud-aided scalable revocable identity-based encryption scheme with ciphertext update. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j9]Changji Wang, Yuan Yuan, Jiayuan Wu:
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks. Sensors 17(6): 1446 (2017) - [j8]Jing Liu, Minmin Liu, Changji Wang, Shaowen Yao:
Group Rekeying in the Exclusive Subset-Cover Framework. Theor. Comput. Sci. 678: 63-77 (2017) - 2016
- [j7]Changji Wang, Dong-Yuan Shi, Xi-Lei Xu, Jian Fang:
An anonymous data access scheme for VANET using pseudonym-based cryptography. J. Ambient Intell. Humaniz. Comput. 7(1): 63-71 (2016) - 2015
- [j6]Changji Wang, Xi-Lei Xu, Dong-Yuan Shi, Jian Fang:
Privacy-preserving Cloud-based Personal Health Record System Using Attribute-based Encryption and Anonymous Multi-ReceiverIdentity-based Encryption. Informatica (Slovenia) 39(4) (2015) - 2013
- [j5]Changji Wang, Wentao Li:
An efficient attribute-based signature scheme with claim-predicate mechanism. Int. J. Grid Util. Comput. 4(2/3): 151-159 (2013) - [j4]Changji Wang, Xuan Liu, Wentao Li:
Design and implementation of a secure cloud-based personal health record system using ciphertext-policy attribute-based encryption. Int. J. Intell. Inf. Database Syst. 7(5): 389-399 (2013) - [j3]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Changji Wang:
Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7): 2427-2439 (2013) - 2012
- [j2]Changji Wang:
A provable secure fuzzy identity based signature scheme. Sci. China Inf. Sci. 55(9): 2139-2148 (2012) - 2009
- [j1]Changji Wang, Dongyang Long, Yong Tang:
An Efficient Certificateless Signature from Pairings. Int. J. Netw. Secur. 8(1): 96-100 (2009)
Conference and Workshop Papers
- 2024
- [c21]Changji Wang, Canjie Pan, Qingqing Gan, Zhen Liu, Ning Liu, Jingjing Zhang:
FedSCD: Federated Learning with Semi-centralization, Discrepancy-Awareness and Dual-Model Collaboration. ACISP (3) 2024: 174-192 - 2023
- [c20]Yuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang:
A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability. ISPEC 2023: 380-398 - 2017
- [c19]Changji Wang, Yuan Yuan, Shengyi Jiang:
P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. ICICS 2017: 399-411 - [c18]Changji Wang, Jiayuan Wu, Yuan Yuan, Jing Liu:
Insecurity of Cheng et al.'s Efficient Revocation in Ciphertext-Policy Attribute-Based Encryption Based Cryptographic Cloud Storage. ISPA/IUCC 2017: 1387-1393 - [c17]Changji Wang, Shengyi Jiang, Yuan Yuan:
Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks. SpaCCS 2017: 229-240 - 2016
- [c16]Changji Wang, Yuan Li, Shengyi Jiang, Jiayuan Wu:
An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme. SmartCom 2016: 506-515 - [c15]Changji Wang, Jian Fang, Jianguo Xie:
Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme. SpaCCS 2016: 251-264 - [c14]Changji Wang, Jiayuan Wu, Shengyi Jiang:
An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network. SpaCCS Workshops 2016: 288-296 - 2015
- [c13]Changji Wang, Jing Liu:
Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks. ICA3PP (Workshops and Symposiums) 2015: 521-530 - 2014
- [c12]Changji Wang:
An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings. CIS 2014: 440-444 - [c11]Changji Wang, Xi-Lei Xu, Yuan Li, Dong-Yuan Shi:
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks. Inscrypt 2014: 424-442 - 2013
- [c10]Changji Wang, Wentao Li, Yuan Li, Xi-Lei Xu:
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. CSS 2013: 377-386 - 2012
- [c9]Changji Wang, Xuan Liu, Wentao Li:
Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption. INCoS 2012: 8-14 - 2011
- [c8]Changji Wang, Jiasen Huang:
Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism. CIS 2011: 905-909 - 2008
- [c7]Qin Li, Dongyang Long, Changji Wang:
Secure Relativistic Bit Commitment with Fixed Channel Capacity. ICYCS 2008: 1522-1526 - [c6]Changji Wang, Rongbo Lu:
A Certificateless Restrictive Partially Blind Signature Scheme. IIH-MSP 2008: 279-282 - [c5]Changji Wang, Rongbo Lu:
An ID-based Transferable Off-line E-Cash System with Revokable Anonymity. ISECS 2008: 758-762 - 2007
- [c4]Changji Wang, Qin Li, Xingfeng Yang:
A Fair and Transferable Off-line Electronic Cash System with Multiple Banks. ICEBE 2007: 189-194 - [c3]Rongbo Lu, Dake He, Changji Wang:
On the Security of an Identity-Based Threshold Proxy Signature Scheme with Known Signers. ICNC (3) 2007: 210-214 - [c2]Rongbo Lu, Dake He, Changji Wang:
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings. SNPD (3) 2007: 285-290 - 2005
- [c1]Dan Wu, Dongyang Long, Changji Wang, Zhanpeng Guan:
Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy. ICA3PP 2005: 370-375
Informal and Other Publications
- 2011
- [i1]Jing Liu, Changji Wang:
Exclusive Key-Based Group Rekeying. IACR Cryptol. ePrint Arch. 2011: 575 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint