default search action
Qiaoyan Wen
Qiao-Yan Wen
Person information
- affiliation: Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
- affiliation (PhD 1997): Xidian University, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j182]Shengyao Wu, Runze Li, Yanqi Song, Sujuan Qin, Qiaoyan Wen, Fei Gao:
Quantum-Assisted Hierarchical Fuzzy Neural Network for Image Classification. IEEE Trans. Fuzzy Syst. 33(1): 491-502 (2025) - 2024
- [j181]Tengfei Tu, Hua Zhang, Bei Gong, Daizhong Du, Qiaoyan Wen:
Intelligent analysis of android application privacy policy and permission consistency. Artif. Intell. Rev. 57(7): 172 (2024) - [j180]Boqin Qin, Yilun Chen, Haopeng Liu, Hua Zhang, Qiaoyan Wen, Linhai Song, Yiying Zhang:
Understanding and Detecting Real-World Safety Issues in Rust. IEEE Trans. Software Eng. 50(6): 1306-1324 (2024) - [i27]Shengyao Wu, Runze Li, Yanqi Song, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
A Hierarchical Fused Quantum Fuzzy Neural Network for Image Classification. CoRR abs/2403.09318 (2024) - 2023
- [j179]Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Quantum Attacks on 1K-AES and PRINCE. Comput. J. 66(5): 1102-1110 (2023) - [j178]Hua Zhang, Xin Zhang, Ziqing Guo, Huawei Wang, Dong Cui, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool. IEEE Internet Things J. 10(14): 11985-11999 (2023) - [j177]Wenmin Li, Yang Chen, Fei Gao, Shuo Zhang, Hua Zhang, Qiaoyan Wen:
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain. IEEE Internet Things J. 10(14): 12090-12101 (2023) - [j176]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang, Mingchu Gao:
An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption for VANETs. IEEE Internet Things J. 10(20): 17881-17892 (2023) - [j175]Hong-Wei Sun, Chun-Yan Wei, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Improved BV-based quantum attack on block ciphers. Quantum Inf. Process. 22(1): 9 (2023) - [j174]Xue Zhang, Chunyan Wei, Sujuan Qin, Fei Gao, Qiaoyan Wen:
Practical efficient 1-out-of-n quantum oblivious transfer protocol. Quantum Inf. Process. 22(2): 99 (2023) - [j173]Yong-Mei Li, Hai-Ling Liu, Shijie Pan, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Quantum discriminative canonical correlation analysis. Quantum Inf. Process. 22(4): 163 (2023) - [j172]Hua Zhang, Shaohua Zhao, Ziqing Guo, Qiaoyan Wen, Wenmin Li, Fei Gao:
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds. IEEE Trans. Cloud Comput. 11(1): 308-323 (2023) - [i26]Zhenqiang Li, Fei Gao, Su-Juan Qin, Qiaoyan Wen:
New record in the number of qubits for a quantum implementation of AES. IACR Cryptol. ePrint Arch. 2023: 18 (2023) - [i25]Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Beyond-Birthday-Bound MACs. IACR Cryptol. ePrint Arch. 2023: 25 (2023) - [i24]Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Type-1 Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2023: 776 (2023) - 2022
- [j171]Ping Yu, Wei Ni, Hua Zhang, Ren Ping Liu, Qiaoyan Wen, Wenmin Li, Fei Gao:
Secure and Differentiated Fog-Assisted Data Access for Internet of Things. Comput. J. 65(8): 1948-1963 (2022) - [j170]Shaohua Zhao, Hua Zhang, Xin Zhang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Forward privacy multikeyword ranked search over encrypted database. Int. J. Intell. Syst. 37(10): 7356-7378 (2022) - [j169]Huawei Wang, Yiwei Liu, Peng Yin, Hua Zhang, Xin Xu, Qiaoyan Wen:
Label specificity attack: Change your label as I want. Int. J. Intell. Syst. 37(10): 7767-7786 (2022) - [j168]Yunping Gong, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
A rORAM scheme with logarithmic bandwidth and logarithmic locality. Int. J. Intell. Syst. 37(10): 8068-8091 (2022) - [j167]Haoran Gao, Hua Zhang, Xingguo Yang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Generating natural adversarial examples with universal perturbations for text classification. Neurocomputing 471: 175-182 (2022) - [j166]Fen-Zhuo Guo, Ze-Tian Lv, Shi-Hui Wei, Qiao-Yan Wen:
Effects of measurement dependence on 1-parameter family of Bell tests. Quantum Inf. Process. 21(1): 28 (2022) - [j165]Yongsheng Li, Tengfei Tu, Hua Zhang, JiShuai Li, Zhengping Jin, Qiaoyan Wen:
Sound Can Help Us See More Clearly. Sensors 22(2): 599 (2022) - [j164]JiShuai Li, Tengfei Tu, Yongsheng Li, Su-Juan Qin, Yijie Shi, Qiaoyan Wen:
DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Networks. Sensors 22(3): 1061 (2022) - [j163]Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. IEEE Syst. J. 16(1): 1460-1470 (2022) - [j162]Ping Yu, Wei Ni, Ren Ping Liu, Zhaoxin Zhang, Hua Zhang, Qiaoyan Wen:
Efficient Encrypted Range Query on Cloud Platforms. ACM Trans. Cyber Phys. Syst. 6(3): 27:1-27:23 (2022) - [j161]Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, Huawei Wang:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15(2): 724-735 (2022) - [j160]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. IEEE Trans. Serv. Comput. 15(4): 1813-1824 (2022) - [c42]Miao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang:
Jasmine: A Static Analysis Framework for Spring Core Technologies. ASE 2022: 60:1-60:13 - 2021
- [j159]Hao Lin, Zhen Zhao, Fei Gao, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi:
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage. Comput. J. 64(8): 1226-1238 (2021) - [j158]Li Liu, Fen-Zhuo Guo, Qiao-Yan Wen:
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources. Quantum Inf. Process. 20(12): 392 (2021) - [j157]Ping Yu, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, Qiaoyan Wen:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 6638453:1-6638453:14 (2021) - [j156]Chao-Hua Yu, Fei Gao, Qiao-Yan Wen:
An Improved Quantum Algorithm for Ridge Regression. IEEE Trans. Knowl. Data Eng. 33(3): 858-866 (2021) - [j155]Hua Zhang, Ziqing Guo, Shaohua Zhao, Qiaoyan Wen:
Privacy-Preserving Linear Region Search Service. IEEE Trans. Serv. Comput. 14(1): 207-221 (2021) - [j154]Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen:
A Secure Online Treatment Blockchain Service. Wirel. Pers. Commun. 117(3): 1773-1795 (2021) - 2020
- [j153]Hua Zhang, Xueqi Jin, Ying Li, Zhengwei Jiang, Ye Liang, Zhengping Jin, Qiaoyan Wen:
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System. IEEE Access 8: 1031-1047 (2020) - [j152]Jiawei Qin, Hua Zhang, Jing Guo, Senmiao Wang, Qiaoyan Wen, Yijie Shi:
Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions. IEEE Access 8: 106437-106451 (2020) - [j151]Caijun Sun, Hua Zhang, Su-Juan Qin, Jiawei Qin, Yijie Shi, Qiaoyan Wen:
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps. IEEE Access 8: 167460-167474 (2020) - [j150]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang, Mingchu Gao:
A new provably secure certificateless signature scheme for Internet of Things. Ad Hoc Networks 100: 102074 (2020) - [j149]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j148]Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra:
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage. Comput. J. 63(8): 1216-1230 (2020) - [j147]Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. Comput. J. 63(12): 1886-1903 (2020) - [j146]Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020) - [j145]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A survey on the security of blockchain systems. Future Gener. Comput. Syst. 107: 841-853 (2020) - [j144]Chun-Yan Wei, Xiao-Qiu Cai, Tian-Yin Wang, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Error Tolerance Bound in QKD-Based Quantum Private Query. IEEE J. Sel. Areas Commun. 38(3): 517-527 (2020) - [j143]Xinhui Li, Yukun Wang, Yunguang Han, Su-Juan Qin, Fei Gao, Qiaoyan Wen:
Self-Testing of Symmetric Three-Qubit States. IEEE J. Sel. Areas Commun. 38(3): 589-597 (2020) - [j142]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively secure broadcast encryption with authenticated content distributors. Multim. Tools Appl. 79(11-12): 7889-7910 (2020) - [j141]Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis:
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 20(16): 4651 (2020) - [j140]Shuo Zhang, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. Sensors 20(23): 6962 (2020) - [j139]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". IEEE Trans. Inf. Forensics Secur. 15: 2584-2586 (2020) - [j138]Hua Zhang, Boqin Qin, Tengfei Tu, Ziqing Guo, Fei Gao, Qiaoyan Wen:
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications. IEEE Trans. Ind. Informatics 16(1): 658-668 (2020) - [j137]Shuo Zhang, Wenmin Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wirel. Pers. Commun. 114(4): 2783-2800 (2020) - [e1]Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou:
Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers. Communications in Computer and Information Science 1299, Springer 2020, ISBN 978-981-33-4921-6 [contents]
2010 – 2019
- 2019
- [j136]Zhidan Li, Wenmin Li, Zhengping Jin, Hua Zhang, Qiaoyan Wen:
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. IEEE Access 7: 29023-29037 (2019) - [j135]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang:
An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network. IEEE Access 7: 42683-42693 (2019) - [j134]Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang:
A Robust Authentication Scheme for Multiple Servers Architecture. IEEE Access 7: 111222-111231 (2019) - [j133]Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang:
Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture. IEEE Access 7: 161340-161349 (2019) - [j132]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j131]Wei Guo, Hua Zhang, Su-Juan Qin, Fei Gao, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener. Comput. Syst. 95: 309-322 (2019) - [j130]Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. Future Gener. Comput. Syst. 100: 797-810 (2019) - [j129]Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li:
Authenticated public key broadcast encryption with short ciphertexts. Multim. Tools Appl. 78(16): 23399-23414 (2019) - [j128]Fen-Zhuo Guo, Li Liu, Ankang Wang, Qiao-Yan Wen:
Practical covert quantum key distribution with decoy-state method. Quantum Inf. Process. 18(4): 95 (2019) - [j127]Dandan Li, Fei Gao, Ya Cao, Qiao-Yan Wen:
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities. Quantum Inf. Process. 18(4): 123 (2019) - [j126]Lv-Jun Li, Fei Gao, Zhi-Chao Zhang, Qiao-Yan Wen:
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC. Quantum Inf. Process. 18(11): 330 (2019) - [j125]Huawei Wang, Dianli Guo, Hua Zhang, Qiaoyan Wen:
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity. Sensors 19(14): 3144 (2019) - [j124]Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j123]Ping Yu, Qiaoyan Wen, Wei Ni, Wenmin Li, Caijun Sun, Hua Zhang, Zhengping Jin:
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System. Wirel. Pers. Commun. 106(2): 719-738 (2019) - [i23]Yusen Wu, Chao-Hua Yu, Su-Juan Qin, Qiaoyan Wen, Fei Gao:
Bayesian machine learning for Boltzmann machine in quantum-enhanced feature spaces. CoRR abs/1912.10857 (2019) - [i22]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2018
- [j122]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Anti-Quantum Transaction Authentication Approach in Blockchain. IEEE Access 6: 5393-5401 (2018) - [j121]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Zhengping Jin, Wenmin Li:
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method. IEEE Access 6: 33986-33994 (2018) - [j120]Yang Chen, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. IEEE Access 6: 58955-58966 (2018) - [j119]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j118]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang:
A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings. IEEE Access 6: 73846-73855 (2018) - [j117]Ziqing Guo, Hua Zhang, Caijun Sun, Qiaoyan Wen, Wenmin Li:
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137: 380-395 (2018) - [j116]Dan-dan Li, Fei Gao, Su-Juan Qin, Qiao-Yan Wen:
Perfect quantum multiple-unicast network coding protocol. Quantum Inf. Process. 17(1): 13 (2018) - [j115]Su-Juan Qin, Yukun Wang, Runze Li, Fei Gao, Qiao-Yan Wen:
The randomness in 2 → 1 quantum random access code without a shared reference frame. Quantum Inf. Process. 17(10): 276 (2018) - [j114]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [j113]Wenmin Li, Qiaoyan Wen, Xuelei Li, Debiao He:
Attribute-based fuzzy identity access control in multicloud computing environments. Soft Comput. 22(12): 4071-4082 (2018) - [j112]Lu Rao, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security. Wirel. Commun. Mob. Comput. 2018: 4186243:1-4186243:19 (2018) - [j111]Wenmin Li, Shuo Zhang, Qi Su, Qiaoyan Wen, Yang Chen:
An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems. Wirel. Commun. Mob. Comput. 2018: 8131367:1-8131367:12 (2018) - [c41]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. ISPEC 2018: 559-577 - [i21]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A Survey on the Security of Blockchain Systems. CoRR abs/1802.06993 (2018) - [i20]Ziqing Guo, Hua Zhang, Xin Zhang, Zhengping Jin, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool. CoRR abs/1812.08603 (2018) - [i19]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - 2017
- [j110]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. Comput. Secur. 69: 50-64 (2017) - [j109]Ping Zhu, Huiyang Xie, Qiaoyan Wen:
Rough approximations based on bisimulations. Int. J. Approx. Reason. 81: 49-62 (2017) - [j108]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Ping Zheng:
Identity Based Proxy Re-encryption Scheme under LWE. KSII Trans. Internet Inf. Syst. 11(12): 6116-6132 (2017) - [j107]Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen:
Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017) - [j106]Wenmin Li, Xuelei Li, Qiao-Yan Wen, Shuo Zhang, Hua Zhang:
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System. J. Comput. Sci. Technol. 32(5): 974-990 (2017) - [j105]Guang-Bao Xu, Qiao-Yan Wen, Fei Gao, Su-Juan Qin, Huijuan Zuo:
Local indistinguishability of multipartite orthogonal product bases. Quantum Inf. Process. 16(11): 276 (2017) - [j104]Tengfei Tu, Lu Rao, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. Secur. Commun. Networks 2017: 4603237:1-4603237:17 (2017) - [j103]Ping Zhu, Huiyang Xie, Qiaoyan Wen:
A unified view of consistent functions. Soft Comput. 21(9): 2189-2199 (2017) - [j102]Jie Xu, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He:
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput. 21(18): 5265-5279 (2017) - [c40]Ya-Jun Fan, Xue-Song Qiu, Qiao-Yan Wen:
A privacy-preserving authenticated key agreement protocol with smart cards for mobile emergency services. CSCWD 2017: 227-232 - 2016
- [j101]Haiyan Sun, Qiaoyan Wen, Wenmin Li:
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci. China Inf. Sci. 59(3): 32109:1-32109:16 (2016) - [j100]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. Comput. J. 59(7): 955-969 (2016) - [j99]Rui Wang, Qiaoyan Wen, Hua Zhang, Xuelei Li:
A Novel Protocol-Feature Attack against Tor's Hidden Service. IEICE Trans. Inf. Syst. 99-D(4): 839-849 (2016) - [j98]Rui Wang, Qiaoyan Wen, Hua Zhang, Su-Juan Qin, Wenmin Li:
Transparent Discovery of Hidden Service. IEICE Trans. Inf. Syst. 99-D(11): 2817-2820 (2016) - [j97]Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang:
Linear complexity of generalised cyclotomic quaternary sequences of length 2p m+1 q n+1. IET Inf. Secur. 10(2): 104-111 (2016) - [j96]Tian-Qing Cao, Fei Gao, Ying-Hui Yang, Zhi-Chao Zhang, Qiao-Yan Wen:
Determination of locally perfect discrimination for two-qubit unitary operations. Quantum Inf. Process. 15(1): 529-549 (2016) - [j95]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively Secure Broadcast Encryption With Constant Ciphertexts. IEEE Trans. Broadcast. 62(3): 709-715 (2016) - [j94]Jie Xu, Qiaoyan Wen, Wenmin Li, Zhengping Jin:
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 27(1): 119-129 (2016) - [j93]Xuelei Li, Qiaoyan Wen, Wenmin Li:
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications. Wirel. Pers. Commun. 86(3): 1593-1610 (2016) - [c39]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. ACISP (2) 2016: 170-186 - 2015
- [j92]Bin Liu, Fei Gao, Wei Huang, Dan Li, Qiaoyan Wen:
Controlling the key by choosing the detection bits in quantum cryptographic protocols. Sci. China Inf. Sci. 58(11): 1-11 (2015) - [j91]Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers Comput. Sci. 9(1): 142-156 (2015) - [j90]Dandan Li, Qiaoyan Wen, Jie Zhang, Liying Jiang:
Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2pm+1qn+1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(6): 1244-1254 (2015) - [j89]