Follow
licheng wang
licheng wang
Verified email at bupt.edu.cn
Title
Cited by
Cited by
Year
Cryptographic primitives in blockchains
L Wang, X Shen, J Li, J Shao, Y Yang
Journal of Network and Computer Applications 127, 43-58, 2019
2402019
Mistore: a blockchain-based medical insurance storage system
L Zhou, L Wang, Y Sun
Journal of medical systems 42 (8), 149, 2018
2292018
Beekeeper: A blockchain-based iot system with secure storage and homomorphic computation
L Zhou, L Wang, Y Sun, P Lv
IEEE Access 6, 43472-43488, 2018
2012018
Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things
Q Huang, Y Yang, L Wang
IEEE Access 5, 12941-12950, 2017
1522017
Compressive sensing of medical images with confidentially homomorphic aggregations
L Wang, L Li, J Li, J Li, BB Gupta, X Liu
IEEE Internet of Things Journal 6 (2), 1402-1409, 2018
1192018
Proxy re-signature schemes without random oracles
J Shao, Z Cao, L Wang, X Liang
International Conference on Cryptology in India, 197-209, 2007
1112007
A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems
S Qiu, G Xu, H Ahmad, L Wang
IEEE access 6, 7452-7463, 2017
1032017
An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains
P Lv, L Wang, H Zhu, W Deng, L Gu
IEEE Access 7, 41309-41314, 2019
812019
New identity-based proxy re-encryption schemes to prevent collusion attacks
L Wang, L Wang, M Mambo, E Okamoto
International Conference on Pairing-Based Cryptography, 327-346, 2010
802010
Multi-use and unidirectional identity-based proxy re-encryption schemes
H Wang, Z Cao, L Wang
Information Sciences 180 (20), 4042-4059, 2010
792010
Key-policy attribute-based encryption with equality test in cloud computing
H Zhu, L Wang, H Ahmad, X Niu
IEEE Access 5, 20428-20439, 2017
782017
Simulatability and security of certificateless threshold signatures
L Wang, Z Cao, X Li, H Qian
Information Sciences 177 (6), 1382-1394, 2007
642007
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings.
Z Cao, X Dong, L Wang
IACR Cryptology ePrint Archive 2007, 9, 2007
622007
Prediction of rising stars in the game of cricket
H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang
IEEE Access 5, 4104-4124, 2017
582017
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing
J Li, X Wang, Z Huang, L Wang, Y Xiang
Journal of Parallel and Distributed Computing 130, 91-97, 2019
532019
A Survey on Personalized News Recommendation Technology
M Li, L Wang
IEEE Access 7, 145861-145879, 2019
522019
Lightweight Cryptographic Techniques for Automotive Cybersecurity
AK Jadoon, L Wang, T Li, MA Zia
Wireless Communications and Mobile Computing 2018, 2018
512018
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks
X Dong, L Wei, H Zhu, Z Cao, L Wang
IEEE Transactions on Vehicular Technology 60 (2), 580-591, 2010
512010
Secure and privacy-preserving data sharing and collaboration in mobile healthcare social networks of smart cities
Q Huang, L Wang, Y Yang
Security and Communication Networks 2017, 2017
472017
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
Q Huang, L Wang, Y Yang
World Wide Web 21 (1), 151-167, 2018
462018
The system can't perform the operation now. Try again later.
Articles 1–20