default search action
Licheng Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j162]Xiaoya Hu, Licheng Wang, Lize Gu, Yuqiao Ning:
A Bilateral Access Control Data Sharing Scheme for Internet of Vehicles. IEEE Internet Things J. 11(22): 36748-36762 (2024) - [j161]Shanshan Zheng, Shuai Liu, Licheng Wang:
Event-triggered distributed optimization for model-free multi-agent systems. Frontiers Inf. Technol. Electron. Eng. 25(2): 214-224 (2024) - [j160]Xiaoya Hu, Guojun Huang, Yuqiao Ning, Licheng Wang, Jingwen Suo, Kaoru Ota, Juyuan Zhang:
A Lightweight and Confidential Communication Scheme for On-Vehicle ECUs. IEEE Netw. 38(3): 34-40 (2024) - [j159]Haotian Deng, Chuan Zhang, Weiting Zhang, Jinwen Liang, Licheng Wang, Liehuang Zhu:
IoTAuth: A Decentralized Cross-Chain Identity Authentication Scheme for 6G Non-Terrestrial IoT Networks. IEEE Netw. 38(4): 55-62 (2024) - [j158]Xingyu Yan, Licheng Wang, Lize Gu, Ziyi Li, Jingwen Suo:
Post-quantum κ-to-1 trapdoor claw-free functions from extrapolated dihedral cosets. Quantum Inf. Process. 23(5): 188 (2024) - [j157]Licheng Wang, Zidong Wang, Di Zhao, Yang Liu, Guoliang Wei:
Recursive Filtering for Discrete-Time Stochastic Complex Networks Under Bit-Rate Constraints: A Locally Minimum Variance Approach. IEEE Trans. Autom. Control. 69(5): 3441-3448 (2024) - [j156]Junke Duan, Shihui Zheng, Wei Wang, Licheng Wang, Xiaoya Hu, Lize Gu:
Concise RingCT Protocol Based on Linkable Threshold Ring Signature. IEEE Trans. Dependable Secur. Comput. 21(5): 5014-5028 (2024) - [j155]Beibei Li, Youtong Chen, Lei Zhang, Licheng Wang, Yanyu Cheng:
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes. IEEE Trans. Inf. Forensics Secur. 19: 4780-4793 (2024) - [j154]Wei Wang, Licheng Wang, Junke Duan, Xiaofei Tong, Haipeng Peng:
Redactable Blockchain Based on Decentralized Trapdoor Verifiable Delay Functions. IEEE Trans. Inf. Forensics Secur. 19: 7492-7507 (2024) - [j153]Junke Duan, Wei Wang, Licheng Wang, Lize Gu:
Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature. IEEE Trans. Inf. Forensics Secur. 19: 7560-7572 (2024) - [j152]Junke Duan, Lize Gu, Wei Wang, Licheng Wang:
Chainknot: Redactable Blockchain Protocol With Forced Synchronization. IEEE Trans. Netw. Sci. Eng. 11(3): 3091-3104 (2024) - [i26]Licheng Wang, Luochen Xie, Gang Huang, Changsen Feng:
Identifying the Largest RoCoF and Its Implications. CoRR abs/2404.01609 (2024) - 2023
- [j151]Licheng Wang, Zidong Wang, Di Zhao, Guoliang Wei:
Stabilization of linear discrete-time systems over resource-constrained networks under dynamical multiple description coding scheme. Autom. 156: 111160 (2023) - [j150]Jingwen Suo, Lize Gu, Xingyu Yan, Sijia Yang, Xiaoya Hu, Licheng Wang:
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem. BMC Bioinform. 24(1): 34 (2023) - [j149]Jianhua Yan, Xiuhua Lu, Muzi Li, Licheng Wang, Jingxian Zhou, Wenbin Yao:
Practical NTRU Signcryption in the Standard Model. Entropy 25(12): 1651 (2023) - [j148]Wei Wang, Junke Duan, Licheng Wang, Xiaoya Hu, Haipeng Peng:
Strongly Synchronized Redactable Blockchain Based on Verifiable Delay Functions. IEEE Internet Things J. 10(19): 16778-16792 (2023) - [j147]Licheng Wang, Jinxin Lu, Ronglei Zhou, Gaohui Duan, Zhongming Wen:
Analysis of Soil Moisture Change Characteristics and Influencing Factors of Grassland on the Tibetan Plateau. Remote. Sens. 15(2): 298 (2023) - [j146]Xiaoying Shen, Zhen Wang, Baocang Wang, Licheng Wang, Qingqi Pei:
A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server. IEEE Syst. J. 17(4): 6413-6424 (2023) - [j145]Shuai Liu, Zidong Wang, Licheng Wang, Guoliang Wei:
Finite-Horizon $H_{\infty }$ Filtering via a High-Rate Network With the FlexRay Protocol. IEEE Trans. Autom. Control. 68(6): 3596-3603 (2023) - [j144]Qi Luo, Shuai Liu, Licheng Wang, Engang Tian:
Privacy-Preserved Distributed Optimization for Multi-Agent Systems With Antagonistic Interactions. IEEE Trans. Circuits Syst. I Regul. Pap. 70(3): 1350-1360 (2023) - [j143]Di Zhao, Zidong Wang, Licheng Wang, Guoliang Wei:
Proportional-Integral Observer Design for Multirate-Networked Systems Under Constrained Bit Rate: An Encoding-Decoding Mechanism. IEEE Trans. Cybern. 53(7): 4280-4291 (2023) - [j142]Junke Duan, Licheng Wang, Wei Wang, Lize Gu:
TRCT: A Traceable Anonymous Transaction Protocol for Blockchain. IEEE Trans. Inf. Forensics Secur. 18: 4391-4405 (2023) - [j141]Hui Chen, Engang Tian, Licheng Wang, Shuai Liu:
A Joint Online Strategy of Measurement Outliers Diagnosis and State of Charge Estimation for Lithium-Ion Batteries. IEEE Trans. Ind. Informatics 19(5): 6387-6397 (2023) - [j140]Zhenrong Zhang, Jiefeng Ma, Jun Du, Licheng Wang, Jianshu Zhang:
Multimodal Pre-Training Based on Graph Attention Network for Document Understanding. IEEE Trans. Multim. 25: 6743-6755 (2023) - [j139]Engang Tian, Hui Chen, Changsong Wang, Licheng Wang:
Security-Ensured State of Charge Estimation of Lithium-Ion Batteries Subject to Malicious Attacks. IEEE Trans. Smart Grid 14(3): 2250-2261 (2023) - [j138]Licheng Wang, Luochen Xie, Yu Yang, Youbing Zhang, Kai Wang, Shijie Cheng:
Distributed Online Voltage Control With Fast PV Power Fluctuations and Imperfect Communication. IEEE Trans. Smart Grid 14(5): 3681-3695 (2023) - [j137]Xiaoya Hu, Ruiqin Li, Licheng Wang, Yuqiao Ning, Kaoru Ota:
A Data Sharing Scheme Based on Federated Learning in IoV. IEEE Trans. Veh. Technol. 72(9): 11644-11656 (2023) - [c32]Chuan Zhang, Haotian Liang, Zhuopeng Li, Tong Wu, Licheng Wang, Liehuang Zhu:
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples. EISA 2023: 1-19 - [i25]Licheng Wang, Tao Wang, Gang Huang, Ruifeng Yan, Kai Wang, Youbing Zhang, Shijie Cheng:
A Soft Coordination Method of Heterogeneous Devices in Distribution System Voltage Control. CoRR abs/2305.02596 (2023) - 2022
- [j136]Licheng Wang, Hui Chen:
Event-based joint state and fault estimation: The envelope-constrained H∞ criterion. Appl. Math. Comput. 419: 126873 (2022) - [j135]Sijia Yang, Haoyi Xiong, Yunchao Zhang, Yi Ling, Licheng Wang, Kaibo Xu, Zeyi Sun:
OGM: Online gaussian graphical models on the fly. Appl. Intell. 52(3): 3103-3117 (2022) - [j134]Guangyao Zhang, Licheng Wang, Weixi Xie, Furong Shang, Xinlu Xia, Chunlin Jiang, Xianwen Wang:
"This article is interesting, however": exploring the language use in the peer review comment of articles published in the BMJ. Aslib J. Inf. Manag. 74(3): 399-416 (2022) - [j133]Licheng Wang, Zidong Wang, Di Zhao, Guoliang Wei:
Event-based state estimation under constrained bit rate: An encoding-decoding approach. Autom. 143: 110421 (2022) - [j132]Haibo Hong, Jun Shao, Licheng Wang, Mande Xie, Guiyi Wei, Yixian Yang, Song Han, Jianhong Lin:
A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65(1) (2022) - [j131]Xiaofei Tong, Jingguo Bi, Yufei Duan, Lixiang Li, Licheng Wang:
Security Analysis of DBTRU Cryptosystem. Entropy 24(10): 1349 (2022) - [j130]Licheng Wang, Di Zhao, Yuhan Zhang, Derui Ding, Xiao-jian Yi:
Gain-scheduled state estimation for discrete-time complex networks under bit-rate constraints. Neurocomputing 488: 120-129 (2022) - [j129]Licheng Wang, Di Zhao, Yu-Ang Wang, Derui Ding, Hongjian Liu:
Partial-neurons-based state estimation for artificial neural networks under constrained bit rate: The finite-time case. Neurocomputing 488: 144-153 (2022) - [j128]Licheng Wang, Shuai Liu, Yuhan Zhang, Derui Ding, Xiao-jian Yi:
Non-fragile l2-l∞ state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach. Int. J. Syst. Sci. 53(10): 2247-2259 (2022) - [j127]Xiaoying Shen, Baocang Wang, Licheng Wang, Pu Duan, Benyu Zhang:
Group public key encryption supporting equality test without bilinear pairings. Inf. Sci. 605: 202-224 (2022) - [j126]Justice Odoom, Xiaofang Huang, Licheng Wang:
Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting. J. Syst. Archit. 129: 102600 (2022) - [j125]Xingyu Yan, Lize Gu, Jingwen Suo, Licheng Wang:
Leveraging the hardness of dihedral coset problem for quantum cryptography. Quantum Inf. Process. 21(9): 308 (2022) - [j124]Licheng Wang, Engang Tian, Changsong Wang, Shuai Liu:
Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments. IEEE Trans. Circuits Syst. I Regul. Pap. 69(10): 4237-4247 (2022) - [j123]Shuai Liu, Zidong Wang, Licheng Wang, Guoliang Wei:
H∞ Pinning Control of Complex Dynamical Networks Under Dynamic Quantization Effects: A Coupled Backward Riccati Equation Approach. IEEE Trans. Cybern. 52(8): 7377-7387 (2022) - [j122]Hui Chen, Engang Tian, Licheng Wang:
State-of-Charge Estimation of Lithium-Ion Batteries Subject to Random Sensor Data Unavailability: A Recursive Filtering Approach. IEEE Trans. Ind. Electron. 69(5): 5175-5184 (2022) - [j121]Shuai Liu, Zidong Wang, Licheng Wang, Guoliang Wei:
Recursive Set-Membership State Estimation Over a FlexRay Network. IEEE Trans. Syst. Man Cybern. Syst. 52(6): 3591-3601 (2022) - [c31]Wei Wu, Haipeng Peng, Lixiang Li, Harry Eugene Stanley, Licheng Wang, Jürgen Kurths:
A Novel Intelligent Ant Colony System Based on Blockchain. ICSI (1) 2022: 230-246 - [i24]Zhenrong Zhang, Jiefeng Ma, Jun Du, Licheng Wang, Jianshu Zhang:
Multimodal Pre-training Based on Graph Attention Network for Document Understanding. CoRR abs/2203.13530 (2022) - [i23]Xingyu Yan, Licheng Wang, Weiqiang Wen, Ziyi Li, Jingwen Suo, Lize Gu:
Post-Quantum κ-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets. CoRR abs/2211.16993 (2022) - [i22]You Zhou, Zongyang Zhang, Haibin Zhang, Sisi Duan, Bin Hu, Licheng Wang, Jianwei Liu:
Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency. IACR Cryptol. ePrint Arch. 2022: 1709 (2022) - 2021
- [j120]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Dong Xie:
Pairing-Free for Public Key Encryption With Equality Test Scheme. IEEE Access 9: 77239-77249 (2021) - [j119]Sijia Yang, Haoyi Xiong, Kaibo Xu, Licheng Wang, Jiang Bian, Zeyi Sun:
Improving covariance-regularized discriminant analysis for EHR-based predictive analytics of diseases. Appl. Intell. 51(1): 377-395 (2021) - [j118]Kai Wang, Chunli Liu, Jianrui Sun, Kun Zhao, Licheng Wang, Jinyan Song, Chongxiong Duan, Liwei Li:
State of Charge Estimation of Composite Energy Storage Systems with Supercapacitors and Lithium Batteries. Complex. 2021: 8816250:1-8816250:15 (2021) - [j117]Linlin Liu, Guoliang Wei, Licheng Wang:
Pinning Synchronization Control for a Class of Dynamical Networks with Coupled Time-Varying Delays: An Interval-Observer-Based Approach. Circuits Syst. Signal Process. 40(1): 154-173 (2021) - [j116]Ahmer Khan Jadoon, Jing Li, Licheng Wang:
Physical layer authentication for automotive cyber physical systems based on modified HB protocol. Frontiers Comput. Sci. 15(3): 153809 (2021) - [j115]Ping Pan, Junzhi Ye, Yun Pan, Lize Gu, Licheng Wang:
New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups. Inf. 12(8): 294 (2021) - [j114]Lichuan Ma, Qingqi Pei, Lu Zhou, Haojin Zhu, Licheng Wang, Yusheng Ji:
Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence. IEEE Internet Things J. 8(8): 6757-6770 (2021) - [j113]Xin Li, Guoliang Wei, Licheng Wang:
Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach. Inf. Sci. 547: 49-67 (2021) - [j112]Sijia Yang, Haoyi Xiong, Di Hu, Kaibo Xu, Licheng Wang, Peizhen Zhu, Zeyi Sun:
Generalising combinatorial discriminant analysis through conditioning truncated Rayleigh flow. Knowl. Inf. Syst. 63(8): 2189-2208 (2021) - [j111]Xiaoying Shen, Licheng Wang, Qingqi Pei, Yuan Liu, Miaomiao Li:
Location privacy-preserving in online taxi-hailing services. Peer-to-Peer Netw. Appl. 14(1): 69-81 (2021) - [j110]Yunhong Zhou, Jiehui Nan, Licheng Wang:
Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things. Secur. Commun. Networks 2021: 6649119:1-6649119:14 (2021) - [j109]Licheng Wang, Zidong Wang, Bo Shen, Guoliang Wei:
Recursive Filtering With Measurement Fading: A Multiple Description Coding Scheme. IEEE Trans. Autom. Control. 66(11): 5144-5159 (2021) - [j108]Yun Chen, Zidong Wang, Licheng Wang, Weiguo Sheng:
Finite-Horizon H∞ State Estimation for Stochastic Coupled Networks With Random Inner Couplings Using Round-Robin Protocol. IEEE Trans. Cybern. 51(3): 1204-1215 (2021) - [j107]Jiang Bian, Sijia Yang, Haoyi Xiong, Licheng Wang, Yanjie Fu, Zeyi Sun, Zhishan Guo, Jun Wang:
CRLEDD: Regularized Causalities Learning for Early Detection of Diseases Using Electronic Health Record (EHR) Data. IEEE Trans. Emerg. Top. Comput. Intell. 5(4): 541-553 (2021) - [j106]Zhenhui Tang, Engang Tian, Yongxiong Wang, Licheng Wang, Taicheng Yang:
Nondestructive Defect Detection in Castings by Using Spatial Attention Bilinear Convolutional Neural Network. IEEE Trans. Ind. Informatics 17(1): 82-89 (2021) - [j105]Qi Guan, Guoliang Wei, Licheng Wang, Yan Song:
A Novel Feature Points Tracking Algorithm in Terms of IMU-Aided Information Fusion. IEEE Trans. Ind. Informatics 17(8): 5304-5313 (2021) - [j104]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi, Chalee Vorakulpipat:
On Achieving Trustworthy Service Function Chaining. IEEE Trans. Netw. Serv. Manag. 18(3): 3140-3153 (2021) - [c30]Licheng Wang, Yougen Xu, Zhiwen Liu:
A Closed-Form Target Localization Method for FDA-MIMO Based on root-MUSIC and ESPRIT Algorithm. SSPS 2021: 19-24 - 2020
- [j103]Xiaoying Shen, Licheng Wang, Huijun Zhu, Yuan Liu:
A Multivariate Public Key Encryption Scheme With Equality Test. IEEE Access 8: 75463-75472 (2020) - [j102]Ping Pan, Yun Pan, Zhen Wang, Licheng Wang:
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik's Cubes. IEEE Access 8: 122251-122258 (2020) - [j101]Yunhong Zhou, Shihui Zheng, Licheng Wang:
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud. Cryptogr. 4(4): 28 (2020) - [j100]Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang:
Public Key Encryption with Keyword Search in Cloud: A Survey. Entropy 22(4): 421 (2020) - [j99]Yuan Liu, Licheng Wang, Xiaoying Shen, Lixiang Li:
New Constructions of Identity-Based Dual Receiver Encryption from Lattices. Entropy 22(6): 599 (2020) - [j98]Xiaoya Hu, Hong Zhao, Shihui Zheng, Licheng Wang:
CBOL: Cross-Bank Over-Loan Prevention, Revisited. Entropy 22(6): 619 (2020) - [j97]Hong Zhao, Xue Bai, Shihui Zheng, Licheng Wang:
RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service. Entropy 22(7): 712 (2020) - [j96]Yuan Zhang, Yuan Liu, Yurong Guo, Shihui Zheng, Licheng Wang:
Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters. Entropy 22(11): 1247 (2020) - [j95]Xin Tian, Guoliang Wei, Licheng Wang, Jun Zhou:
Wireless-sensor-network-based target localization: A semidefinite relaxation approach with adaptive threshold correction. Neurocomputing 405: 229-238 (2020) - [j94]Guoliang Wei, Linlin Liu, Licheng Wang, Derui Ding:
Event-triggered control for discrete-time systems with unknown nonlinearities: an interval observer-based approach. Int. J. Syst. Sci. 51(6): 1019-1031 (2020) - [j93]Song Han, Jianhong Lin, Shuai Zhao, Guangquan Xu, Siqi Ren, Daojing He, Licheng Wang, Leyun Shi:
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing. IEEE Internet Things J. 7(8): 7550-7563 (2020) - [j92]Guochen Niu, Licheng Wang, Zheng Tan:
Mismatch Removal Based on Gaussian Mixture Model for Aircraft Surface Texture Mapping. Inf. Technol. Control. 49(1): 80-87 (2020) - [j91]Lili Xu, Sunjie Zhang, Licheng Wang:
Distributed resilient filtering of large-scale systems with channel scheduling. Kybernetika 56(1): 170-188 (2020) - [j90]Jingwen Suo, Licheng Wang, Sijia Yang, Wenjie Zheng, Jiankang Zhang:
Quantum algorithms for typical hard problems: a perspective of cryptanalysis. Quantum Inf. Process. 19(6): 178 (2020) - [j89]Yuan Liu, Licheng Wang, Xiaoying Shen, Lixiang Li, Dezhi An:
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes. Secur. Commun. Networks 2020: 2345369:1-2345369:11 (2020) - [j88]Yun Chen, Zidong Wang, Licheng Wang, Weiguo Sheng:
Mixed $H_2/H_\infty$ State Estimation for Discrete-Time Switched Complex Networks With Random Coupling Strengths Through Redundant Channels. IEEE Trans. Neural Networks Learn. Syst. 31(10): 4130-4142 (2020) - [c29]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424 - [c28]Qi Kang, Ji Liu, Sijia Yang, Haoyi Xiong, Haozhe An, Xingjian Li, Zhi Feng, Licheng Wang, Dejing Dou:
Quasi-optimal Data Placement for Secure Multi-tenant Data Federation on the Cloud. IEEE BigData 2020: 1954-1963 - [c27]Cong Wang, Chen Chen, Qingqi Pei, Licheng Wang:
IDDS: An ICN based Data Dissemination Scheme for Vehicular Networks. ICC 2020: 1-7 - [i21]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. IACR Cryptol. ePrint Arch. 2020: 245 (2020)
2010 – 2019
- 2019
- [b1]Licheng Wang:
Impacts of large-scale PV integration on power distribution systems and investigation of possible solutions. University of Queensland, Australia, 2019 - [j87]Yuan Liu, Licheng Wang, Lixiang Li, Xixi Yan:
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices. IEEE Access 7: 3665-3674 (2019) - [j86]Yonggang Li, Yun Wu, Chaoyuan Cui, Licheng Wang:
RMVP: A Real-Time Method to Monitor Random Processes of Virtual Machine. IEEE Access 7: 15845-15860 (2019) - [j85]Zhanqiang Liu, Licheng Wang, Xianmin Wang, Xiaoying Shen, Lixiang Li:
Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting. IEEE Access 7: 36516-36526 (2019) - [j84]Licheng Wang, Yanmei Tian, Yun Pan, Yixian Yang:
New Construction of Blind Signatures From Braid Groups. IEEE Access 7: 36549-36557 (2019) - [j83]Pin Lv, Licheng Wang, Huijun Zhu, Wenbo Deng, Lize Gu:
An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains. IEEE Access 7: 41309-41314 (2019) - [j82]Jianhua Yan, Licheng Wang, Muzi Li, Haseeb Ahmad, Jun Yue, Wenbin Yao:
Attribute-Based Signcryption From Lattices in the Standard Model. IEEE Access 7: 56039-56050 (2019) - [j81]Miaomiao Li, Licheng Wang:
A Survey on Personalized News Recommendation Technology. IEEE Access 7: 145861-145879 (2019) - [j80]Sijia Yang, Jiang Bian, Licheng Wang, Haojin Zhu, Yanjie Fu, Haoyi Xiong:
EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing. IEEE Access 7: 1495122-95131 (2019) - [j79]Licheng Wang, Jingwen Suo, Yun Pan, Lixiang Li:
DDmap: a MATLAB package for the double digest problem using multiple genetic operators. BMC Bioinform. 20(1): 348:1-348:12 (2019) - [j78]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [j77]Yinuo Huang, Licheng Wang, Kai Wang:
Investigation of Var Compensation Schemes in Unbalanced Distribution Systems. Complex. 2019: 7824743:1-7824743:13 (2019) - [j76]Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, Jin Li:
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j75]Licheng Wang, Lixiang Li, Jin Li, Jing Li, Brij B. Gupta, Xia Liu:
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations. IEEE Internet Things J. 6(2): 1402-1409 (2019) - [j74]Licheng Wang, Yan Meng, Haojin Zhu, Minxing Tang, Kaoru Ota:
Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT. IEEE Internet Things J. 6(4): 7282-7292 (2019) - [j73]Licheng Wang, Zidong Wang, Guoliang Wei, Fuad E. Alsaadi:
Variance-constrained H∞ state estimation for time-varying multi-rate systems with redundant channels: The finite-horizon case. Inf. Sci. 501: 222-235 (2019) - [j72]Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang:
Cryptographic primitives in blockchains. J. Netw. Comput. Appl. 127: 43-58 (2019) - [j71]Jing Li, Xianmin Wang, Zhengan Huang, Licheng Wang, Yang Xiang:
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J. Parallel Distributed Comput. 130: 91-97 (2019) - [j70]Licheng Wang, Zidong Wang, Guoliang Wei, Fuad E. Alsaadi:
Observer-Based Consensus Control for Discrete-Time Multiagent Systems With Coding-Decoding Communication Protocol. IEEE Trans. Cybern. 49(12): 4335-4345 (2019) - [c26]Zhi Feng, Jun Huan, Haoyi Xiong, Chuanyuan Song, Sijia Yang, Baoxin Zhao, Licheng Wang, Zeyu Chen, Shengwen Yang, Liping Liu:
SecureGBM: Secure Multi-Party Gradient Boosting. IEEE BigData 2019: 1312-1321 - [c25]Xue Bai, Licheng Wang, Lijing Zhou, Sijia Yang, Lixiang Li:
RZcash: A Privacy Protection Scheme for the Account-based Blockchain. PST 2019: 1-9 - [c24]Xiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, Sijia Yang:
A blockchain-based loan over-prevention mechanism. PST 2019: 1-9 - [c23]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi:
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. SecureComm (2) 2019: 287-301 - [i20]Zhi Feng, Haoyi Xiong, Chuanyuan Song, Sijia Yang, Baoxin Zhao, Licheng Wang, Zeyu Chen, Shengwen Yang, Liping Liu, Jun Huan:
SecureGBM: Secure Multi-Party Gradient Boosting. CoRR abs/1911.11997 (2019) - 2018
- [j69]Shuming Qiu, Guoai Xu, Haseeb Ahmad, Licheng Wang:
A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems. IEEE Access 6: 7452-7463 (2018) - [j68]Qinlong Huang, Yixian Yang, Licheng Wang:
Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things". IEEE Access 6: 17245 (2018) - [j67]Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv:
BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation. IEEE Access 6: 43472-43488 (2018) - [j66]Lijing Zhou, Licheng Wang, Yi-Ru Sun, Tianyi Ai:
AntNest: Fully Non-Interactive Secure Multi-Party Computation. IEEE Access 6: 75639-75649 (2018) - [j65]Haseeb Ahmad, Ali Daud, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez, Yixian Yang:
Quantifying team precedence in the game of cricket. Clust. Comput. 21(1): 523-537 (2018) - [j64]Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang:
Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 56(11): 76-81 (2018) - [j63]Haseeb Ahmad, Licheng Wang, Haibo Hong, Jing Li, Hassan Dawood, Manzoor Ahmed, Yixian Yang:
Primitives towards verifiable computation: a survey. Frontiers Comput. Sci. 12(3): 451-478 (2018) - [j62]Jing Li, Licheng Wang, Xinxin Niu, Lize Gu, Zhiguo Qu:
Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others. Fundam. Informaticae 157(1-2): 29-46 (2018) - [j61]Licheng Wang, Jing Li, Lize Gu, Jianhua Yan, Zhiguo Qu:
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems. Fundam. Informaticae 157(1-2): 47-62 (2018) - [j60]Zidong Wang, Licheng Wang, Shuai Liu, Guoliang Wei:
Encoding-Decoding-Based control and filtering of networked systems: insights, developments and opportunities. IEEE CAA J. Autom. Sinica 5(1): 3-18 (2018) - [j59]Shuai Liu, Zidong Wang, Licheng Wang, Guoliang Wei:
On quantized H∞ filtering for multi-rate systems under stochastic communication protocols: The finite-horizon case. Inf. Sci. 459: 211-223 (2018) - [j58]Huijun Zhu, Licheng Wang, Shuming Qiu, Xinxin Niu:
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems. KSII Trans. Internet Inf. Syst. 12(2): 764-785 (2018) - [j57]Lijing Zhou, Licheng Wang, Yiru Sun:
MIStore: a Blockchain-Based Medical Insurance Storage System. J. Medical Syst. 42(8): 149:1-149:17 (2018) - [j56]Lijing Zhou, Licheng Wang, Tianyi Ai, Yiru Sun:
BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation. Sensors 18(11): 3785 (2018) - [j55]Jing Li, Xiong Li, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu:
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. 22(3): 707-714 (2018) - [j54]Licheng Wang, Zidong Wang, Qing-Long Han, Guoliang Wei:
Event-Based Variance-Constrained ${\mathcal {H}}_{\infty }$ Filtering for Stochastic Parameter Systems Over Sensor Networks With Successive Missing Measurements. IEEE Trans. Cybern. 48(3): 1007-1017 (2018) - [j53]Licheng Wang, Zidong Wang, Qing-Long Han, Guoliang Wei:
Synchronization Control for a Class of Discrete-Time Dynamical Networks With Packet Dropouts: A Coding-Decoding-Based Approach. IEEE Trans. Cybern. 48(8): 2437-2448 (2018) - [j52]Licheng Wang, Zidong Wang, Guoliang Wei, Fuad E. Alsaadi:
Finite-Time State Estimation for Recurrent Delayed Neural Networks With Component-Based Event-Triggering Protocol. IEEE Trans. Neural Networks Learn. Syst. 29(4): 1046-1057 (2018) - [j51]Lijing Zhou, Licheng Wang, Yiru Sun:
On Efficient Constructions of Lightweight MDS Matrices. IACR Trans. Symmetric Cryptol. 2018(1): 180-200 (2018) - [j50]Ruifeng Yan, Yong Li, Tapan Kumar Saha, Licheng Wang, Mohammed Imran Hossain:
Modeling and Analysis of Open-Delta Step Voltage Regulators for Unbalanced Distribution Network With Photovoltaic Power Generation. IEEE Trans. Smart Grid 9(3): 2224-2234 (2018) - [j49]Licheng Wang, Ruifeng Yan, Tapan Kumar Saha:
Voltage Management for Large Scale PV Integration into Weak Distribution Systems. IEEE Trans. Smart Grid 9(5): 4128-4139 (2018) - [j48]Ahmer Khan Jadoon, Licheng Wang, Tong Li, Muhammad Azam Zia:
Lightweight Cryptographic Techniques for Automotive Cybersecurity. Wirel. Commun. Mob. Comput. 2018: 1640167:1-1640167:15 (2018) - [j47]Qinlong Huang, Licheng Wang, Yixian Yang:
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices. World Wide Web 21(1): 151-167 (2018) - [i19]Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv:
Loamit: A Blockchain-based Residual Loanable-limit Query System. IACR Cryptol. ePrint Arch. 2018: 655 (2018) - 2017
- [j46]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang:
Minimal logarithmic signatures for one type of classical groups. Appl. Algebra Eng. Commun. Comput. 28(2): 177-192 (2017) - [j45]Haseeb Ahmad, Ali Daud, Licheng Wang, Haibo Hong, Hussain Dawood, Yixian Yang:
Prediction of Rising Stars in the Game of Cricket. IEEE Access 5: 4104-4124 (2017) - [j44]Qinlong Huang, Yixian Yang, Licheng Wang:
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things. IEEE Access 5: 12941-12950 (2017) - [j43]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu:
Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing. IEEE Access 5: 20428-20439 (2017) - [j42]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, Zhiguo Qu:
Minimum length key in MST cryptosystems. Sci. China Inf. Sci. 60(5): 052106:1-052106:11 (2017) - [j41]Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang, Wenbin Yao:
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j40]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu:
Pairing-free equality test over short ciphertexts. Int. J. Distributed Sens. Networks 13(6) (2017) - [j39]Qinlong Huang, Licheng Wang, Yixian Yang:
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. Secur. Commun. Networks 2017: 6426495:1-6426495:12 (2017) - [c22]Licheng Wang, Zidong Wang, Guoliang Wei:
Event-triggered variance-constrained finite-horizon state estimation for discrete-time systems with redundant channels. ICAC 2017: 1-6 - [i18]Lijing Zhou, Licheng Wang, Yiru Sun:
On the Efficient Construction of Lightweight Orthogonal MDS Matrices. IACR Cryptol. ePrint Arch. 2017: 371 (2017) - [i17]Jing Li, Licheng Wang:
Noiseless Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 839 (2017) - [i16]Lijing Zhou, Licheng Wang, Yiru Sun:
CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite. IACR Cryptol. ePrint Arch. 2017: 1059 (2017) - 2016
- [j38]Lingwei Song, Jinxia Wei, Licheng Wang, Chenlei Cao, Xinxin Niu:
Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud. Concurr. Comput. Pract. Exp. 28(6): 1930-1945 (2016) - [j37]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu:
Construction of DNA codes by using algebraic number theory. Finite Fields Their Appl. 37: 328-343 (2016) - [j36]Licheng Wang, Jing Li, Haseeb Ahmad:
Challenges of Fully Homomorphic Encryptions for the Internet of Things. IEICE Trans. Inf. Syst. 99-D(8): 1982-1990 (2016) - [j35]Guoliang Wei, Shuai Liu, Licheng Wang, Yongxiong Wang:
Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects. Int. J. Gen. Syst. 45(5): 532-547 (2016) - [j34]Licheng Wang, Zidong Wang, Tingwen Huang, Guoliang Wei:
An Event-Triggered Approach to State Estimation for a Class of Complex Networks With Mixed Time Delays and Nonlinearities. IEEE Trans. Cybern. 46(11): 2497-2508 (2016) - [c21]Jing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu:
Oblivious Transfer Protocols Based on Group Factoring Problem. BWCCA 2016: 885-892 - [c20]Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. AsiaCCS 2016: 895-900 - [c19]Licheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu:
An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems. INCoS 2016: 199-202 - [c18]Jing Li, Licheng Wang, Xinxin Niu:
A Star-Topological Privacy Encryption for Telecare Medical Information Systems. INCoS 2016: 311-317 - [i15]Haibo Hong, Jun Shao, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Public Key Encryption in Non-Abelian Groups. CoRR abs/1605.06608 (2016) - [i14]Lijing Zhou, Licheng Wang, Yiru Sun:
Construction of Lightweight MDS Matrices over Matrix Polynomial Residue Ring. IACR Cryptol. ePrint Arch. 2016: 1173 (2016) - 2015
- [j33]Haibo Hong, Licheng Wang, Yixian Yang:
Minimal logarithmic signatures for the unitary group Un(q). Des. Codes Cryptogr. 77(1): 179-191 (2015) - [j32]Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao:
Identity-based signcryption from lattices. Secur. Commun. Networks 8(18): 3751-3770 (2015) - [c17]Chunli Yang, Peigang Qiu, Shihui Zheng, Licheng Wang:
An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor. IIH-MSP 2015: 189-194 - [c16]Licheng Wang, Yun Pan, Minzheng Jia, Haseeb Ahmad:
A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs. WASA 2015: 539-549 - [i13]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang:
Minimal Logarithmic Signatures for Sporadic Groups. CoRR abs/1507.01162 (2015) - [i12]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Minimal Logarithmic Signatures for one type of Classical Groups. CoRR abs/1507.01163 (2015) - [i11]Jing Li, Licheng Wang:
Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings. IACR Cryptol. ePrint Arch. 2015: 641 (2015) - 2014
- [j31]Haibo Hong, Licheng Wang, Yixian Yang, Haseeb Ahmad:
All exceptional groups of lie type have minimal logarithmic signatures. Appl. Algebra Eng. Commun. Comput. 25(4): 287-296 (2014) - [j30]Xiuhua Lu, Qiaoyan Wen, Zhengping Jin, Licheng Wang, Chunli Yang:
A lattice-based signcryption scheme without random oracles. Frontiers Comput. Sci. 8(4): 667-675 (2014) - [j29]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient threshold public key encryption with full security based on dual pairing vector spaces. Int. J. Commun. Syst. 27(12): 4059-4077 (2014) - [j28]Guoliang Wei, Fei Han, Licheng Wang, Yan Song:
Reliable H∞ filtering for discrete piecewise linear systems with infinite distributed delays. Int. J. Gen. Syst. 43(3-4): 346-358 (2014) - [j27]Licheng Wang, Guoliang Wei, Wangyan Li:
Probability-dependent H∞ synchronization control for dynamical networks with randomly varying nonlinearities. Neurocomputing 133: 369-376 (2014) - [j26]Xiuhua Lu, Qiaoyan Wen, Wenmin Li, Licheng Wang, Hua Zhang:
A Fuzzy Identity-Based Signcryption Scheme from Lattices. KSII Trans. Internet Inf. Syst. 8(11): 4203-4225 (2014) - [j25]Jing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang:
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure. KSII Trans. Internet Inf. Syst. 8(12): 4552-4567 (2014) - [j24]Chunli Yang, Shihui Zheng, Licheng Wang, Xiuhua Lu, Yixian Yang:
Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Networks 16(3): 258-263 (2014) - 2013
- [j23]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption. Comput. J. 56(10): 1249-1257 (2013) - [j22]Ping Pan, Licheng Wang, Yixian Yang, Yuanju Gan, Lihua Wang, Chengqian Xu:
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups. Fundam. Informaticae 126(1): 103-119 (2013) - [j21]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Licheng Wang, Guoliang Wei, Huisheng Shu:
State estimation for complex networks with randomly occurring coupling delays. Neurocomputing 122: 513-520 (2013) - [j19]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang:
Certificate-based proxy decryption systems with revocability in the standard model. Inf. Sci. 247: 188-201 (2013) - [j18]Yuanju Gan, Licheng Wang, Jianhua Yan, Yixian Yang:
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model. J. Softw. 8(5): 1245-1253 (2013) - [j17]Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao, Yixian Yang:
New public key cryptosystems based on non-Abelian factorization problems. Secur. Commun. Networks 6(7): 912-922 (2013) - [i10]Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao:
More Efficient Cryptosystems From k-th Power Residues. IACR Cryptol. ePrint Arch. 2013: 569 (2013) - [i9]Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao:
New Efficient Identity-Based Encryption From Factorization. IACR Cryptol. ePrint Arch. 2013: 570 (2013) - 2012
- [j16]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 70-88 (2012) - [j15]Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, Zhengming Hu:
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues. Int. J. Netw. Secur. 14(1): 33-38 (2012) - [j14]Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang:
CSP-DHIES: a new public-key encryption scheme from matrix conjugation. Secur. Commun. Networks 5(7): 809-822 (2012) - 2011
- [j13]GuangXu Zhou, Rustu Murat Demirer, Coskun Bayrak, Licheng Wang:
Enable delegation for RBAC with Secure Authorization Certificate. Comput. Secur. 30(8): 780-790 (2011) - [j12]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete logarithm based additively homomorphic encryption and secure data aggregation. Inf. Sci. 181(16): 3308-3322 (2011) - [j11]Xiaolei Dong, Lifei Wei, Haojin Zhu, Zhenfu Cao, Licheng Wang:
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(2): 580-591 (2011) - 2010
- [j10]Shihui Zheng, Licheng Wang, Yixian Yang:
A new impossible differential attack on SAFER ciphers. Comput. Electr. Eng. 36(1): 180-189 (2010) - [j9]Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inf. Sci. 53(3): 524-536 (2010) - [j8]Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu:
Secure network coding in the presence of eavesdroppers. Sci. China Inf. Sci. 53(3): 648-658 (2010) - [j7]Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu:
Comment on Wu et al.'s Server-aided Verification Signature Schemes. Int. J. Netw. Secur. 10(2): 158-160 (2010) - [j6]Hongbing Wang, Zhenfu Cao, Licheng Wang:
Multi-use and unidirectional identity-based proxy re-encryption schemes. Inf. Sci. 180(20): 4042-4059 (2010) - [c15]Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. Inscrypt 2010: 1-17 - [c14]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. ICICS 2010: 383-400 - [c13]Licheng Wang, Han Ding, Shaojun Wang:
Measurement Error Compensation Using Data Fusion Technique for Laser Scanner on AACMMs. ICIRA (2) 2010: 576-586 - [c12]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. Pairing 2010: 327-346
2000 – 2009
- 2009
- [j5]Licheng Wang, Tamon Ueda:
Mesoscopic simulation of chloride ions diffusion in frost-damaged concrete. Int. J. Model. Identif. Control. 7(2): 148-154 (2009) - [c11]Xiaofang Huang, Licheng Wang:
A Fair Concurrent Signature Scheme Based on Identity. HPCA (China) 2009: 198-205 - [c10]Yuling He, Yun Pan, Ping Pan, Licheng Wang:
Simulation of Key Management Protocol in Wireless Sensor Networks. CSO (2) 2009: 333-335 - [c9]Yun Pan, Yuan Zhou, Licheng Wang:
Modeling Internet Applications with Event Graphs. FSKD (5) 2009: 124-128 - [c8]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. ICICS 2009: 493-502 - [i8]Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang:
Collision Attacks on NaSHA-384/512. IACR Cryptol. ePrint Arch. 2009: 26 (2009) - [i7]Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Cryptosystems From CSP-Based Self-Distributive Systems. IACR Cryptol. ePrint Arch. 2009: 566 (2009) - 2008
- [j4]Xiaolei Dong, Zhenfu Cao, Licheng Wang:
New designing of cryptosystems based on quadratic fields. Sci. China Ser. F Inf. Sci. 51(8): 1106-1116 (2008) - [j3]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao:
Biased Bit Commitment and Applications. J. Inf. Sci. Eng. 24(2): 441-452 (2008) - 2007
- [j2]Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun:
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Stand. Interfaces 29(5): 521-527 (2007) - [j1]Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures. Inf. Sci. 177(6): 1382-1394 (2007) - [c7]Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information. ESORICS 2007: 299-310 - [c6]Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196 - [c5]Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles. INDOCRYPT 2007: 197-209 - [i6]Zhenfu Cao, Xiaolei Dong, Licheng Wang:
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings. IACR Cryptol. ePrint Arch. 2007: 9 (2007) - [i5]Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-based Authenticated Key Exchange without Public Information. IACR Cryptol. ePrint Arch. 2007: 326 (2007) - [i4]Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-Signature Schemes without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 396 (2007) - 2006
- [c4]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian:
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. IMSCCS (2) 2006: 8-12 - [c3]Feng Cao, Zhenfu Cao, Licheng Wang:
An Improvement of an Identity-Based Key Issuing Protocol. IMSCCS (2) 2006: 13-18 - [c2]Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo:
Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. IMSCCS (2) 2006: 113-116 - [i3]Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. IACR Cryptol. ePrint Arch. 2006: 113 (2006) - [i2]Xiaolei Dong, Licheng Wang, Zhenfu Cao:
New Public Key Authentication Frameworks with Lite Certification Authority. IACR Cryptol. ePrint Arch. 2006: 154 (2006) - [i1]Jun Shao, Zhenfu Cao, Licheng Wang:
Efficient ID-based Threshold Signature Schemes without Pairings. IACR Cryptol. ePrint Arch. 2006: 308 (2006) - 2005
- [c1]Yun Pan, Zhenwei Yu, Licheng Wang:
Hybrid Genetic Algorithm for Solving the Degree-Constrained Minimal Bandwidth Multicast Routing Problem. CIS (1) 2005: 285-290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint