default search action
Qiaoyan Wen
Person information
- affiliation: Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
- affiliation (PhD 1997): Xidian University, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j181]Tengfei Tu, Hua Zhang, Bei Gong, Daizhong Du, Qiaoyan Wen:
Intelligent analysis of android application privacy policy and permission consistency. Artif. Intell. Rev. 57(7): 172 (2024) - [j180]Boqin Qin, Yilun Chen, Haopeng Liu, Hua Zhang, Qiaoyan Wen, Linhai Song, Yiying Zhang:
Understanding and Detecting Real-World Safety Issues in Rust. IEEE Trans. Software Eng. 50(6): 1306-1324 (2024) - [i27]Sheng-Yao Wu, Runze Li, Yan-Qi Song, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
A Hierarchical Fused Quantum Fuzzy Neural Network for Image Classification. CoRR abs/2403.09318 (2024) - 2023
- [j179]Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Quantum Attacks on 1K-AES and PRINCE. Comput. J. 66(5): 1102-1110 (2023) - [j178]Hua Zhang, Xin Zhang, Ziqing Guo, Huawei Wang, Dong Cui, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool. IEEE Internet Things J. 10(14): 11985-11999 (2023) - [j177]Wenmin Li, Yang Chen, Fei Gao, Shuo Zhang, Hua Zhang, Qiaoyan Wen:
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain. IEEE Internet Things J. 10(14): 12090-12101 (2023) - [j176]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang, Mingchu Gao:
An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption for VANETs. IEEE Internet Things J. 10(20): 17881-17892 (2023) - [j175]Hong-Wei Sun, Chun-Yan Wei, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Improved BV-based quantum attack on block ciphers. Quantum Inf. Process. 22(1): 9 (2023) - [j174]Xue Zhang, Chunyan Wei, Sujuan Qin, Fei Gao, Qiaoyan Wen:
Practical efficient 1-out-of-n quantum oblivious transfer protocol. Quantum Inf. Process. 22(2): 99 (2023) - [j173]Yong-Mei Li, Hai-Ling Liu, Shijie Pan, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Quantum discriminative canonical correlation analysis. Quantum Inf. Process. 22(4): 163 (2023) - [j172]Hua Zhang, Shaohua Zhao, Ziqing Guo, Qiaoyan Wen, Wenmin Li, Fei Gao:
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds. IEEE Trans. Cloud Comput. 11(1): 308-323 (2023) - [i26]Zhenqiang Li, Fei Gao, Su-Juan Qin, Qiaoyan Wen:
New record in the number of qubits for a quantum implementation of AES. IACR Cryptol. ePrint Arch. 2023: 18 (2023) - [i25]Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Beyond-Birthday-Bound MACs. IACR Cryptol. ePrint Arch. 2023: 25 (2023) - [i24]Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Type-1 Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2023: 776 (2023) - 2022
- [j171]Ping Yu, Wei Ni, Hua Zhang, Ren Ping Liu, Qiaoyan Wen, Wenmin Li, Fei Gao:
Secure and Differentiated Fog-Assisted Data Access for Internet of Things. Comput. J. 65(8): 1948-1963 (2022) - [j170]Shaohua Zhao, Hua Zhang, Xin Zhang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Forward privacy multikeyword ranked search over encrypted database. Int. J. Intell. Syst. 37(10): 7356-7378 (2022) - [j169]Huawei Wang, Yiwei Liu, Peng Yin, Hua Zhang, Xin Xu, Qiaoyan Wen:
Label specificity attack: Change your label as I want. Int. J. Intell. Syst. 37(10): 7767-7786 (2022) - [j168]Yunping Gong, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
A rORAM scheme with logarithmic bandwidth and logarithmic locality. Int. J. Intell. Syst. 37(10): 8068-8091 (2022) - [j167]Haoran Gao, Hua Zhang, Xingguo Yang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Generating natural adversarial examples with universal perturbations for text classification. Neurocomputing 471: 175-182 (2022) - [j166]Fen-Zhuo Guo, Ze-Tian Lv, Shi-Hui Wei, Qiao-Yan Wen:
Effects of measurement dependence on 1-parameter family of Bell tests. Quantum Inf. Process. 21(1): 28 (2022) - [j165]Yongsheng Li, Tengfei Tu, Hua Zhang, JiShuai Li, Zhengping Jin, Qiaoyan Wen:
Sound Can Help Us See More Clearly. Sensors 22(2): 599 (2022) - [j164]JiShuai Li, Tengfei Tu, Yongsheng Li, Su-Juan Qin, Yijie Shi, Qiaoyan Wen:
DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Networks. Sensors 22(3): 1061 (2022) - [j163]Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. IEEE Syst. J. 16(1): 1460-1470 (2022) - [j162]Ping Yu, Wei Ni, Ren Ping Liu, Zhaoxin Zhang, Hua Zhang, Qiaoyan Wen:
Efficient Encrypted Range Query on Cloud Platforms. ACM Trans. Cyber Phys. Syst. 6(3): 27:1-27:23 (2022) - [j161]Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, Huawei Wang:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15(2): 724-735 (2022) - [j160]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. IEEE Trans. Serv. Comput. 15(4): 1813-1824 (2022) - [c42]Miao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang:
Jasmine: A Static Analysis Framework for Spring Core Technologies. ASE 2022: 60:1-60:13 - 2021
- [j159]Hao Lin, Zhen Zhao, Fei Gao, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi:
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage. Comput. J. 64(8): 1226-1238 (2021) - [j158]Li Liu, Fen-Zhuo Guo, Qiao-Yan Wen:
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources. Quantum Inf. Process. 20(12): 392 (2021) - [j157]Ping Yu, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, Qiaoyan Wen:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 6638453:1-6638453:14 (2021) - [j156]Chao-Hua Yu, Fei Gao, Qiao-Yan Wen:
An Improved Quantum Algorithm for Ridge Regression. IEEE Trans. Knowl. Data Eng. 33(3): 858-866 (2021) - [j155]Hua Zhang, Ziqing Guo, Shaohua Zhao, Qiaoyan Wen:
Privacy-Preserving Linear Region Search Service. IEEE Trans. Serv. Comput. 14(1): 207-221 (2021) - [j154]Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen:
A Secure Online Treatment Blockchain Service. Wirel. Pers. Commun. 117(3): 1773-1795 (2021) - 2020
- [j153]Hua Zhang, Xueqi Jin, Ying Li, Zhengwei Jiang, Ye Liang, Zhengping Jin, Qiaoyan Wen:
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System. IEEE Access 8: 1031-1047 (2020) - [j152]Jiawei Qin, Hua Zhang, Jing Guo, Senmiao Wang, Qiaoyan Wen, Yijie Shi:
Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions. IEEE Access 8: 106437-106451 (2020) - [j151]Caijun Sun, Hua Zhang, Su-Juan Qin, Jiawei Qin, Yijie Shi, Qiaoyan Wen:
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps. IEEE Access 8: 167460-167474 (2020) - [j150]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang, Mingchu Gao:
A new provably secure certificateless signature scheme for Internet of Things. Ad Hoc Networks 100: 102074 (2020) - [j149]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j148]Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra:
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage. Comput. J. 63(8): 1216-1230 (2020) - [j147]Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. Comput. J. 63(12): 1886-1903 (2020) - [j146]Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020) - [j145]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A survey on the security of blockchain systems. Future Gener. Comput. Syst. 107: 841-853 (2020) - [j144]Chun-Yan Wei, Xiao-Qiu Cai, Tian-Yin Wang, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Error Tolerance Bound in QKD-Based Quantum Private Query. IEEE J. Sel. Areas Commun. 38(3): 517-527 (2020) - [j143]Xinhui Li, Yukun Wang, Yunguang Han, Su-Juan Qin, Fei Gao, Qiaoyan Wen:
Self-Testing of Symmetric Three-Qubit States. IEEE J. Sel. Areas Commun. 38(3): 589-597 (2020) - [j142]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively secure broadcast encryption with authenticated content distributors. Multim. Tools Appl. 79(11-12): 7889-7910 (2020) - [j141]Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis:
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 20(16): 4651 (2020) - [j140]Shuo Zhang, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. Sensors 20(23): 6962 (2020) - [j139]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". IEEE Trans. Inf. Forensics Secur. 15: 2584-2586 (2020) - [j138]Hua Zhang, Boqin Qin, Tengfei Tu, Ziqing Guo, Fei Gao, Qiaoyan Wen:
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications. IEEE Trans. Ind. Informatics 16(1): 658-668 (2020) - [j137]Shuo Zhang, Wenmin Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wirel. Pers. Commun. 114(4): 2783-2800 (2020) - [e1]Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou:
Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers. Communications in Computer and Information Science 1299, Springer 2020, ISBN 978-981-33-4921-6 [contents]
2010 – 2019
- 2019
- [j136]Zhidan Li, Wenmin Li, Zhengping Jin, Hua Zhang, Qiaoyan Wen:
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. IEEE Access 7: 29023-29037 (2019) - [j135]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang:
An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network. IEEE Access 7: 42683-42693 (2019) - [j134]Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang:
A Robust Authentication Scheme for Multiple Servers Architecture. IEEE Access 7: 111222-111231 (2019) - [j133]Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang:
Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture. IEEE Access 7: 161340-161349 (2019) - [j132]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j131]Wei Guo, Hua Zhang, Su-Juan Qin, Fei Gao, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener. Comput. Syst. 95: 309-322 (2019) - [j130]Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. Future Gener. Comput. Syst. 100: 797-810 (2019) - [j129]Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li:
Authenticated public key broadcast encryption with short ciphertexts. Multim. Tools Appl. 78(16): 23399-23414 (2019) - [j128]Fen-Zhuo Guo, Li Liu, Ankang Wang, Qiao-Yan Wen:
Practical covert quantum key distribution with decoy-state method. Quantum Inf. Process. 18(4): 95 (2019) - [j127]Dandan Li, Fei Gao, Ya Cao, Qiao-Yan Wen:
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities. Quantum Inf. Process. 18(4): 123 (2019) - [j126]Lv-Jun Li, Fei Gao, Zhi-Chao Zhang, Qiao-Yan Wen:
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC. Quantum Inf. Process. 18(11): 330 (2019) - [j125]Huawei Wang, Dianli Guo, Hua Zhang, Qiaoyan Wen:
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity. Sensors 19(14): 3144 (2019) - [j124]Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j123]Ping Yu, Qiaoyan Wen, Wei Ni, Wenmin Li, Caijun Sun, Hua Zhang, Zhengping Jin:
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System. Wirel. Pers. Commun. 106(2): 719-738 (2019) - [i23]Yusen Wu, Chao-Hua Yu, Su-Juan Qin, Qiaoyan Wen, Fei Gao:
Bayesian machine learning for Boltzmann machine in quantum-enhanced feature spaces. CoRR abs/1912.10857 (2019) - [i22]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2018
- [j122]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Anti-Quantum Transaction Authentication Approach in Blockchain. IEEE Access 6: 5393-5401 (2018) - [j121]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Zhengping Jin, Wenmin Li:
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method. IEEE Access 6: 33986-33994 (2018) - [j120]Yang Chen, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. IEEE Access 6: 58955-58966 (2018) - [j119]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j118]Hongzhen Du, Qiaoyan Wen, Shanshan Zhang:
A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings. IEEE Access 6: 73846-73855 (2018) - [j117]Ziqing Guo, Hua Zhang, Caijun Sun, Qiaoyan Wen, Wenmin Li:
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137: 380-395 (2018) - [j116]Dan-dan Li, Fei Gao, Su-Juan Qin, Qiao-Yan Wen:
Perfect quantum multiple-unicast network coding protocol. Quantum Inf. Process. 17(1): 13 (2018) - [j115]Su-Juan Qin, Yukun Wang, Runze Li, Fei Gao, Qiao-Yan Wen:
The randomness in 2 → 1 quantum random access code without a shared reference frame. Quantum Inf. Process. 17(10): 276 (2018) - [j114]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [j113]Wenmin Li, Qiaoyan Wen, Xuelei Li, Debiao He:
Attribute-based fuzzy identity access control in multicloud computing environments. Soft Comput. 22(12): 4071-4082 (2018) - [j112]Lu Rao, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security. Wirel. Commun. Mob. Comput. 2018: 4186243:1-4186243:19 (2018) - [j111]Wenmin Li, Shuo Zhang, Qi Su, Qiaoyan Wen, Yang Chen:
An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems. Wirel. Commun. Mob. Comput. 2018: 8131367:1-8131367:12 (2018) - [c41]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. ISPEC 2018: 559-577 - [i21]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A Survey on the Security of Blockchain Systems. CoRR abs/1802.06993 (2018) - [i20]Ziqing Guo, Hua Zhang, Xin Zhang, Zhengping Jin, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool. CoRR abs/1812.08603 (2018) - [i19]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - 2017
- [j110]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. Comput. Secur. 69: 50-64 (2017) - [j109]Ping Zhu, Huiyang Xie, Qiaoyan Wen:
Rough approximations based on bisimulations. Int. J. Approx. Reason. 81: 49-62 (2017) - [j108]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Ping Zheng:
Identity Based Proxy Re-encryption Scheme under LWE. KSII Trans. Internet Inf. Syst. 11(12): 6116-6132 (2017) - [j107]Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen:
Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017) - [j106]Wenmin Li, Xuelei Li, Qiao-Yan Wen, Shuo Zhang, Hua Zhang:
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System. J. Comput. Sci. Technol. 32(5): 974-990 (2017) - [j105]Guang-Bao Xu, Qiao-Yan Wen, Fei Gao, Su-Juan Qin, Huijuan Zuo:
Local indistinguishability of multipartite orthogonal product bases. Quantum Inf. Process. 16(11): 276 (2017) - [j104]Tengfei Tu, Lu Rao, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. Secur. Commun. Networks 2017: 4603237:1-4603237:17 (2017) - [j103]Ping Zhu, Huiyang Xie, Qiaoyan Wen:
A unified view of consistent functions. Soft Comput. 21(9): 2189-2199 (2017) - [j102]Jie Xu, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He:
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput. 21(18): 5265-5279 (2017) - [c40]Ya-Jun Fan, Xue-Song Qiu, Qiao-Yan Wen:
A privacy-preserving authenticated key agreement protocol with smart cards for mobile emergency services. CSCWD 2017: 227-232 - 2016
- [j101]Haiyan Sun, Qiaoyan Wen, Wenmin Li:
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci. China Inf. Sci. 59(3): 32109:1-32109:16 (2016) - [j100]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. Comput. J. 59(7): 955-969 (2016) - [j99]Rui Wang, Qiaoyan Wen, Hua Zhang, Xuelei Li:
A Novel Protocol-Feature Attack against Tor's Hidden Service. IEICE Trans. Inf. Syst. 99-D(4): 839-849 (2016) - [j98]Rui Wang, Qiaoyan Wen, Hua Zhang, Su-Juan Qin, Wenmin Li:
Transparent Discovery of Hidden Service. IEICE Trans. Inf. Syst. 99-D(11): 2817-2820 (2016) - [j97]Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang:
Linear complexity of generalised cyclotomic quaternary sequences of length 2p m+1 q n+1. IET Inf. Secur. 10(2): 104-111 (2016) - [j96]Tian-Qing Cao, Fei Gao, Ying-Hui Yang, Zhi-Chao Zhang, Qiao-Yan Wen:
Determination of locally perfect discrimination for two-qubit unitary operations. Quantum Inf. Process. 15(1): 529-549 (2016) - [j95]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively Secure Broadcast Encryption With Constant Ciphertexts. IEEE Trans. Broadcast. 62(3): 709-715 (2016) - [j94]Jie Xu, Qiaoyan Wen, Wenmin Li, Zhengping Jin:
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 27(1): 119-129 (2016) - [j93]Xuelei Li, Qiaoyan Wen, Wenmin Li:
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications. Wirel. Pers. Commun. 86(3): 1593-1610 (2016) - [c39]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. ACISP (2) 2016: 170-186 - 2015
- [j92]Bin Liu, Fei Gao, Wei Huang, Dan Li, Qiaoyan Wen:
Controlling the key by choosing the detection bits in quantum cryptographic protocols. Sci. China Inf. Sci. 58(11): 1-11 (2015) - [j91]Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers Comput. Sci. 9(1): 142-156 (2015) - [j90]Dandan Li, Qiaoyan Wen, Jie Zhang, Liying Jiang:
Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2pm+1qn+1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(6): 1244-1254 (2015) - [j89]Lin Cheng, Qiaoyan Wen:
Cryptanalysis and improvement of a certificateless partially blind signature. IET Inf. Secur. 9(6): 380-386 (2015) - [j88]Lin Cheng, Qiaoyan Wen:
Provably secure and efficient certificateless signature in the standard model. Int. J. Inf. Commun. Technol. 7(2/3): 287-301 (2015) - [j87]Lin Cheng, Qiaoyan Wen:
An Improved Certificateless Signcryption in the Standard Model. Int. J. Netw. Secur. 17(3): 229-237 (2015) - [j86]Lin Cheng, Qiaoyan Wen:
An Improved Certificateless Signcryption in the Standard Model. Int. J. Netw. Secur. 17(5): 597-606 (2015) - [j85]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
Cryptanalysis and improvement of a certificateless aggregate signature scheme. Inf. Sci. 295: 337-346 (2015) - [j84]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 39(3): 20 (2015) - [j83]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems. J. Medical Syst. 39(6): 62:1-62:8 (2015) - [j82]Ying-Hui Yang, Fei Gao, Guo-Jing Tian, Tian-Qing Cao, Huijuan Zuo, Qiao-Yan Wen:
Bound on local unambiguous discrimination between multipartite quantum states. Quantum Inf. Process. 14(2): 731-737 (2015) - [j81]Feng Liu, Guo-Jing Tian, Qiao-Yan Wen, Fei Gao:
General bounds for quantum discord and discord distance. Quantum Inf. Process. 14(4): 1333-1341 (2015) - [j80]Tian-Qing Cao, Fei Gao, Zhi-Chao Zhang, Ying-Hui Yang, Qiao-Yan Wen:
Perfect discrimination of projective measurements with the rank of all projectors being one. Quantum Inf. Process. 14(7): 2645-2656 (2015) - [j79]Zhi-Chao Zhang, Fei Gao, Su-Juan Qin, Huijuan Zuo, Qiao-Yan Wen:
Local distinguishability of maximally entangled states in canonical form. Quantum Inf. Process. 14(10): 3961-3969 (2015) - [j78]Yi Sun, Qiaoyan Wen:
A general two-party bi-input private function evaluation protocol. Secur. Commun. Networks 8(15): 2536-2544 (2015) - [j77]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption. Secur. Commun. Networks 8(17): 3167-3179 (2015) - [j76]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'. Wirel. Pers. Commun. 83(1): 35-48 (2015) - 2014
- [j75]Yi Sun, Qiaoyan Wen, Yudong Zhang, Wenmin Li:
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Comput. Math. Methods Medicine 2014: 214841:1-214841:9 (2014) - [j74]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Frontiers Comput. Sci. 8(1): 163-173 (2014) - [j73]Xiuhua Lu, Qiaoyan Wen, Zhengping Jin, Licheng Wang, Chunli Yang:
A lattice-based signcryption scheme without random oracles. Frontiers Comput. Sci. 8(4): 667-675 (2014) - [j72]Ping Zhu, Huiyang Xie, Qiaoyan Wen:
A Unified Definition of Consistent Functions. Fundam. Informaticae 135(3): 331-340 (2014) - [j71]Dan-dan Li, Qiaoyan Wen, Jie Zhang, Zuling Chang:
Linear Complexity of Generalized Cyclotomic Quaternary Sequences with Period pq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(5): 1153-1158 (2014) - [j70]Hongzhen Du, Qiaoyan Wen:
Security analysis of two certificateless short signature schemes. IET Inf. Secur. 8(4): 230-233 (2014) - [j69]Jiao Du, Qiaoyan Wen, Jie Zhang, Shanqi Pang:
Constructions of resilient rotation symmetric boolean functions on given number of variables. IET Inf. Secur. 8(5): 265-272 (2014) - [j68]Liming Zhou, Qiaoyan Wen:
Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization. Int. J. Distributed Sens. Networks 10 (2014) - [j67]Hongzhen Du, Qiaoyan Wen:
Certificateless proxy multi-signature. Inf. Sci. 276: 21-30 (2014) - [j66]Xiuhua Lu, Qiaoyan Wen, Wenmin Li, Licheng Wang, Hua Zhang:
A Fuzzy Identity-Based Signcryption Scheme from Lattices. KSII Trans. Internet Inf. Syst. 8(11): 4203-4225 (2014) - [j65]Xin Xu, Ping Zhu, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Lian He:
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems. J. Medical Syst. 38(1): 9994 (2014) - [j64]Xuelei Li, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(11): 139 (2014) - [j63]Yan-Bing Li, Qiaoyan Wen, Su-Juan Qin, Fen-Zhuo Guo, Ying Sun:
Practical quantum all-or-nothing oblivious transfer protocol. Quantum Inf. Process. 13(1): 131-139 (2014) - [j62]Yan-Bing Li, Qiaoyan Wen, Zi-Chen Li, Su-Juan Qin, Ya-Tao Yang:
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states. Quantum Inf. Process. 13(1): 141-149 (2014) - [j61]Wei Huang, Qiaoyan Wen, Bin Liu, Fei Gao, Ying Sun:
Quantum key agreement with EPR pairs and single-particle measurements. Quantum Inf. Process. 13(3): 649-663 (2014) - [j60]Zhi-Chao Zhang, Qiaoyan Wen, Fei Gao, Guo-Jing Tian, Tian-Qing Cao:
One-way LOCC indistinguishability of maximally entangled states. Quantum Inf. Process. 13(3): 795-804 (2014) - [j59]Qian Yang, Jia-Jun Ma, Fen-Zhuo Guo, Qiaoyan Wen:
Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement. Quantum Inf. Process. 13(7): 1537-1544 (2014) - [j58]Wei Huang, Qiaoyan Wen, Bin Liu, Qi Su, Fei Gao:
Cryptanalysis of a multi-party quantum key agreement protocol with single particles. Quantum Inf. Process. 13(7): 1651-1657 (2014) - [j57]Guang-Bao Xu, Qiaoyan Wen, Fei Gao, Su-Juan Qin:
Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13(12): 2587-2594 (2014) - [c38]Xiaojun Yu, Qiaoyan Wen:
MF-PDP: Multi-function provable data possession scheme in cloud computing. CCIS 2014: 597-603 - [i18]Fei Gao, Bin Liu, Wei Huang, Qiao-Yan Wen:
Post-processing of the oblivious key in quantum private queries. CoRR abs/1406.0589 (2014) - [i17]Xiaojun Yu, Qiaoyan Wen:
A Multi-Function Provable Data Possession Scheme in Cloud Computing. IACR Cryptol. ePrint Arch. 2014: 606 (2014) - 2013
- [j56]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers Comput. Sci. 7(4): 544-557 (2013) - [j55]Huijuan Wang, Qiaoyan Wen, Jie Zhang:
The Properties of the FCSR-Based Self-Shrinking Sequence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(2): 626-634 (2013) - [j54]Lu Zhao, Qiao-Yan Wen, Jie Zhang:
On the Linear Complexity of a Class of Quaternary Sequences with Low Autocorrelation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(5): 997-1000 (2013) - [j53]Jiao Du, Qiaoyan Wen, Jie Zhang, Shanqi Pang:
Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(7): 1653-1656 (2013) - [j52]Jiao Du, Qiaoyan Wen, Jie Zhang, Xin Liao:
New Construction of Symmetric Orthogonal Arrays of Strength t. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(9): 1901-1904 (2013) - [j51]Xin Liao, Qiaoyan Wen, Ting-Ting Song, Jie Zhang:
Quantum Steganography with High Efficiency with Noisy Depolarizing Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2039-2044 (2013) - [j50]Xiuwen Ma, Qiaoyan Wen, Jie Zhang, Huijuan Zuo:
New Perfect Gaussian Integer Sequences of Period pq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(11): 2290-2293 (2013) - [j49]Xin Liao, Qiaoyan Wen, Jie Zhang:
Improving the Adaptive Steganographic Methods Based on Modulus Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2731-2734 (2013) - [j48]Xuelei Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int. J. Netw. Manag. 23(5): 311-324 (2013) - [j47]Huijuan Wang, Qiaoyan Wen, Jie Zhang:
GLS: New class of generalized Legendre sequences with optimal arithmetic cross-correlation. RAIRO Theor. Informatics Appl. 47(4): 371-388 (2013) - [j46]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices. Inf. Technol. Control. 42(2): 191-204 (2013) - [j45]Ping Zhu, Qiaoyan Wen:
Operations on Soft Sets Revisited. J. Appl. Math. 2013: 105752:1-105752:7 (2013) - [j44]Rui Guo, Qiaoyan Wen, Huixian Shi, Zhengping Jin, Hua Zhang:
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems. J. Medical Syst. 37(5): 9965 (2013) - [j43]Fei Gao, Bin Liu, Wei-Wei Zhang, Qiao-Yan Wen, Hui Chen:
Is quantum key distribution suitable for steganography? Quantum Inf. Process. 12(1): 625-630 (2013) - [j42]Wei-Wei Zhang, Fei Gao, Bin Liu, Qiao-Yan Wen, Hui Chen:
A watermark strategy for quantum images based on quantum fourier transform. Quantum Inf. Process. 12(2): 793-803 (2013) - [j41]Bin Liu, Fei Gao, Heng-Yue Jia, Wei Huang, Wei-Wei Zhang, Qiao-Yan Wen:
Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2): 887-897 (2013) - [j40]Dan Li, Jie Zhang, Fen-Zhuo Guo, Wei Huang, Qiao-Yan Wen, Hui Chen:
Discrete-time interacting quantum walks and quantum Hash schemes. Quantum Inf. Process. 12(3): 1501-1513 (2013) - [j39]Bin Liu, Fei Gao, Wei Huang, Qiao-Yan Wen:
Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12(4): 1797-1805 (2013) - [j38]Dan Li, Jie Zhang, Xiuwen Ma, Wei-Wei Zhang, Qiao-Yan Wen:
Analysis of the two-particle controlled interacting quantum walks. Quantum Inf. Process. 12(6): 2167-2176 (2013) - [j37]Fen-Zhuo Guo, Fei Gao, Su-Juan Qin, Jie Zhang, Qiao-Yan Wen:
Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states. Quantum Inf. Process. 12(8): 2793-2802 (2013) - [j36]Ting-Ting Song, Qiao-Yan Wen, Su-Juan Qin, Wei-Wei Zhang, Ying Sun:
The general theory of three-party quantum secret sharing protocols over phase-damping channels. Quantum Inf. Process. 12(10): 3291-3304 (2013) - [c37]Hao Wang, Qiaoyan Wen, Zhao Zhang:
Improvement of Peach Platform to Support GUI-Based Protocol State Modeling. GreenCom/iThings/CPScom 2013: 1094-1097 - [c36]Lin Cheng, Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A novel privacy preserving keyword searching for cloud storage. PST 2013: 77-81 - [i16]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin, Wenmin Li:
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols. CoRR abs/1301.5091 (2013) - [i15]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
On the security of a certificateless aggregate signature scheme. IACR Cryptol. ePrint Arch. 2013: 93 (2013) - [i14]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
On the security of a certi cateless signature scheme in the standard model. IACR Cryptol. ePrint Arch. 2013: 153 (2013) - 2012
- [j35]Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin, Yanjiong Wang:
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks. Ad Hoc Sens. Wirel. Networks 16(1-3): 29-44 (2012) - [j34]Jie Zhang, ShouChao Song, Jiao Du, Qiaoyan Wen:
On the construction of multi-output Boolean functions with optimal algebraic immunity. Sci. China Inf. Sci. 55(7): 1617-1623 (2012) - [j33]Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin:
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2): 188-195 (2012) - [j32]Xin Liao, Qiao-Yan Wen, Ze-li Zhao, Jie Zhang:
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function. Fundam. Informaticae 118(3): 281-289 (2012) - [j31]Lu Zhao, Qiao-Yan Wen, Jie Zhang, Zhengping Jin:
On the 2-Adic Complexity of Periodic Binary Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 367-371 (2012) - [j30]Xin Liao, Qiaoyan Wen, Jie Zhang:
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1189-1192 (2012) - [j29]Huijuan Zuo, Qiaoyan Wen, Xiuwen Ma, Jie Zhang:
A General Construction of Low Correlation Zone Sequence Sets Based on Finite Fields and Balanced Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1792-1795 (2012) - [j28]Xuan Zhang, Jing Qin, Qiaoyan Wen, Jie Zhang:
A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1801-1805 (2012) - [j27]Ping Zhu, Qiaoyan Wen:
Entropy and co-entropy of a covering approximation space. Int. J. Approx. Reason. 53(4): 528-540 (2012) - [j26]Ping Zhu, Qiaoyan Wen:
Information-theoretic measures associated with rough set approximations. Inf. Sci. 212: 33-43 (2012) - [j25]Lu Zhao, Qiao-Yan Wen:
On the joint 2-adic complexity of binary multisequences. RAIRO Theor. Informatics Appl. 46(3): 401-412 (2012) - [j24]Min Zhang, Jie Zhang, Zhengping Jin, Hua Zhang, Qiao-Yan Wen:
A Light-Weight Rainbow Signature Scheme for WSN. J. Networks 7(8): 1272-1279 (2012) - [j23]Jia-Jun Ma, Fen-Zhuo Guo, Qian Yang, Yan-Bing Li, Qiao-Yan Wen:
Semi-loss-tolerant strong coin flipping protocol using EPR pairs. Quantum Inf. Comput. 12(5-6): 490-501 (2012) - [j22]Ying Sun, Fei Gao, Zheng Yuan, Yan-Bing Li, Qiao-Yan Wen:
Splitting a quantum secret without the assistance of entanglements. Quantum Inf. Process. 11(6): 1741-1750 (2012) - [c35]Zhaoxing Wang, Qiaoyan Wen, Yi Sun, Hua Zhang:
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks. CIT 2012: 921-925 - [c34]Han Qian, Qiaoyan Wen:
A cloud-based system for enhancing security of Android devices. CCIS 2012: 245-249 - [c33]Yang Yu, Qiaoyan Wen:
The design of the cloud mobile OA system. CCIS 2012: 250-254 - [c32]Zhaohai Zhang, Qiaoyan Wen:
An authorization model for multi-tenancy services in cloud. CCIS 2012: 260-263 - [c31]Xiaowei Li, Hongxiang Sun, Qiaoyan Wen:
An approach for secure-communication between XEN virtual machines. CCIS 2012: 283-286 - [c30]Wei Chen, Qiaoyan Wen:
An architecture for dynamic management and monitoring of virtual machines. CCIS 2012: 444-448 - [c29]Wei Chen, Qiaoyan Wen, Bohou Li:
A propagation model of passive social network worm. CCIS 2012: 524-528 - [c28]Haiguo He, Jiao Mo, Qiaoyan Wen, Zishan Meng:
Node information in WSN from the business perspective. CCIS 2012: 1028-1031 - [c27]Jie Cui, Qiaoyan Wen:
Analysis on Operating Mechanism of SecurityKISS. CIS 2012: 666-669 - [c26]Ya-Jun Fan, Qiao-Yan Wen:
A smart card-based secure software distribution scheme for mobile application market. CSCWD 2012: 244-250 - [c25]Zhao Zhang, Qiao-Yan Wen, Wen Tang:
Mining Protocol State Machines by Interactive Grammar Inference. ICDMA 2012: 524-527 - [c24]Zhaoxing Wang, Qiaoyan Wen, Teng Wang, Hua Zhang:
A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set. ICEBE 2012: 260-264 - [c23]Yanfang Wu, Zheng Huang, Jie Zhang, Qiaoyan Wen:
A lattice-based digital signature from the Ring-LWE. IC-NIDC 2012: 646-651 - [i13]Ping Zhu, Qiaoyan Wen:
Operations on soft sets revisited. CoRR abs/1205.2857 (2012) - 2011
- [j21]Ping Zhu, Qiaoyan Wen:
Affine braid groups: a better platform than braid groups for cryptology? Appl. Algebra Eng. Commun. Comput. 22(5-6): 375-391 (2011) - [j20]Ping Zhu, Qiaoyan Wen:
Homomorphisms between fuzzy information systems revisited. Appl. Math. Lett. 24(9): 1548-1553 (2011) - [j19]Zhengping Jin, Qiaoyan Wen:
Certificateless multi-proxy signature. Comput. Commun. 34(3): 344-352 (2011) - [j18]Xuan Zhang, Qiaoyan Wen, Jie Zhang:
A General Construction of ZCZ Sequence Set with Large Family Size and Long Period. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 420-423 (2011) - [j17]Xiuwen Ma, Qiaoyan Wen, Jie Zhang:
New Constructions of Binary Sequences with Optimal Autocorrelation Magnitude Based on Interleaving Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(8): 1760-1763 (2011) - [j16]Huijuan Wang, Qiaoyan Wen, Jie Zhang:
2-Adic Complexity of Self-Shrinking Sequence. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(11): 2462-2465 (2011) - [j15]Xiuwen Ma, Qiaoyan Wen, Jie Zhang, Xuan Zhang:
New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(12): 2874-2878 (2011) - [j14]Ping Zhu, Qiaoyan Wen:
A note on communicating between information systems based on including degrees. Int. J. Gen. Syst. 40(8): 837-840 (2011) - [j13]Xin Liao, Qiao-Yan Wen, Jie Zhang:
A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1): 1-8 (2011) - [j12]Ting-Ting Song, Jie Zhang, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Finite-key analysis for quantum key distribution with decoy states. Quantum Inf. Comput. 11(5&6): 374-389 (2011) - [j11]Tian-Yin Wang, Qiao-Yan Wen:
Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11(5&6): 434-443 (2011) - [j10]Yu-Guang Yang, Yi-Wei Teng, Hai-Ping Chai, Qiao-Yan Wen:
Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. Quantum Inf. Process. 10(3): 317-323 (2011) - [c22]Xiaobiao Li, Qiaoyan Wen:
A revocation scheme for the cloud computing environment. CCIS 2011: 254-258 - [c21]Sha Shi, Qiaoyan Wen, Mingzhu Li:
Research on Mobile Electronically Published Materials Protection. CSISE (1) 2011: 125-130 - [c20]Tao Yan, Qiaoyan Wen:
Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology. CSISE (1) 2011: 143-149 - [c19]Huixiang Zhou, Qiaoyan Wen, Xiaojun Yu:
A Productive Time Length-Based Method for Multi-tenancy-Oriented Service Usage Metering and Billing. CSISE (1) 2011: 163-168 - [c18]Xiaolan Zhang, Hongxiang Sun, Qiaoyan Wen, Shi Sha:
Study on the Technology of the Secure Computation in the Different Adversarial Models. CSISE (1) 2011: 473-478 - [c17]Xin Liao, Qiao-Yan Wen, Sha Shi:
Distributed Steganography. IIH-MSP 2011: 153-156 - [c16]Yi Sun, Hongxiang Sun, Qiaoyan Wen, Hua Zhang:
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model. IPTC 2011: 5-8 - [i12]Ping Zhu, Qiaoyan Wen:
Information-theoretic measures associated with rough set approximations. CoRR abs/1102.0079 (2011) - [i11]Min Zhang, Jie Zhang, Qiao-Yan Wen, Zhengping Jin, Hua Zhang:
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing. CoRR abs/1112.0649 (2011) - 2010
- [j9]Zhengping Jin, Qiaoyan Wen, Hongzhen Du:
An improved semantically-secure identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 36(3): 545-552 (2010) - [j8]Xuan Zhang, Qiaoyan Wen, Jie Zhang:
New General Constructions of LCZ Sequence Sets Based on Interleaving Technique and Affine Transformations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(5): 942-949 (2010) - [j7]Ping Zhu, Qiaoyan Wen:
Some improved results on communication between information systems. Inf. Sci. 180(18): 3521-3531 (2010) - [j6]Xin Liao, Qiao-Yan Wen, Ying Sun, Jie Zhang:
Multi-party covert communication with steganography and quantum secret sharing. J. Syst. Softw. 83(10): 1801-1804 (2010) - [c15]Ping Zhu, Qiaoyan Wen:
Probabilistic Soft Sets. GrC 2010: 635-638 - [c14]Yi Sun, Hongxiang Sun, Hua Zhang, Qiao-Yan Wen:
A Secure Protocol for Point-Segment Position Problem. WISM 2010: 212-219 - [i10]Ping Zhu, Qiaoyan Wen:
A note on "communicating between information systems". CoRR abs/1002.0449 (2010) - [i9]Ping Zhu, Qiaoyan Wen:
Homomorphisms between fuzzy information systems revisited. CoRR abs/1002.0908 (2010) - [i8]Ping Zhu, Qiaoyan Wen:
A note on communicating between information systems based on including degrees. CoRR abs/1008.1484 (2010) - [i7]Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model. IACR Cryptol. ePrint Arch. 2010: 252 (2010)
2000 – 2009
- 2009
- [j5]Hongzhen Du, Qiaoyan Wen:
Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 31(2): 390-394 (2009) - [j4]Hua Zhang, Qiao-Yan Wen, Jie Zhang, Wenmin Li:
A constant rounds group key agreement protocol without using hash functions. Int. J. Netw. Manag. 19(6): 457-464 (2009) - [j3]Su-Juan Qin, Fei Gao, Qiao-Yan Wen, Fu-Chen Zhu:
Security of quantum secret sharing with two-particle entanglement against individual attacks. Quantum Inf. Comput. 9(9&10): 765-772 (2009) - 2008
- [c13]Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. CSSE (3) 2008: 555-558 - [c12]Wenmin Li, Qiao-Yan Wen:
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves. CSSE (3) 2008: 1003-1006 - [c11]Qing Zhang, Qiaoyan Wen, Gengli Chen:
Efficient Fair Contract Signing Protocol from Bilinear Pairings. ISECS 2008: 333-337 - [i6]Zhengping Jin, Huijuan Zuo, Hongzhen Du, Qiaoyan Wen:
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs. IACR Cryptol. ePrint Arch. 2008: 195 (2008) - [i5]Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. IACR Cryptol. ePrint Arch. 2008: 255 (2008) - [i4]Lu Zhao, Qiao-Yan Wen:
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period. IACR Cryptol. ePrint Arch. 2008: 259 (2008) - [i3]Hongzhen Du, Qiaoyan Wen:
Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme. IACR Cryptol. ePrint Arch. 2008: 297 (2008) - 2007
- [j2]Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu:
A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7(4): 329-334 (2007) - [c10]Hongzhen Du, Qiaoyan Wen:
An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings. CIS 2007: 725-729 - [c9]Yu-Ying Li, Lixiang Li, Qiaoyan Wen, Yixian Yang:
Integer Programming via Chaotic Ant Swarm. ICNC (4) 2007: 489-493 - [c8]Xiufeng Zhang, Qiaoyan Wen, Fu-Chen Zhu:
Object-Oriented Quantum Cryptography Simulation Model. ICNC (4) 2007: 599-602 - [i2]Hongzhen Du, Qiaoyan Wen:
Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2007: 250 (2007) - 2006
- [c7]Pinhui Ke, Jie Zhang, Qiaoyan Wen:
Results on Almost Resilient Functions. ACNS 2006: 421-432 - [c6]Xin Tong, Jie Zhang, Qiao-Yan Wen:
New Constructions of Large Binary Sequences Family with Low Correlation. Inscrypt 2006: 42-53 - [c5]Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang:
An ID-Based Watermarking Scheme for Java Programs. EUC Workshops 2006: 848-857 - [c4]Yu-Ying Li, Lixiang Li, Qiao-Yan Wen, Yixian Yang:
Data Fitting Via Chaotic Ant Swarm. ICNC (2) 2006: 180-183 - 2005
- [j1]Tailin Liu, Qiaoyan Wen, Zihui Liu:
Construction of nonbinary quantum cyclic codes by using graph method. Sci. China Ser. F Inf. Sci. 48(6): 693-702 (2005) - [c3]Pinhui Ke, Tailin Liu, Qiao-Yan Wen:
Constructions of Almost Resilient Functions. CANS 2005: 236-246 - [c2]Fengtong Wen, Wenling Wu, Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation. CIS (2) 2005: 62-67 - [c1]Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu:
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. CISC 2005: 302-312 - [i1]Pinhui Ke, Jie Zhang, Qiaoyan Wen:
Further Constructions of Almost Resilient Functions. IACR Cryptol. ePrint Arch. 2005: 453 (2005)
Coauthor Index
aka: Sujuan Qin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint