Follow
Jianghong Wei
Jianghong Wei
Unknown affiliation
Verified email at xidian.edu.cn
Title
Cited by
Cited by
Year
An improved authentication scheme for telecare medicine information systems
J Wei, X Hu, W Liu
Journal of medical systems 36 (6), 3597-3604, 2012
2232012
A certificateless aggregate signature scheme for healthcare wireless sensor network
P Kumar, S Kumari, V Sharma, AK Sangaiah, J Wei, X Li
Sustainable Computing: Informatics and Systems 18, 80-89, 2018
1352018
Secure data sharing in cloud computing using revocable-storage identity-based encryption
J Wei, W Liu, X Hu
IEEE Transactions on Cloud Computing 6 (4), 1136-1148, 2018
1102018
RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud
J Wei, X Chen, X Huang, X Hu, W Susilo
IEEE Transactions on Dependable and Secure Computing 18 (5), 2301-2315, 2021
1002021
Secure and efficient attribute-based access control for multiauthority cloud storage
J Wei, W Liu, X Hu
IEEE Systems Journal 12 (2), 1731-1742, 2018
732018
Blockchain-based secure deduplication and shared auditing in decentralized storage
G Tian, Y Hu, J Wei, Z Liu, X Huang, X Chen, W Susilo
IEEE Transactions on Dependable and Secure Computing 19 (6), 3941 - 3954, 2022
602022
Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture
J Wei, W Liu, X Hu
Wireless personal communications 77, 2255-2269, 2014
452014
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme
J Wei, W Liu, X Hu
International Journal of Network Security 18 (4), 782-792, 2016
352016
Fuzzy-means and cluster ensemble with random projection for big data clustering
M Ye, W Liu, J Wei, X Hu
Mathematical Problems in Engineering 2016, 2016
322016
Traceable attribute‐based signcryption
J Wei, X Hu, W Liu
Security and Communication Networks 7 (12), 2302-2317, 2014
302014
Forward-secure puncturable identity-based encryption for securing cloud emails
J Wei, X Chen, J Wang, X Hu, J Ma
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
292019
Enabling (end-to-end) encrypted cloud emails with practical forward secrecy
J Wei, X Chen, J Wang, X Hu, J Ma
IEEE Transactions on Dependable and Secure Computing 19 (4), 2318 - 2332, 2022
252022
An efficient biometric identification in cloud computing with enhanced privacy security
C Liu, X Hu, Q Zhang, J Wei, W Liu
IEEE Access 7, 105363-105375, 2019
232019
Forward-secure identity-based signature with efficient revocation
J Wei, W Liu, X Hu
International Journal of Computer Mathematics 94 (7), 1390-1411, 2017
222017
A two-phase algorithm for generating synthetic graph under local differential privacy
Y Zhang, J Wei, X Zhang, X Hu, W Liu
Proceedings of the 8th International Conference on Communication and Network …, 2018
212018
Secure control protocol for universal serial bus mass storage devices
J Wei, W Liu, X Hu
IET Computers & Digital Techniques 9 (6), 321-327, 2015
212015
Forward and backward secure fuzzy encryption for data sharing in cloud computing
J Wei, X Hu, W Liu, Q Zhang
Soft Computing 23 (2), 497-506, 2019
162019
PMDP: A framework for preserving multiparty data privacy in cloud computing
J Li, J Wei, W Liu, X Hu
Security and Communication Networks 2017, 2017
142017
Text clustering algorithm based on deep representation learning
B Wang, W Liu, Z Lin, X Hu, J Wei, C Liu
The Journal of Engineering 2018 (16), 1407-1414, 2018
132018
Revocable threshold attribute-based signature against signing key exposure
J Wei, X Huang, X Hu, W Liu
International Conference on Information Security Practice and Experience …, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20