Jianghong Wei
Jianghong Wei
Unknown affiliation
Verified email at
Cited by
Cited by
An improved authentication scheme for telecare medicine information systems
J Wei, X Hu, W Liu
Journal of medical systems 36 (6), 3597-3604, 2012
A certificateless aggregate signature scheme for healthcare wireless sensor network
P Kumar, S Kumari, V Sharma, AK Sangaiah, J Wei, X Li
Sustainable Computing: Informatics and Systems 18, 80-89, 2018
Secure data sharing in cloud computing using revocable-storage identity-based encryption
J Wei, W Liu, X Hu
IEEE Transactions on Cloud Computing 6 (4), 1136-1148, 2018
RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud
J Wei, X Chen, X Huang, X Hu, W Susilo
IEEE Transactions on Dependable and Secure Computing 18 (5), 2301-2315, 2021
Secure and efficient attribute-based access control for multiauthority cloud storage
J Wei, W Liu, X Hu
IEEE Systems Journal 12 (2), 1731-1742, 2018
Blockchain-based secure deduplication and shared auditing in decentralized storage
G Tian, Y Hu, J Wei, Z Liu, X Huang, X Chen, W Susilo
IEEE Transactions on Dependable and Secure Computing 19 (6), 3941 - 3954, 2022
Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture
J Wei, W Liu, X Hu
Wireless personal communications 77, 2255-2269, 2014
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme
J Wei, W Liu, X Hu
International Journal of Network Security 18 (4), 782-792, 2016
Fuzzy c‐Means and Cluster Ensemble with Random Projection for Big Data Clustering
M Ye, W Liu, J Wei, X Hu
Mathematical Problems in Engineering 2016 (1), 6529794, 2016
Forward-secure puncturable identity-based encryption for securing cloud emails
J Wei, X Chen, J Wang, X Hu, J Ma
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
Traceable attribute‐based signcryption
J Wei, X Hu, W Liu
Security and Communication Networks 7 (12), 2302-2317, 2014
Enabling (end-to-end) encrypted cloud emails with practical forward secrecy
J Wei, X Chen, J Wang, X Hu, J Ma
IEEE Transactions on Dependable and Secure Computing 19 (4), 2318 - 2332, 2022
An efficient biometric identification in cloud computing with enhanced privacy security
C Liu, X Hu, Q Zhang, J Wei, W Liu
IEEE Access 7, 105363-105375, 2019
Forward-secure identity-based signature with efficient revocation
J Wei, W Liu, X Hu
International Journal of Computer Mathematics 94 (7), 1390-1411, 2017
A two-phase algorithm for generating synthetic graph under local differential privacy
Y Zhang, J Wei, X Zhang, X Hu, W Liu
Proceedings of the 8th International Conference on Communication and Network …, 2018
Secure control protocol for universal serial bus mass storage devices
J Wei, W Liu, X Hu
IET Computers & Digital Techniques 9 (6), 321-327, 2015
VRBC: a verifiable redactable blockchain with efficient query and integrity auditing
G Tian, J Wei, M Kutyłowski, W Susilo, X Huang, X Chen
IEEE Transactions on Computers 72 (7), 1928-1942, 2023
Forward and backward secure fuzzy encryption for data sharing in cloud computing
J Wei, X Hu, W Liu, Q Zhang
Soft Computing 23 (2), 497-506, 2019
Text clustering algorithm based on deep representation learning
B Wang, W Liu, Z Lin, X Hu, J Wei, C Liu
The Journal of Engineering 2018 (16), 1407-1414, 2018
PMDP: A framework for preserving multiparty data privacy in cloud computing
J Li, J Wei, W Liu, X Hu
Security and Communication Networks 2017 (1), 6097253, 2017
The system can't perform the operation now. Try again later.
Articles 1–20