Zhiguo Wan
Zhiguo Wan
Associate Professor at the School of Computer Science and Technology, Shandong University
Verified email at sdu.edu.cn - Homepage
Cited by
Cited by
HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Z Wan, RH Deng
IEEE transactions on information forensics and security 7 (2), 743-754, 2011
Anonymous secure routing in mobile ad-hoc networks
B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng
29th annual IEEE international conference on local computer networks, 102-108, 2004
Privacy-aware attribute-based encryption with user accountability
J Li, K Ren, B Zhu, Z Wan
International Conference on Information Security, 347-362, 2009
Privacy preserving cloud data access with multi-authorities
T Jung, XY Li, Z Wan, M Wan
2013 Proceedings IEEE INFOCOM, 2625-2633, 2013
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
T Jung, XY Li, Z Wan, M Wan
IEEE transactions on information forensics and security 10 (1), 190-199, 2014
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks
Z Wan, K Ren, M Gu
IEEE transactions on wireless communications 11 (5), 1922-1932, 2012
A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks
F Gao, L Zhu, M Shen, K Sharif, Z Wan, K Ren
IEEE network 32 (6), 184-192, 2018
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
A brief survey on de-anonymization attacks in online social networks
X Ding, L Zhang, Z Wan, M Gu
2010 international conference on computational aspects of social networks …, 2010
Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing
H Ma, R Zhang, Z Wan, Y Lu, S Lin
IEEE transactions on dependable and secure computing 14 (6), 679-692, 2015
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
Z Wan, K Ren, B Zhu, B Preneel, M Gu
IEEE transactions on vehicular technology 59 (2), 519-532, 2009
Enhanced location privacy protection of base station in wireless sensor networks
X Li, X Wang, N Zheng, Z Wan, M Gu
2009 fifth international conference on mobile ad-hoc and sensor networks …, 2009
Wiface: a secure geosocial networking system using wifi-based multi-hop manet
L Zhang, X Ding, Z Wan, M Gu, XY Li
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services …, 2010
Efficient and expressive keyword search over encrypted data in cloud
H Cui, Z Wan, RH Deng, G Wang, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016
Mutual privacy-preserving regression modeling in participatory sensing
K Xing, Z Wan, P Hu, H Zhu, Y Wang, X Chen, Y Wang, L Huang
2013 Proceedings IEEE INFOCOM, 3039-3047, 2013
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Z Wan, K Ren, B Preneel
Proceedings of the first ACM conference on Wireless network security, 62-67, 2008
Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing
Z Wan, M Gu
International Conference on Information Security Practice and Experience, 98-107, 2011
Anonymous id-based group key agreement for wireless networks
Z Wan, K Ren, W Lou, B Preneel
2008 IEEE Wireless Communications and Networking Conference, 2615-2620, 2008
De-anonymizing dynamic social networks
X Ding, L Zhang, Z Wan, M Gu
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
The system can't perform the operation now. Try again later.
Articles 1–20