Follow
Zhiguo Wan
Zhiguo Wan
Principal Investigator at Zhejiang Lab, Hangzhou, China
Verified email at zhejianglab.com
Title
Cited by
Cited by
Year
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Z Wan, J Liu, RH Deng
IEEE transactions on information forensics and security 7 (2), 743-754, 2011
735*2011
Anonymous secure routing in mobile ad-hoc networks
B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng
29th annual IEEE international conference on local computer networks, 102-108, 2004
3182004
A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks
F Gao, L Zhu, M Shen, K Sharif, Z Wan, K Ren
IEEE network 32 (6), 184-192, 2018
2712018
Privacy-aware attribute-based encryption with user accountability
J Li, K Ren, B Zhu, Z Wan
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
2612009
Privacy preserving cloud data access with multi-authorities
T Jung, XY Li, Z Wan, M Wan
2013 Proceedings IEEE INFOCOM, 2625-2633, 2013
2212013
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
T Jung, XY Li, Z Wan, M Wan
IEEE transactions on information forensics and security 10 (1), 190-199, 2014
2172014
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1572004
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
1222014
Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing
H Ma, R Zhang, Z Wan, Y Lu, S Lin
IEEE transactions on dependable and secure computing 14 (6), 679-692, 2015
1052015
Efficient and expressive keyword search over encrypted data in cloud
H Cui, Z Wan, RH Deng, G Wang, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016
922016
USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks
Z Wan, K Ren, M Gu
IEEE transactions on wireless communications 11 (5), 1922-1932, 2012
922012
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan
IEEE Internet of Things Journal 7 (9), 7851-7867, 2020
882020
BlockMaze: An efficient privacy-preserving account-model blockchain based on zk-SNARKs
Z Guan, Z Wan, Y Yang, Y Zhou, B Huang
IEEE Transactions on Dependable and Secure Computing 19 (3), 1446-1463, 2020
782020
VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data
Z Wan, RH Deng
IEEE transactions on dependable and secure computing 15 (6), 1083-1095, 2016
762016
A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT
Y Jia, Y Xiao, J Yu, X Cheng, Z Liang, Z Wan
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1493-1501, 2018
662018
A brief survey on de-anonymization attacks in online social networks
X Ding, L Zhang, Z Wan, M Gu
2010 international conference on computational aspects of social networks …, 2010
662010
Wiface: a secure geosocial networking system using wifi-based multi-hop manet
L Zhang, X Ding, Z Wan, M Gu, XY Li
Proceedings of the 1st ACM workshop on mobile cloud computing & services …, 2010
482010
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Z Wan, K Ren, B Preneel
Proceedings of the first ACM conference on Wireless network security, 62-67, 2008
462008
Enhanced location privacy protection of base station in wireless sensor networks
X Li, X Wang, N Zheng, Z Wan, M Gu
2009 fifth international conference on mobile ad-hoc and sensor networks …, 2009
452009
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
Z Wan, K Ren, B Zhu, B Preneel, M Gu
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
452009
The system can't perform the operation now. Try again later.
Articles 1–20