Zhiguo Wan
Zhiguo Wan
Principal Investigator at Zhejiang Lab, Hangzhou, China
Verified email at
Cited by
Cited by
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Z Wan, RH Deng
IEEE transactions on information forensics and security 7 (2), 743-754, 2011
Anonymous secure routing in mobile ad-hoc networks
B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng
29th annual IEEE international conference on local computer networks, 102-108, 2004
Privacy-aware attribute-based encryption with user accountability
J Li, K Ren, B Zhu, Z Wan
International Conference on Information Security, 347-362, 2009
A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks
F Gao, L Zhu, M Shen, K Sharif, Z Wan, K Ren
IEEE network 32 (6), 184-192, 2018
Privacy preserving cloud data access with multi-authorities
T Jung, XY Li, Z Wan, M Wan
2013 Proceedings IEEE INFOCOM, 2625-2633, 2013
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
T Jung, XY Li, Z Wan, M Wan
IEEE transactions on information forensics and security 10 (1), 190-199, 2014
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing
H Ma, R Zhang, Z Wan, Y Lu, S Lin
IEEE transactions on dependable and secure computing 14 (6), 679-692, 2015
USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks
Z Wan, K Ren, M Gu
IEEE transactions on wireless communications 11 (5), 1922-1932, 2012
Efficient and expressive keyword search over encrypted data in cloud
H Cui, Z Wan, RH Deng, G Wang, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (3), 409-422, 2016
A brief survey on de-anonymization attacks in online social networks
X Ding, L Zhang, Z Wan, M Gu
2010 international conference on computational aspects of social networks …, 2010
VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data
Z Wan, RH Deng
IEEE transactions on dependable and secure computing 15 (6), 1083-1095, 2016
A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT
Y Jia, Y Xiao, J Yu, X Cheng, Z Liang, Z Wan
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1493-1501, 2018
Wiface: a secure geosocial networking system using wifi-based multi-hop manet
L Zhang, X Ding, Z Wan, M Gu, XY Li
Proceedings of the 1st ACM workshop on mobile cloud computing & services …, 2010
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan
IEEE Internet of Things Journal 7 (9), 7851-7867, 2020
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
Z Wan, K Ren, B Zhu, B Preneel, M Gu
IEEE transactions on vehicular technology 59 (2), 519-532, 2009
Enhanced location privacy protection of base station in wireless sensor networks
X Li, X Wang, N Zheng, Z Wan, M Gu
2009 fifth international conference on mobile ad-hoc and sensor networks …, 2009
Anonymous id-based group key agreement for wireless networks
Z Wan, K Ren, W Lou, B Preneel
2008 IEEE Wireless Communications and Networking Conference, 2615-2620, 2008
Mutual privacy-preserving regression modeling in participatory sensing
K Xing, Z Wan, P Hu, H Zhu, Y Wang, X Chen, Y Wang, L Huang
2013 Proceedings IEEE INFOCOM, 3039-3047, 2013
The system can't perform the operation now. Try again later.
Articles 1–20