Wang, Huaxiong
372  results:
Search for persons X
?
1

Universal Gaussian elimination hardware for cryptographic p..:

Hu, Jingwei ; Wang, Wen ; Gaj, Kris..
Journal of Cryptographic Engineering.  14 (2024)  2 - p. 383-397 , 2024
 
?
2

Key-aggregate based access control encryption for flexible ..:

Liu, Jinlu ; Qin, Jing ; Wang, Wenchao..
Computer Standards & Interfaces.  88 (2024)  - p. 103800 , 2024
 
?
3

An Efficient FHE-Enabled Secure Cloud–Edge Computing Archit..:

Zhang, Linru ; Wang, Xiangning ; Wang, Jiabo...
IEEE Internet of Things Journal.  11 (2024)  9 - p. 15272-15284 , 2024
 
?
4

Enabling Threshold Functionality for Private Set Intersecti..:

Hu, Jingwei ; Zhao, Yongjun ; Hong Meng Tan, Benjamin..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 6184-6196 , 2024
 
?
5

Efficient Key-Aggregate Cryptosystem with User Revocation f..:

Liu, Jinlu ; Qin, Jing ; Zhang, Xi.
IEEE Transactions on Knowledge and Data Engineering.  , 2024
 
?
6

Two-Server Verifiable Federated Learning: Unconditional Sec..:

, In: 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD),
Wang, Haofei ; Wang, Li-Ping ; Zhang, Liang Feng. - p. 163-168 , 2024
 
?
8

Fully Dynamic Attribute-Based Signatures for Circuits from ..:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
Ling, San ; Nguyen, Khoa ; Phan, Duong Hieu... - p. 37-73 , 2024
 
?
9

REKS: Role-Based Encrypted Keyword Search With Enhanced Acc..:

Miao, Yinbin ; Li, Feng ; Jia, Xiaohua...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3247-3261 , 2024
 
?
10

Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums..:

Kiah, Han Mao ; Kim, Wilton ; Kruglik, Stanislav..
IEEE Transactions on Information Theory.  70 (2024)  8 - p. 5552-5565 , 2024
 
?
11

DeepDIST: A Black-Box Anti-Collusion Framework for Secure D..:

Cheng, Hang ; Li, Xibin ; Wang, Huaxiong...
IEEE Transactions on Circuits and Systems for Video Technology.  34 (2024)  1 - p. 97-109 , 2024
 
?
 
?
14

KA: Keyword-based auditing with frequency hiding and retrie..:

Xue, Jingting ; Luo, Shuqin ; Deng, Qinfang...
Journal of Systems Architecture.  138 (2023)  - p. 102856 , 2023
 
?
15

k-server Byzantine-Resistant PIR Scheme with Optimal Downlo..:

, In: 2023 IEEE International Symposium on Information Theory (ISIT),
Kruglik, Stanislav ; Dau, Son Hoang ; Mao Kiah, Han. - p. 1532-1537 , 2023
 
1-15