default search action
Wenying Zheng
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Huijie Yang, Wenying Zheng, Tao Zhang, Pandi Vijayakumar, Brij B. Gupta, Varsha Arya, Mary Subaja Christo:
A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT. IEEE Internet Things J. 11(10): 18111-18122 (2024) - [j15]Minghua Yuan, Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Fayez Alqahtani, Amr Tolba:
A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments. IEEE Internet Things J. 11(18): 29615-29627 (2024) - [j14]Jinliang Chen, Tianqi Zhou, Sai Ji, Haowen Tan, Wenying Zheng:
Efficient public auditing scheme for non-administrator group with secure user revocation. J. Inf. Secur. Appl. 80: 103676 (2024) - [j13]Yue Zhuang, Chen Wang, Wenying Zheng, Nancy Victor, Thippa Reddy Gadekallu:
ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 1102-1111 (2024) - [j12]Yimeng Gao, Tianqi Zhou, Wenying Zheng, Huijie Yang, Tao Zhang:
High-Availability Authentication and Key Agreement for Internet of Things-Based Devices in Industry 5.0. IEEE Trans. Ind. Informatics 20(12): 13571-13579 (2024) - 2023
- [j11]Sichun Lv, Haowen Tan, Wenying Zheng, Tao Zhang, Menglei Wang:
A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing. Comput. Commun. 209: 239-248 (2023) - [j10]Mengya Chen, Wenying Zheng, Pandi Vijayakumar, Mamoun Alazab, Sivaraman Audithan:
A Multinode Collaborative Decision-Making Scheme for Privacy Protection in IIoT. IEEE Trans. Ind. Informatics 19(12): 11531-11541 (2023) - [j9]Haowen Tan, Wenying Zheng, Pandi Vijayakumar:
Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs. IEEE Trans. Intell. Transp. Syst. 24(6): 6389-6400 (2023) - [j8]Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Kouichi Sakurai, Neeraj Kumar:
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15590-15600 (2023) - [j7]Haowen Tan, Wenying Zheng, Yunguo Guan, Rongxing Lu:
A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications. IEEE Trans. Veh. Technol. 72(3): 3622-3635 (2023) - [c5]Yi Li, Wenying Zheng, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, C. Thamilarasi:
Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing. ISPA/BDCloud/SocialCom/SustainCom 2023: 254-261 - 2022
- [j6]Wenying Zheng, Bing Chen, Debiao He:
An adaptive access control scheme based on trust degrees for edge computing. Comput. Stand. Interfaces 82: 103640 (2022) - [j5]Wenying Zheng, Chin-Feng Lai, Bing Chen:
Blockchain-based access control with k $k$ -times tamper resistance in cloud environment. Int. J. Intell. Syst. 37(10): 7787-7811 (2022) - [j4]Yang Wei, Jianfeng Ma, Zhuzhu Wang, Bin Xiao, Wenying Zheng:
Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces. Int. J. Intell. Syst. 37(11): 8291-8308 (2022) - [c4]Tianqi Zhou, Wenying Zheng, Haowen Tan:
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. NSS 2022: 305-318 - 2021
- [j3]Wenying Zheng, Chin-Feng Lai, Debiao He, Neeraj Kumar, Bing Chen:
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment. IEEE Trans. Ind. Informatics 17(6): 4238-4247 (2021) - 2020
- [j2]Wenying Zheng, Dengzhi Liu, Xiong Li, Arun Kumar Sangaiah:
Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing. Sustain. Comput. Informatics Syst. 28: 100237 (2020)
2010 – 2019
- 2018
- [j1]Chen Wang, Wenying Zheng, Sai Ji, Qi Liu, Anxi Wang:
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks. Wirel. Commun. Mob. Comput. 2018: 4028196:1-4028196:7 (2018) - 2013
- [c3]Wenying Zheng, Kazi Atiqur Rahman, Kemal E. Tepe:
Reliable and energy efficient cooperative relaying scheme (REECR) in wireless sensor networks. IWCMC 2013: 400-405 - 2012
- [c2]Shang Gao, Zhihao Chen, Wenying Zheng, Wenyan Zhou:
An exploratory study on lifestyles and the adoption of mobile services in China. MoMM 2012: 249-252 - [c1]Zhihao Chen, Wenying Zheng, Wenyan Zhou, Shang Gao:
Effect of Lifestyle on the Adoption of Mobile Services. WHICEB 2012: 34
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-06 01:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint