Author image not provided
 Zhiguo Wan

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article7.94
Citation Count143
Publication count18
Publication years2004-2013
Available for download4
Average downloads per article469.00
Downloads (cumulative)1,876
Downloads (12 Months)73
Downloads (6 Weeks)12
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


19 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 19 of 19
Sort by:

1
April 2016 IEEE Transactions on Information Forensics and Security: Volume 11 Issue 4, April 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

Ma et al. recently submitted a comment correspondence which points out a flaw in our paper (a sequel of our earlier paper published in the Proceedings of IEEE INFOCOM ). The flaw led to the leakage of the system-wide master key; therefore, we improved our own scheme by addressing it.

2
November 2013 ISC 2013: Proceedings of the 16th International Conference on Information Security - Volume 7807
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Attribute-based encryption ABE is well suited for fine-grained access control for data residing on a cloud server. However, existing approaches for user revocation are not satisfactory. In this work, we propose a new approach which works by splitting an authorized user's decryption capability between the cloud and the user herself. ...

3 published by ACM
June 2012 MobiHoc '12: Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 9,   Downloads (Overall): 294

Full text available: PDFPDF
Longest-queue-first (LQF) link scheduling is a greedy link scheduling in multihop wireless networks. Its stability performance in single-channel single-radio (SC-SR) wireless networks has been well studied recently. However, its stability performance in multi-channel multi-radio (MC-MR)wireless networks is largely under-explored. In this paper, we present a stability subregion with closed form ...
Keywords: link scheduling, multi-channel multi-radio, stability

4
April 2012 IEEE Transactions on Information Forensics and Security: Volume 7 Issue 2, April 2012
Publisher: IEEE Press
Bibliometrics:
Citation Count: 29

Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) ...

5
May 2011 ISPEC'11: Proceedings of the 7th international conference on Information security practice and experience
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Cloud computing has emerged as the most influential paradigm in recent years. The new computing technology requires users to entrust their data to the cloud provider, which leads to security issues on the outsourced data. In order to achieve scalable, fine-grained and flexible access control for cloud computing, we extends ...

6
September 2010 CASON '10: Proceedings of the 2010 International Conference on Computational Aspects of Social Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Nowadays, online social network data are increasingly made publicly available to third parties. Several anonymization techniques have been studied and adopted to preserve privacy in the publishing of data. However, recent works have shown that de-anonymization of the released data is not only possible but also practical. In this paper, ...
Keywords: Online Social Network, De-anonymization, Privacy

7 published by ACM
June 2010 MCS '10: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4,   Downloads (12 Months): 34,   Downloads (Overall): 635

Full text available: PDFPDF
A number of mobile online social networking (OSN) services appear in the market. Majority of mobile systems can strongly benefit from services offered by cloud. However, centralized servers and communication infrastructures may not always be available. Further their location-based services are not offered to low-end mobile devices without GPS modules. ...
Keywords: WiFi, privacy, social network, MANET, WiFace

8
December 2009 MSN '09: Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 8

Location privacy in wireless sensor networks has gained a wide concern. Particularly, the location privacy of base station requires ultimate protection due to its crucial position in wireless sensor networks. In this paper, we propose an efficient scheme, consisting of anonymous topology discovery and intelligent fake packet injection (IFPI), to ...
Keywords: Location Privacy, Base Station

9
November 2009 GLOBECOM'09: Proceedings of the 28th IEEE conference on Global telecommunications
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

With rapid growth of Online Social Networks (OSN), more and more users are attracted to share their personal information or even cooperate in business via OSN. Therefore, the issues of privacy and security in OSN become more important than ever. In this paper, we address the issue of securely delivering ...
Keywords: identity-based cryptography, key management, security, social networks

10
September 2009 ISC '09: Proceedings of the 12th International Conference on Information Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 30

As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there ...
Keywords: Access control, Anonymity, Ciphertext-policy, Attribute-based, Accountability

11 published by ACM
March 2009 ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 357

Full text available: PDFPDF
Wireless mesh network (WMN) provides a low-cost, convenient solution to the last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are not applicable in WMNs anymore. In this paper, we propose a solution for security and privacy protection for ...
Keywords: information security, wireless mesh networks, anonymous routing

12
January 2009 Journal of Computer Science and Technology: Volume 24 Issue 1, January 2009
Publisher: Institute of Computing Technology
Bibliometrics:
Citation Count: 0

Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- n PAKE + protocol under the setting where each party shares an independent password with a trusted server. ...
Keywords: password-authenticated key exchange, group key agreement, security protocol

13 published by ACM
March 2008 WiSec '08: Proceedings of the first ACM conference on Wireless network security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 20,   Downloads (Overall): 587

Full text available: PDFPDF
Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless networks, we proposed a hierarchical ID-based roaming protocol in this paper. In our scheme, we use ...
Keywords: mobile networks, privacy, roaming protocols

14
December 2007 ICICS'07: Proceedings of the 9th international conference on Information and communications security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a hierarchical group PAKE protocol n PAKE + protocol under the setting where each party shares an independent password with a trusted server. The ...

15
February 2007 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 51 Issue 3, February, 2007
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the ...
Keywords: Access control, Security protocol, Wireless networks

16
June 2006 IEEE Transactions on Wireless Communications: Volume 5 Issue 6, June 2006
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2

The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually ...

17
November 2005 LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Wireless networks have gained overwhelming popularity over their wired counterpart due to their great flexibility and convenience, but access control of wireless networks has been a serious problem because of the open medium. Passwords remain the most popular way for access control as well as authentication and key exchange. But ...
Keywords: Wireless Networks, Security Protocol, Access Control

18
November 2004 LCN '04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 40

Although there are a large number of papers on secure routing in mobile ad-hoc networks, only a few consider the anonymity issue. In this paper, we define more strict requirements on the anonymity and security properties of the routing protocol, and notice that previous research works only provide Weak Location ...

19
August 2004 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 45 Issue 6, 21 August 2004
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 19

Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome this problem, this paper aims at building well established trust relationships in ad hoc networks without relying on any pre-defined assumption. We propose a ...
Keywords: distributed trust model, ad hoc networks, security, trust management



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us