Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chunzhi
    Last name: Wang
    DBLP: 35/1681
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 28 of 28  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Lingyu Yan, Fuhao Zou, Rui Guo, Lianli Gao, Ke Zhou, Chunzhi Wang.
    Feature aggregating hashing for image copy detection.
    World Wide Web 2016, Volume 19 (0) 2016
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu.
    Functional Encryption Resilient to Hard-to-Invert Leakage.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Lingyu Yan, Hefei Ling, Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen.
    Feature Fusion based Hashing for Large Scale Image Copy Detection.
    Int. J. Computational Intelligence Systems 2015, Volume 8 (0) 2015
    Conference paper
    Chunzhi Wang, Dongyang Yu, Hongwei Chen, Hui Xu.
    Applying Bayesian Trust Sampling to P2P Traffic Inspection.
    Control and Intelligent Systems 2015, Volume 43 (0) 2015
    Conference paper
    Chunzhi Wang, Yanmei Zhang.
    New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chunzhi Wang, Huili Zhang, Zhiwei Ye, Yuanli Du.
    A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm.
    IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015, Warsaw, Poland, September 24-26, 2015 2015 (0) 2015
    Conference paper
    Chunzhi Wang, Huili Zhang, Zhiwei Ye.
    A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm.
    IJWMIP 2015, Volume 13 (0) 2015
    Journal article
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang 0003.
    CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Chunzhi Wang, Shuping Wang, Hui Xu, Hongwei Chen.
    A P2P Traffic Management Model Based on an ISP Game.
    JCP 2014, Volume 9 (0) 2014
    Journal article
    Chunzhi Wang, Shuping Wang, Hongwei Chen.
    A LRU-Based Query Algorithm for Gnutella Networks.
    Control and Intelligent Systems 2014, Volume 42 (0) 2014
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Kirill Morozov.
    LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
    The Journal of Supercomputing 2014, Volume 70 (0) 2014
    Conference paper
    Mingwu Zhang, Bo Yang 0003, Chunzhi Wang, Tsuyoshi Takagi.
    Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi.
    Fully secure constructions of spatial encryption with vector privacy.
    Int. J. Communication Systems 2014, Volume 27 (0) 2014
    Conference paper
    Chunzhi Wang, Dongyang Yu, Hui Xu, Hongwei Chen.
    A Bayesian trust sampling method for P2P traffic inspection.
    Proceedings IEEE International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2014, Wuhan, China, October 18-19, 2014 2014 (0) 2014
    Conference paper
    Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu.
    Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu.
    Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
    Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings 2013 (0) 2013
    Journal article
    Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi.
    Public Key Replacement and Universal Forgery of a SCLS Scheme.
    I. J. Network Security 2013, Volume 15 (0) 2013
    Conference paper
    Hongwei Chen, Shuping Wang, Hui Xu, Zhiwei Ye, Chunzhi Wang.
    Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information.
    JSW 2013, Volume 8 (0) 2013
    Conference paper
    Hongwei Chen, Chunhua Zhang, Xinlu Zong, Chunzhi Wang.
    LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH.
    JSW 2013, Volume 8 (0) 2013
    Journal article
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen.
    Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
    I. J. Network Security 2012, Volume 14 (0) 2012
    Conference paper
    Dan Zhang, Jianjia Pan, Yuan Yan Tang, Chunzhi Wang.
    Illumination invariant face recognition based on the new phase features.
    Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Istanbul, Turkey, 10-13 October 2010 2010 (0) 2010
    Conference paper
    Chunzhi Wang, Hongwei Chen, Ke Zhou, Hui Xu, Zhiwei Ye.
    A Peer-to-Peer Game Model using Punishment Strategies.
    JNW 2010, Volume 5 (0) 2010
    Conference paper
    Hongwei Chen, Xin Zhou, Fangping You, Hui Xu, Chunzhi Wang, Zhiwei Ye.
    A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode.
    JNW 2010, Volume 5 (0) 2010
    Conference paper
    Weixing Wang, Chunzhi Wang, Yanzhong Hu, Wei Liu.
    A Delineation Algorithm for Particle Images Online.
    Modelling, Computation and Optimization in Information Systems and Management Sciences, Second International Conference, MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Chunzhi Wang, Miao Shao, Jing Xia, Huachao Chen.
    Research and Design of Remote Education System Based on CSCW.
    Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II 2004 (0) 2003
    Show item 1 to 28 of 28  

    Your query returned 28 matches in the database.