Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chunzhi
    Last name: Wang
    DBLP: 35/1681
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 28  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Lingyu Yan, Fuhao Zou, Rui Guo, Lianli Gao, Ke Zhou, Chunzhi Wang.
    Feature aggregating hashing for image copy detection.
    World Wide Web 2016, Volume 19 (0) 2016
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu.
    Functional Encryption Resilient to Hard-to-Invert Leakage.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Lingyu Yan, Hefei Ling, Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen.
    Feature Fusion based Hashing for Large Scale Image Copy Detection.
    Int. J. Computational Intelligence Systems 2015, Volume 8 (0) 2015
    Conference paper
    Chunzhi Wang, Dongyang Yu, Hongwei Chen, Hui Xu.
    Applying Bayesian Trust Sampling to P2P Traffic Inspection.
    Control and Intelligent Systems 2015, Volume 43 (0) 2015
    Conference paper
    Chunzhi Wang, Yanmei Zhang.
    New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chunzhi Wang, Huili Zhang, Zhiwei Ye, Yuanli Du.
    A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm.
    IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015, Warsaw, Poland, September 24-26, 2015 2015 (0) 2015
    Conference paper
    Chunzhi Wang, Huili Zhang, Zhiwei Ye.
    A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm.
    IJWMIP 2015, Volume 13 (0) 2015
    Journal article
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang 0003.
    CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Show item 1 to 10 of 28  

    Your query returned 28 matches in the database.