D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 4,752 193 World Ranking 9271 National Ranking 927

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • Operating system

His primary areas of investigation include Computer security, Computer network, Authentication, Public-key cryptography and Cryptography. His research in Computer security intersects with topics in Certificate, Cloud computing and Digital signature. The Cloud computing study which covers Cryptographic protocol that intersects with Cloud storage.

His Message authentication code study in the realm of Authentication connects with subjects such as Vehicular ad hoc network. His Public-key cryptography study is associated with Encryption. His Cryptography research incorporates elements of Random oracle and Secure communication.

His most cited work include:

  • A Scalable Robust Authentication Protocol for Secure Vehicular Communications (223 citations)
  • Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications (175 citations)
  • Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack (136 citations)

What are the main themes of his work throughout his whole career to date?

Qianhong Wu mostly deals with Computer security, Encryption, Computer network, Public-key cryptography and Cryptography. His Cloud computing research extends to the thematically linked field of Computer security. His work in Encryption addresses issues such as Theoretical computer science, which are connected to fields such as Standard model, Distributed computing and Hash function.

In the subject of general Computer network, his work in Authentication, Key distribution, Cryptographic primitive and Message authentication code is often linked to Vehicular ad hoc network, thereby combining diverse domains of study. The Authentication study combines topics in areas such as Information security and Protocol. Qianhong Wu has included themes like Key escrow, Certificateless cryptography and Digital signature in his Cryptography study.

He most often published in these fields:

  • Computer security (52.94%)
  • Encryption (36.90%)
  • Computer network (35.29%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (52.94%)
  • Encryption (36.90%)
  • Cloud computing (15.51%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Encryption, Cloud computing, Blockchain and Cryptography. His work on Cloud storage, Public-key cryptography, Authentication and Security token as part of general Computer security study is frequently linked to TRACE, therefore connecting diverse disciplines of science. His Encryption study incorporates themes from Key and Access control.

The various areas that Qianhong Wu examines in his Cloud computing study include Computer data storage and Upload. Qianhong Wu combines subjects such as Payment system, Payment, Cryptocurrency, Database transaction and Computer network with his study of Blockchain. His Cryptography research integrates issues from Group signature and Anonymity.

Between 2017 and 2021, his most popular works were:

  • Bitcoin-based fair payments for outsourcing computations of fog devices (50 citations)
  • Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs (28 citations)
  • Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization (16 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • Operating system

Qianhong Wu mainly focuses on Computer security, Encryption, Ciphertext, Cloud computing and Authentication. His Computer security study frequently draws connections between related disciplines such as Payment. In general Encryption study, his work on Cloud storage often relates to the realm of Data sharing, thereby connecting several areas of interest.

His Cloud computing research incorporates themes from Keyword search, Broadcast encryption and Server. His work deals with themes such as Key management, Password, Overhead and Authorization, which intersect with Authentication. The concepts of his Blockchain study are interwoven with issues in Cryptocurrency, Computer network and Digital signature.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Scalable Robust Authentication Protocol for Secure Vehicular Communications

Lei Zhang;Qianhong Wu;Agusti Solanas;Josep Domingo-Ferrer.
IEEE Transactions on Vehicular Technology (2010)

346 Citations

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

Peng Xu;Hai Jin;Qianhong Wu;Wei Wang.
IEEE Transactions on Computers (2013)

287 Citations

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications

Qianhong Wu;J. Domingo-Ferrer;U. Gonzalez-Nicolas.
IEEE Transactions on Vehicular Technology (2010)

275 Citations

Asymmetric Group Key Agreement

Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)

231 Citations

Distributed Aggregate Privacy-Preserving Authentication in VANETs

Lei Zhang;Qianhong Wu;Josep Domingo-Ferrer;Bo Qin.
IEEE Transactions on Intelligent Transportation Systems (2017)

219 Citations

Efficient many-to-one authentication with certificateless aggregate signatures

Lei Zhang;Bo Qin;Qianhong Wu;Futai Zhang.
Computer Networks (2010)

159 Citations

Certificate-based signature: security model and efficient construction

Jiguo Li;Xinyi Huang;Yi Mu;Willy Susilo.
european public key infrastructure workshop (2007)

154 Citations

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

Hua Deng;Hua Deng;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer.
Information Sciences (2014)

144 Citations

Identity-based remote data possession checking in public clouds

Huaqun Wang;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer.
Iet Information Security (2014)

132 Citations

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage

Yujue Wang;Yujue Wang;Yujue Wang;Qianhong Wu;Qianhong Wu;Duncan S. Wong;Bo Qin.
european symposium on research in computer security (2014)

110 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Qianhong Wu

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 42

Yi Mu

Yi Mu

Fujian Normal University

Publications: 39

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 35

Debiao He

Debiao He

Wuhan University

Publications: 33

Lei Zhang

Lei Zhang

Southeast University

Publications: 32

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 22

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 22

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 20

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 19

Josep Domingo-Ferrer

Josep Domingo-Ferrer

Rovira i Virgili University

Publications: 19

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 19

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 18

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 18

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 17

Jian Shen

Jian Shen

Nanjing University of Information Science and Technology

Publications: 17

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 16

Trending Scientists

Eric Bodden

Eric Bodden

University of Paderborn

Robert A. Shearer

Robert A. Shearer

Facebook (United States)

Youquan Deng

Youquan Deng

Chinese Academy of Sciences

Kamran T. Mahmudov

Kamran T. Mahmudov

Instituto Superior Técnico

Mark A. Spackman

Mark A. Spackman

University of Western Australia

Shu-Shen Li

Shu-Shen Li

Chinese Academy of Sciences

Alfred J. Meixner

Alfred J. Meixner

University of Tübingen

Karl Tryggvason

Karl Tryggvason

Karolinska Institute

Vernon A. Squire

Vernon A. Squire

University of Otago

Daniel M. Alongi

Daniel M. Alongi

Australian Institute of Marine Science

Martin J. Hoogduijn

Martin J. Hoogduijn

Erasmus University Rotterdam

Susan Halabi

Susan Halabi

Duke University

Stanley Fahn

Stanley Fahn

Columbia University

George Kunos

George Kunos

National Institutes of Health

Barak Ariel

Barak Ariel

Hebrew University of Jerusalem

Craig D. Roberts

Craig D. Roberts

Nanjing University

Something went wrong. Please try again later.