H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 30 Citations 4,483 174 World Ranking 8781 National Ranking 819

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • Operating system

His primary areas of investigation include Computer security, Computer network, Authentication, Public-key cryptography and Cryptography. His research in Computer security intersects with topics in Certificate, Cloud computing and Digital signature. The Cloud computing study which covers Cryptographic protocol that intersects with Cloud storage.

His Message authentication code study in the realm of Authentication connects with subjects such as Vehicular ad hoc network. His Public-key cryptography study is associated with Encryption. His Cryptography research incorporates elements of Random oracle and Secure communication.

His most cited work include:

  • A Scalable Robust Authentication Protocol for Secure Vehicular Communications (223 citations)
  • Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications (175 citations)
  • Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack (136 citations)

What are the main themes of his work throughout his whole career to date?

Qianhong Wu mostly deals with Computer security, Encryption, Computer network, Public-key cryptography and Cryptography. His Cloud computing research extends to the thematically linked field of Computer security. His work in Encryption addresses issues such as Theoretical computer science, which are connected to fields such as Standard model, Distributed computing and Hash function.

In the subject of general Computer network, his work in Authentication, Key distribution, Cryptographic primitive and Message authentication code is often linked to Vehicular ad hoc network, thereby combining diverse domains of study. The Authentication study combines topics in areas such as Information security and Protocol. Qianhong Wu has included themes like Key escrow, Certificateless cryptography and Digital signature in his Cryptography study.

He most often published in these fields:

  • Computer security (52.94%)
  • Encryption (36.90%)
  • Computer network (35.29%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (52.94%)
  • Encryption (36.90%)
  • Cloud computing (15.51%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Encryption, Cloud computing, Blockchain and Cryptography. His work on Cloud storage, Public-key cryptography, Authentication and Security token as part of general Computer security study is frequently linked to TRACE, therefore connecting diverse disciplines of science. His Encryption study incorporates themes from Key and Access control.

The various areas that Qianhong Wu examines in his Cloud computing study include Computer data storage and Upload. Qianhong Wu combines subjects such as Payment system, Payment, Cryptocurrency, Database transaction and Computer network with his study of Blockchain. His Cryptography research integrates issues from Group signature and Anonymity.

Between 2017 and 2021, his most popular works were:

  • Bitcoin-based fair payments for outsourcing computations of fog devices (50 citations)
  • Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs (28 citations)
  • Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization (16 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • Operating system

Qianhong Wu mainly focuses on Computer security, Encryption, Ciphertext, Cloud computing and Authentication. His Computer security study frequently draws connections between related disciplines such as Payment. In general Encryption study, his work on Cloud storage often relates to the realm of Data sharing, thereby connecting several areas of interest.

His Cloud computing research incorporates themes from Keyword search, Broadcast encryption and Server. His work deals with themes such as Key management, Password, Overhead and Authorization, which intersect with Authentication. The concepts of his Blockchain study are interwoven with issues in Cryptocurrency, Computer network and Digital signature.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

A Scalable Robust Authentication Protocol for Secure Vehicular Communications

Lei Zhang;Qianhong Wu;Agusti Solanas;Josep Domingo-Ferrer.
IEEE Transactions on Vehicular Technology (2010)

320 Citations

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack

Peng Xu;Hai Jin;Qianhong Wu;Wei Wang.
IEEE Transactions on Computers (2013)

251 Citations

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications

Qianhong Wu;J. Domingo-Ferrer;U. Gonzalez-Nicolas.
IEEE Transactions on Vehicular Technology (2010)

250 Citations

Asymmetric Group Key Agreement

Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)

216 Citations

Efficient many-to-one authentication with certificateless aggregate signatures

Lei Zhang;Bo Qin;Qianhong Wu;Futai Zhang.
Computer Networks (2010)

153 Citations

Distributed Aggregate Privacy-Preserving Authentication in VANETs

Lei Zhang;Qianhong Wu;Josep Domingo-Ferrer;Bo Qin.
IEEE Transactions on Intelligent Transportation Systems (2017)

153 Citations

Certificate-based signature: security model and efficient construction

Jiguo Li;Xinyi Huang;Yi Mu;Willy Susilo.
european public key infrastructure workshop (2007)

151 Citations

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

Hua Deng;Hua Deng;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer.
Information Sciences (2014)

129 Citations

Identity-based remote data possession checking in public clouds

Huaqun Wang;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer.
Iet Information Security (2014)

107 Citations

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage

Yujue Wang;Yujue Wang;Yujue Wang;Qianhong Wu;Qianhong Wu;Duncan S. Wong;Bo Qin.
european symposium on research in computer security (2014)

103 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Qianhong Wu

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 42

Yi Mu

Yi Mu

Fujian Normal University

Publications: 39

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 35

Debiao He

Debiao He

Wuhan University

Publications: 33

Lei Zhang

Lei Zhang

Southeast University

Publications: 32

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 22

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 22

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 20

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 19

Josep Domingo-Ferrer

Josep Domingo-Ferrer

Rovira i Virgili University

Publications: 19

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 19

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 18

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 18

Jin Li

Jin Li

Guangzhou University

Publications: 17

Jian Shen

Jian Shen

Nanjing University of Information Science and Technology

Publications: 17

Something went wrong. Please try again later.