His primary areas of investigation include Computer security, Computer network, Authentication, Public-key cryptography and Cryptography. His research in Computer security intersects with topics in Certificate, Cloud computing and Digital signature. The Cloud computing study which covers Cryptographic protocol that intersects with Cloud storage.
His Message authentication code study in the realm of Authentication connects with subjects such as Vehicular ad hoc network. His Public-key cryptography study is associated with Encryption. His Cryptography research incorporates elements of Random oracle and Secure communication.
Qianhong Wu mostly deals with Computer security, Encryption, Computer network, Public-key cryptography and Cryptography. His Cloud computing research extends to the thematically linked field of Computer security. His work in Encryption addresses issues such as Theoretical computer science, which are connected to fields such as Standard model, Distributed computing and Hash function.
In the subject of general Computer network, his work in Authentication, Key distribution, Cryptographic primitive and Message authentication code is often linked to Vehicular ad hoc network, thereby combining diverse domains of study. The Authentication study combines topics in areas such as Information security and Protocol. Qianhong Wu has included themes like Key escrow, Certificateless cryptography and Digital signature in his Cryptography study.
The scientist’s investigation covers issues in Computer security, Encryption, Cloud computing, Blockchain and Cryptography. His work on Cloud storage, Public-key cryptography, Authentication and Security token as part of general Computer security study is frequently linked to TRACE, therefore connecting diverse disciplines of science. His Encryption study incorporates themes from Key and Access control.
The various areas that Qianhong Wu examines in his Cloud computing study include Computer data storage and Upload. Qianhong Wu combines subjects such as Payment system, Payment, Cryptocurrency, Database transaction and Computer network with his study of Blockchain. His Cryptography research integrates issues from Group signature and Anonymity.
Qianhong Wu mainly focuses on Computer security, Encryption, Ciphertext, Cloud computing and Authentication. His Computer security study frequently draws connections between related disciplines such as Payment. In general Encryption study, his work on Cloud storage often relates to the realm of Data sharing, thereby connecting several areas of interest.
His Cloud computing research incorporates themes from Keyword search, Broadcast encryption and Server. His work deals with themes such as Key management, Password, Overhead and Authorization, which intersect with Authentication. The concepts of his Blockchain study are interwoven with issues in Cryptocurrency, Computer network and Digital signature.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Scalable Robust Authentication Protocol for Secure Vehicular Communications
Lei Zhang;Qianhong Wu;Agusti Solanas;Josep Domingo-Ferrer.
IEEE Transactions on Vehicular Technology (2010)
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Peng Xu;Hai Jin;Qianhong Wu;Wei Wang.
IEEE Transactions on Computers (2013)
Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications
Qianhong Wu;J. Domingo-Ferrer;U. Gonzalez-Nicolas.
IEEE Transactions on Vehicular Technology (2010)
Asymmetric Group Key Agreement
Qianhong Wu;Yi Mu;Willy Susilo;Bo Qin.
international cryptology conference (2009)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
Lei Zhang;Qianhong Wu;Josep Domingo-Ferrer;Bo Qin.
IEEE Transactions on Intelligent Transportation Systems (2017)
Efficient many-to-one authentication with certificateless aggregate signatures
Lei Zhang;Bo Qin;Qianhong Wu;Futai Zhang.
Computer Networks (2010)
Certificate-based signature: security model and efficient construction
Jiguo Li;Xinyi Huang;Yi Mu;Willy Susilo.
european public key infrastructure workshop (2007)
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
Hua Deng;Hua Deng;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer.
Information Sciences (2014)
Identity-based remote data possession checking in public clouds
Huaqun Wang;Qianhong Wu;Bo Qin;Josep Domingo-Ferrer.
Iet Information Security (2014)
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage
Yujue Wang;Yujue Wang;Yujue Wang;Qianhong Wu;Qianhong Wu;Duncan S. Wong;Bo Qin.
european symposium on research in computer security (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Rovira i Virgili University
Southeast University
University of Wollongong
Fujian Normal University
University of New South Wales
Xidian University
Chinese Academy of Sciences
Huazhong University of Science and Technology
Sun Yat-sen University
Fujian Normal University
University of Paderborn
Facebook (United States)
Chinese Academy of Sciences
Instituto Superior Técnico
University of Western Australia
Chinese Academy of Sciences
University of Tübingen
Karolinska Institute
University of Otago
Australian Institute of Marine Science
Erasmus University Rotterdam
Duke University
Columbia University
National Institutes of Health
Hebrew University of Jerusalem
Nanjing University