​
Login / Signup
Feng Wang
ORCID
Publication Activity (10 Years)
Years Active: 2014-2025
Publications (10 Years): 15
Top Topics
Authentication Scheme
Security Analysis
Signature Scheme
Cloud Storage
Top Venues
Int. J. Netw. Secur.
Secur. Commun. Networks
IEEE Access
J. Inf. Hiding Multim. Signal Process.
</>
Publications
</>
Feng Wang
,
Changlu Lin
,
Manli Yuan
Revisiting "online/offline provable data possession" schemes.
Comput. Stand. Interfaces
91 (2025)
Feng Wang
,
Li Xu
,
Jiguo Li
,
Kim-Kwang Raymond Choo
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput.
10 (4) (2022)
Qichao Lai
,
Li Xu
,
Manli Yuan
,
Feng Wang
,
He Fang
User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid.
SPDE
(2020)
Feng Wang
,
Li Xu
,
Kim-Kwang Raymond Choo
,
Yuexin Zhang
,
Huaqun Wang
,
Jiguo Li
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access
8 (2020)
Chenbin Zhao
,
Li Xu
,
Jiguo Li
,
Feng Wang
,
He Fang
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage.
IEEE Access
7 (2019)
Feng Wang
,
Li Xu
,
Huaqun Wang
,
Zhide Chen
Identity-based non-repudiable dynamic provable data possession in cloud storage.
Comput. Electr. Eng.
69 (2018)
Feng Wang
,
Li Xu
,
Wei Gao
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Soc. Syst.
5 (3) (2018)
Feng Wang
,
Chin-Chen Chang
,
Hsiao-Ling Wu
Secure CAS-based authentication scheme for mobile pay-TV systems.
Int. J. Commun. Syst.
30 (10) (2017)
Feng Wang
,
Li Xu
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.
J. Inf. Sci. Eng.
33 (4) (2017)
Feng Wang
,
Wan-Li Lyu
,
Jeng-Shyang Pan
Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format.
IET Image Process.
10 (12) (2016)
Feng Wang
,
Chin-Chen Chang
,
Shih-Chang Chang
Robust off-line e-cash scheme with recoverability and anonymity revocation.
Secur. Commun. Networks
9 (14) (2016)
Feng Wang
,
Chin-Chen Chang
,
Changlu Lin
Security Analysis on Secure Untraceable Off-line Electronic Cash System.
Int. J. Netw. Secur.
18 (3) (2016)
Lein Harn
,
Feng Wang
Threshold Signature Scheme without Using Polynomial Interpolation.
Int. J. Netw. Secur.
18 (4) (2016)
Feng Wang
,
Chin-Chen Chang
,
Changlu Lin
,
Shih-Chang Chang
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
Int. J. Netw. Secur.
18 (1) (2016)
Wan-Li Lyu
,
Chin-Chen Chang
,
Feng Wang
Image Authentication and Self-Recovery Scheme Based on The Rehashing Model.
J. Inf. Hiding Multim. Signal Process.
7 (3) (2016)
Feng Wang
,
Chin-Chen Chang
,
Yeh-Chieh Chou
Group Authentication and Group Key Distribution for Ad Hoc Networks.
Int. J. Netw. Secur.
17 (2) (2015)
Wan-Li Lyu
,
Chin-Chen Chang
,
Feng Wang
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method.
J. Inf. Hiding Multim. Signal Process.
6 (3) (2015)
Feng Wang
,
Li Xu
,
Jeng-Shyang Pan
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
IIH-MSP
(2015)
Feng Wang
,
Chin-Chen Chang
,
Wan-Li Lyu
The credit card visual authentication scheme based on GF(28) field.
Multim. Tools Appl.
74 (24) (2015)
Feng Wang
,
Chin-Chen Chang
,
Lein Harn
Simulatable and secure certificate-based threshold signature without pairings.
Secur. Commun. Networks
7 (11) (2014)