default search action
Shangping Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Yinjuan Deng, Shangping Wang, Qian Zhang:
Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric. J. Inf. Secur. Appl. 85: 103852 (2024) - 2023
- [j40]Qian Zhang, Shangping Wang, Duo Zhang, Jifang Wang, Yinjuan Deng:
Scalable and fault-tolerant selection method of verification and accounting nodes for permissionless blockchain. Comput. Networks 228: 109757 (2023) - [j39]Yujie Liu, Shangping Wang, Duo Zhang, Qian Zhang, Jifang Wang:
Optimal incentive strategy in blockchain-based mobile crowdsensing using game theory. Comput. Networks 237: 110053 (2023) - [j38]Junxin Wang, Shangping Wang, Qian Zhang, Yinjuan Deng:
A two-layer consortium blockchain with transaction privacy protection based on sharding technology. J. Inf. Secur. Appl. 74: 103452 (2023) - [j37]Meijun Duan, Chun Yu, Shangping Wang, Bo Liu:
A differential evolution algorithm with a superior-inferior mutation scheme. Soft Comput. 27(23): 17657-17686 (2023) - [j36]Qian Zhang, Shangping Wang, Duo Zhang, Jifang Wang, Jin Sun:
FortunChain: EC-VRF-Based Scalable Blockchain System for Realizing State Sharding. IEEE Trans. Netw. Serv. Manag. 20(4): 4340-4353 (2023) - [j35]Duo Zhang, Shangping Wang, Qian Zhang, Yaling Zhang:
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain. IEEE Trans. Serv. Comput. 16(6): 4168-4182 (2023) - [j34]Yue Fu, Shangping Wang, Qian Zhang, Duo Zhang:
Game Model of Optimal Quality Experience Strategy for Internet of Vehicles Bandwidth Service Based on DAG Blockchain. IEEE Trans. Veh. Technol. 72(7): 8898-8913 (2023) - 2022
- [j33]Jin Sun, Ying Wu, Shangping Wang, Yixue Fu, Xiao Chang:
Permissioned Blockchain Frame for Secure Federated Learning. IEEE Commun. Lett. 26(1): 13-17 (2022) - [j32]Shangping Wang, Huan Li, Juanjuan Chen, Jifang Wang, Yingjuan Deng:
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices. J. Inf. Secur. Appl. 66: 103134 (2022) - [j31]Xiaojie Zhao, Shangping Wang, Yaling Zhang, Yu Wang:
Attribute-based access control scheme for data sharing on hyperledger fabric. J. Inf. Secur. Appl. 67: 103182 (2022) - [j30]Yinjuan Deng, Shangping Wang, Qian Zhang, Duo Zhang:
A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT. KSII Trans. Internet Inf. Syst. 16(2): 445-466 (2022) - [j29]Qian Zhang, Shangping Wang, Duo Zhang, Jin Sun, Yaling Zhang:
Authorized Data Secure Access Scheme With Specified Time and Relevance Ranked Keyword Search for Industrial Cloud Platforms. IEEE Syst. J. 16(2): 2879-2890 (2022) - 2020
- [j28]Jin Sun, Xiaomin Yao, Shangping Wang, Ying Wu:
Blockchain-Based Secure Storage and Access Scheme For Electronic Medical Records in IPFS. IEEE Access 8: 59389-59401 (2020) - [j27]Jin Sun, Xiaomin Yao, Shangping Wang, Ying Wu:
Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS. IEEE Access 8: 155145-155155 (2020)
2010 – 2019
- 2019
- [j26]Shangping Wang, Shasha Jia, Yaling Zhang:
Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage. IEEE Access 7: 50136-50147 (2019) - [j25]Jin Sun, Lili Ren, Shangping Wang, Xiaomin Yao:
Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage. IEEE Access 7: 66655-66667 (2019) - [j24]Shangping Wang, Lisha Yao, Juanjuan Chen, Yaling Zhang:
KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things. IEEE Access 7: 80675-80696 (2019) - [j23]Yaling Zhang, Zhifeng Hao, Shangping Wang:
A Differential Privacy Support Vector Machine Classifier Based on Dual Variable Perturbation. IEEE Access 7: 98238-98251 (2019) - [j22]Shangping Wang, Dan Zhang, Yaling Zhang:
Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable. IEEE Access 7: 102887-102901 (2019) - [j21]Lihua Liu, Shangping Wang, Bintao He, Duo Zhang:
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment. IEEE Access 7: 109038-109053 (2019) - [j20]Shangping Wang, Xixi Tang, Yaling Zhang, Juanjuan Chen:
Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts. IEEE Access 7: 109439-109453 (2019) - [j19]Shangping Wang, Xu Wang, Yaling Zhang:
A Secure Cloud Storage Framework With Access Control Based on Blockchain. IEEE Access 7: 112713-112725 (2019) - [j18]Shangping Wang, Dongyi Li, Yaling Zhang, Juanjuan Chen:
Smart Contract-Based Product Traceability System in the Supply Chain Scenario. IEEE Access 7: 115122-115133 (2019) - [j17]Shangping Wang, Ru Pei, Yaling Zhang:
EIDM: A Ethereum-Based Cloud User Identity Management Protocol. IEEE Access 7: 115281-115291 (2019) - [j16]Shangping Wang, Yuying Wang, Yaling Zhang:
Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System. IEEE Access 7: 127652-127668 (2019) - [j15]Qian Zhang, Shangping Wang, Duo Zhang, Jifang Wang, Yaling Zhang:
Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications. IEEE Access 7: 137594-137607 (2019) - 2018
- [j14]Shangping Wang, Duo Zhang, Yaling Zhang, Lihua Liu:
Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage. IEEE Access 6: 30444-30457 (2018) - [j13]Shangping Wang, Yinglong Zhang, Yaling Zhang:
A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems. IEEE Access 6: 38437-38450 (2018) - [j12]Yaling Zhang, Shangping Wang, Qing Du:
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model. IEEE Access 6: 65298-65307 (2018) - [j11]Shangping Wang, Xia Zhang, Yaling Zhang:
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf. Secur. 12(2): 141-149 (2018) - [j10]Shangping Wang, Ru Zhao, Yaling Zhang:
Lattice-based ring signature scheme under the random oracle model. Int. J. High Perform. Comput. Netw. 11(4): 332-341 (2018) - 2017
- [j9]Lihua Liu, Shangping Wang, Qiao Yan:
A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 37(1-4): 117-143 (2017) - [j8]Xiaofeng Wang, Xiao Han, Jianghuan Xi, Shangping Wang:
Reversible data hiding in encrypted image with separable data extraction from image decryption. Multim. Tools Appl. 76(5): 6127-6142 (2017) - [c14]Yaling Zhang, Ting Wang, Shangping Wang:
An efficient algorithm for frequent pattern mining based on privacy-preserving. ICNC-FSKD 2017: 1694-1699 - 2016
- [j7]Bingchao Xu, Xiaofeng Wang, Xiaorui Zhou, Jianghuan Xi, Shangping Wang:
Source camera identification from image texture features. Neurocomputing 207: 131-140 (2016) - [j6]Xiaofeng Wang, Guanghui He, Chao Tang, Yali Han, Shangping Wang:
Keypoints-Based Image Passive Forensics Method for Copy-Move Attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3): 1655008:1-1655008:23 (2016) - [c13]Yaling Zhang, Lijun Liu, Shangping Wang:
Multi-User and Keyword-Based Searchable Encryption Scheme. CIS 2016: 223-227 - 2015
- [j5]Shangping Wang, Lihua Liu, Jin Sun, Yaling Zhang:
Multi-party concurrent signatures scheme from lattice. Int. J. Inf. Commun. Technol. 7(2/3): 247-262 (2015) - [c12]Yaling Zhang, Liang Yang, Shangping Wang:
An Efficient Identity-Based Signature Scheme for Vehicular Communications. CIS 2015: 326-330 - 2014
- [c11]Ya-Ling Zhang, Kai Liu, Shang-Ping Wang, Qin-Dong Sun:
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption. CIS 2014: 563-567 - [i2]Shangping Wang, Ru Zhao:
Lattice-Based Ring Signature Scheme under the Random Oracle Model. CoRR abs/1405.3177 (2014) - [i1]Shangping Wang, Fang Feng:
Large Universe Attribute-Based Encryption Scheme from Lattices. CoRR abs/1405.3394 (2014) - 2013
- [j4]Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang:
Newmultivariate hash function quadratic polynomials multiplying linear polynomials. IET Inf. Secur. 7(3): 181-188 (2013) - [c10]Zhipeng Jia, Ya-Ling Zhang, Shang-Ping Wang, Qin-Dong Sun:
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data. CIS 2013: 697-701 - [c9]Shangping Wang, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. INCoS 2013: 568-572 - [c8]Yaling Zhang, Zhipeng Jia, Shangping Wang:
A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System. INCoS 2013: 815-820 - 2011
- [j3]Shangping Wang, Rui Ma, Yaling Zhang, Xiaofeng Wang:
Ring signature scheme based on multivariate public key cryptosystems. Comput. Math. Appl. 62(10): 3973-3979 (2011) - [j2]Xiaofeng Wang, Shangping Wang:
An Identity-Based Mediated Signature Scheme Without Trusted PKG. Informatica (Slovenia) 35(1): 83-90 (2011) - [j1]Shang-Ping Wang, Qiao-Mei Ma, Ya-Ling Zhang, You-Sheng Li:
An Authentication Protocol for RFID Tag and Its Simulation. J. Networks 6(3): 446-453 (2011) - [c7]Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang, Jing Chen:
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images. IWDW 2011: 425-438 - [c6]Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang:
A New Multivariate Hash Function with HAIFA Construction. TrustCom 2011: 884-888 - 2010
- [c5]Xiaofeng Wang, Shangping Wang:
ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid. AICI (2) 2010: 259-266 - [c4]Xizhao Luo, Peide Qian, Yanqin Zhu, Shangping Wang:
Leakage-resilient identity-based encryption scheme. NCM 2010: 324-329
2000 – 2009
- 2008
- [c3]Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang:
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. CSSE (3) 2008: 774-777 - [c2]Shangping Wang, Zhiqiang Chen, Xiaofeng Wang:
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. ISECS 2008: 362-366 - [c1]Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang:
An Improved ID-based Restrictive Partially Blind Signature Scheme. SNPD 2008: 295-300
Coauthor Index
aka: Ya-Ling Zhang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint