


default search action
Wenzheng Zhang 0001
Person information
- affiliation: Science and Technology on Communication Security Laboratory, Chengdu, China
Other persons with the same name
- Wenzheng Zhang (aka: WenZheng Zhang, Wen-zheng Zhang, Wen-Zheng Zhang) — disambiguation page
- Wenzheng Zhang 0002
— Nankai University, College of Artificial Intelligence, Tianjin, China - Wenzheng Zhang 0003
— Rutgers University, Department of Computer Science, Piscataway, NJ, USA
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j18]Jingting Xue
, Kangyi Liu
, Fagen Li
, Wenzheng Zhang
, Xiaojun Zhang
:
GovLink: Auditable FPH-CP-ABE for Dynamic Revocation and Query Integrity in E-Government. IEEE Internet Things J. 13(2): 3331-3343 (2026)- 2025
[j17]Jingting Xue
, Liang Liu
, Fagen Li
, Ximin Jing
, Wenzheng Zhang
, Xiaojun Zhang
, Yu Zhou:
Attribute-Based Policy-Hiding Redactable Blockchain With Authorizable Verification for Energy Internet. IEEE Internet Things J. 12(15): 29570-29583 (2025)
[j16]Jingting Xue, Lusha Zeng, Wenzheng Zhang, Fagen Li, Xiaojun Zhang, Yu Zhou, Liang Liu:
Incentive-assisted multi-keyword ranked searchable encryption with hidden attributes for community data sharing. Peer Peer Netw. Appl. 18(3): 153 (2025)
[j15]Tao Wang
, Keyong Hong
, Bo Yang
, Qiliang Yang
, Haiyu Li, Wenzheng Zhang
:
Towards Authorization and Batch Validation for NFTs: A Cryptographic Generic Framework. IEEE Trans. Dependable Secur. Comput. 22(6): 6878-6895 (2025)
[j14]Changsong Jiang
, Chunxiang Xu
, Zhen Liu, Xinfeng Dong
, Wenzheng Zhang
:
Threshold Password-Hardening Updatable Oblivious Key Management. IEEE Trans. Inf. Forensics Secur. 20: 4799-4814 (2025)
[j13]Jingting Xue
, Wenyi Li
, Fagen Li
, Wenzheng Zhang
, Yu Zhou, Xiaojun Zhang
:
Efficient Collaborative Data Cleaning Using Private Set Intersection and Encoding for Unbalanced Datasets. IEEE Trans. Inf. Forensics Secur. 20: 8715-8729 (2025)- 2024
[j12]Wei-Tao Song
, Wenzheng Zhang
, Dianhua Tang
, Bin Hu:
A Small-Size FHE Scheme for Better Privacy Protection of IoT. IEEE Internet Things J. 11(7): 12909-12917 (2024)
[j11]Jingting Xue
, Shuqin Luo
, Fagen Li
, Wenzheng Zhang
, Liang Liu
, Yu Zhou, Xiaojun Zhang
:
Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts. IEEE Trans. Cloud Comput. 12(4): 1232-1247 (2024)- 2023
[j10]Yanwei Zhou
, Lei Cao
, Zirui Qiao
, Zhe Xia
, Bo Yang
, Mingwu Zhang
, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023)
[j9]Yanwei Zhou
, Ran Xu, Wenzheng Zhang, Zhe Xia
, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023)
[j8]Jiani Li
, Tao Wang
, Bo Yang
, Qiliang Yang
, Wenzheng Zhang
, Keyong Hong
:
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving. IEEE Trans. Serv. Comput. 16(5): 3182-3195 (2023)- 2022
[j7]Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. Comput. J. 65(7): 1760-1775 (2022)
[j6]Wenzheng Zhang, Shiyun Liu
, Zhe Xia
:
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control. J. Inf. Secur. Appl. 66: 103118 (2022)
2010 – 2019
- 2016
[j5]Yanwei Zhou
, Bo Yang, Wenzheng Zhang:
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204: 185-202 (2016)
[j4]Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:
CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Networks 9(17): 4505-4519 (2016)- 2013
[j3]Jining Zhao, Chunxiang Xu, Fagen Li, Wenzheng Zhang:
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2709-2716 (2013)- 2011
[j2]Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. Int. J. Netw. Secur. 12(1): 50-57 (2011)- 2010
[c7]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang:
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. PAISI 2010: 77-87
2000 – 2009
- 2009
[j1]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Ordered Semiring-based Trust Establish Model with Risk Evaluating. Int. J. Netw. Secur. 8(2): 101-106 (2009)
[c6]Mingwu Zhang, Yusheng Zhong, Bo Yang, Wenzheng Zhang:
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. ICIC (1) 2009: 433-442- 2008
[c5]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. ATC 2008: 516-526
[c4]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. ISI Workshops 2008: 126-137- 2007
[c3]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments. ICNC (5) 2007: 814-818
[c2]Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:
Using Trust Metric to Detect Malicious Behaviors in WSNs. SNPD (3) 2007: 104-108- 2006
[c1]Bo Yang, Piyuan Lin, Wenzheng Zhang:
An Efficient Anonymous Fingerprinting Protocol. CIS 2006: 824-832
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-19 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







