Follow
Mingjun Wang
Title
Cited by
Cited by
Year
Flexible data access control based on trust and reputation in cloud computing
Z Yan, X Li, M Wang, AV Vasilakos
IEEE transactions on cloud Computing 5 (3), 485-498, 2015
1722015
A survey on security in D2D communications
M Wang, Z Yan
Mobile Networks and Applications 22, 195-208, 2017
1292017
Encrypted data management with deduplication in cloud computing
Z Yan, M Wang, Y Li, AV Vasilakos
IEEE Cloud Computing 3 (2), 28-35, 2016
1152016
Privacy-preserving authentication and key agreement protocols for D2D group communications
M Wang, Z Yan
IEEE Transactions on Industrial Informatics 14 (8), 3637-3647, 2017
832017
Security in D2D communications: A review
M Wang, Z Yan
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1199-1204, 2015
822015
UAKA-D2D: Universal authentication and key agreement protocol in D2D communications
M Wang, Z Yan, V Niemi
Mobile networks and Applications 22, 510-525, 2017
632017
Protect pervasive social networking based on two-dimensional trust levels
Z Yan, M Wang
IEEE Systems Journal 11 (1), 207-218, 2014
482014
Is 5G handover secure and private? A survey
D Zhao, Z Yan, M Wang, P Zhang, B Song
IEEE Internet of Things Journal 8 (16), 12855-12879, 2021
312021
Authentication and key agreement in communication network
M Wang, Z Yan
WO Patent WO2017107143A1, 2017
252017
Secure pervasive social networking based on multi-dimensional trust levels
Z Yan, M Wang, V Niemi, R Kantola
2013 IEEE Conference on Communications and Network Security (CNS), 100-108, 2013
222013
Secure pervasive social communications based on trust in a distributed way
C Huang, Z Yan, N Li, M Wang
IEEE Access 4, 9225-9238, 2016
152016
Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
J Zhang, Z Yan, S Fei, M Wang, T Li, H Wang
IEEE Network 36 (1), 105-112, 2021
102021
XAuth: Secure and privacy-preserving cross-domain handover authentication for 5G HetNets
M Wang, D Zhao, Z Yan, H Wang, T Li
IEEE Internet of Things Journal 10 (7), 5962-5976, 2022
82022
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems
D Wang, B Song, Y Liu, M Wang
Digital Communications and Networks 8 (5), 625-635, 2022
72022
AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications
M Wang, Z Yan, B Song, M Atiquzzaman
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
72019
A scheme to secure instant community data access based on trust and contexts
Z Yan, M Wang, P Zhang
2014 IEEE International Conference on Computer and Information Technology …, 2014
62014
Encrypted big data deduplication in cloud storage
Z Yan, X Liang, W Ding, X Yu, M Wang, RH Deng
Smart Data, 63-92, 2019
52019
Securing communication data in pervasive social networking based on trust with KP-ABE
N Li, Z Yan, M Wang, LT Yang
ACM Transactions on Cyber-Physical Systems 3 (1), 1-23, 2018
52018
Security Design for D2D
M Wang, Z Yan
Wiley 5G Ref: The Essential 5G Reference Online, 1-20, 2019
32019
Privacy preserving authentication and key agreement protocol for apparatus-to-apparatus communication
M Wang, Z Yan
WO Patent WO2018023733A1, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20