Academic Profile : Faculty

Assoc Prof Wang Huaxiong.jpg picture
Prof Wang Huaxiong
Professor, School of Physical & Mathematical Sciences - Division of Mathematical Sciences
Co-Director, The National Centre for Research in Digital Trust (NCDT)
Deputy Director, Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS)
External Links
 
Journal Articles
(Not applicable to NIE
staff as info will be
pulled from PRDS)
Highly Cited:
Yang, G., Wong, D. S., Wang, H., & Deng, X. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160-1172.

Poschmann, A., Moradi, A., Khoo, K., Lim, C. W., Wang, H., & Ling, S. (2011). Side-channel resistant crypto for less than 2,300 GE. Journal of Cryptology, 24(2), 322-345.

Wang, H., Xing, C., & Safavi-Naini, R. (2003). Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory, 49(4), 866-872.

Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223-234.

Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419-440.

Yuan, J., Ding, C., Wang, H., & Pieprzyk, J. (2008). Permutation polynomials of the form (xp− x+ δ) s+ L (x). Finite Fields and Their Applications, 14(2), 482-493.

Safavi-Naini, R., & Wang, H. (1999). Multireceiver authentication codes: models, bounds, constructions, and extensions. Information and Computation, 151(1-2), 148-172.

Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., & Cheng, H. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193-207.

Zhang, X., Xu, C., Wang, H., Zhang, Y., & Wang, S. (2019). FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing, 18(3), 1019-1032.

Sun, H. M., He, B. Z., Chen, C. M., Wu, T. Y., Lin, C. H., & Wang, H. (2015). A provable authenticated group key agreement protocol for mobile environment. Information Sciences, 321, 224-237.

Click here for more publications.

Recent Publication:
Xu, Y., Safavi-Naini, R., Nguyen, K., & Wang, H. (2022). Traceable policy-based signatures and instantiation from lattices. Information Sciences, 607, 1286-1310.

Zhang, X., Huang, C., Gu, D., Zhang, J., Xue, J., & Wang, H. (2022). Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. Journal of Systems Architecture, 127, 102508.

Ding, J., Ke, P., Lin, C., & Wang, H. (2022). Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Information Sciences, 593, 398-414.

Jiang, S., Chee, Y. M., Ling, S., Wang, H., & Xing, C. (2022). A new framework for deniable secure key exchange. Information and Computation, 104866.

Huang, C., Zhao, Y., Chen, H., Wang, X., Zhang, Q., Chen, Y., ... & Lam, K. Y. (2021). ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet of Things Journal, 9(6), 4330-4342.
Google Scholar
Web of Science
Scopus