scispace - formally typeset
W

Wu Zuyang

Publications -  17
Citations -  23

Wu Zuyang is an academic researcher. The author has contributed to research in topics: Password & Smart card. The author has an hindex of 2, co-authored 17 publications receiving 23 citations.

Papers
More filters
Patent

Secure mutual authentication and key agreement protocol under Internet of Things environment

TL;DR: The secure mutual authentication and key agreement protocol under the Internet of Things environment provided by the invention solved the unsafe problems of information leakage and stealing of the two communication parties in the IOT communication, and has higher performance and efficiency in the similar security protocols.
Patent

Mutual anonymous authentication and key agreement protocol in mobile network

TL;DR: In this article, a mutual anonymous authentication and key agreement protocol in a mobile network is proposed, which is implemented as follows: step A, at registration stage, a legal mobile device user initiates a request to register own information to a server; step B, the operation is carried out at an authentication and agreement stage.
Patent

Method for performing third-party auditing on user file stored in cloud server

TL;DR: In this paper, the authors propose a method for third-party auditing on a user file stored in a cloud server, where the user file includes a plurality of data blocks.
Patent

Ciphertext searching method in cloud storage system

TL;DR: In this paper, a ciphertext searching method in a cloud storage system is presented. But the method is based on a certificateless public key encryption (CPE) scheme and does not address the problem of the searchability of the ciphertext and the security of the keyword.
Patent

Certificateless searchable public key encryption scheme safe in industrial internet of things environment

TL;DR: In this article, a certificateless searchable public key encryption scheme was proposed for industrial IoT cloud storage, which is proven to resist online keyword guessing attack of the external attacker and the malicious server and have higher security level in similar security protocols.