Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wei Fushan is active.

Publication


Featured researches published by Wei Fushan.


international test conference | 2015

A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems

Wei Fushan; Ma Jianfeng; Ge Aijun; Li Guangsong; Ma Chuangui

Three-party password authenticated key exchange (3PAKE) protocols allow two clients to establish a common secure session key via the help of an authentication server, in which each client only needs to share a single password with the server. Many researchers pay attention to 3PAKE protocols since they are well suited for large-scale communication in mobile environments. Recently, Farash et al. proposed an enhanced 3PAKE protocol without using server’s public-keys and symmetric cryptosystems. They claimed that their protocol is secure against various attacks. However, we found that Farash et al.’s protocol is vulnerable to partition attacks and off-line dictionary attacks. Moreover, their protocol needs 5 rounds to work, so it is inefficient in terms of communication. To overcome these shortcomings, we improve their protocol and propose a provably secure 3PAKE protocol, which is more efficient and secure than other related protocols.


intelligent networking and collaborative systems | 2013

Efficient Client-to-Client Password Authenticated Key Exchange Based on RSA

Ma Chuangui; Wei Fushan; Gao Fengxiu


Archive | 2016

Heterogeneous network end-to-end authentication secret key exchange method based on space-sky information network

Ma Jianfeng; Wei Fushan; Cheng Qingfeng; Jiang Qi; Li Xinghua; Lu Di; Xi Ning


Archive | 2015

User anonymous identity authentication protocol based on k-pseudonym set in wireless network

Li Xinghua; Zhao Jing; Wen Mingjun; Ma Jianfeng; Wei Fushan; Jiang Qi; Yao Qingsong


Archive | 2017

Elliptic curve password quick implementation method and device thereof

Ma Chuangui; Dou Yunqi; Wei Fushan; Li Yanbin; Ge Aijun; Zhang Jie; Xu Yanyan; Xiao Siyu; Song Jian; Yin Jun


Ruanjian Xuebao | 2016

標準モデルの下で効率的な三者パスワード認証鍵交換プロトコル【JST・京大機械翻訳】

Wei Fushan; Ma Jianfeng; Li Guangsong; Ma Chuangui


Archive | 2016

Location privacy protection method based on false locations under continuous location service requests

Li Xinghua; Wang Ermeng; Yang Chao; Liu Hai; Yang Weidong; Wei Fushan; Liu Hongyue; Deng Miaolei


Journal of Network and Computer Applications | 2016

無線センサネットワークのためのECCを用いた追跡不能時間の証明書ベース2因子認証方式【Powered by NICT】

Jiang Qi; Ma Jianfeng; Wei Fushan; Tian Youliang; Shen Jian; Yang Yuanyuan


Archive | 2015

Pairing-free certificateless group key agreementprotocol for unbalanced wireless network environment

Yuan Simin; Ma Chuangui; Wei Fushan


Computer Engineering | 2012

User Authentication Protocol with Anonymity in Wireless Sensor Network

Liu Cong; Gao Fengxiu; Ma Chuangui; Wei Fushan

Collaboration


Dive into the Wei Fushan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Deng Miaolei

Henan University of Technology

View shared research outputs
Top Co-Authors

Avatar

Liu Hongyue

Henan University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yang Weidong

Henan University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge