2025
Security-Enhanced Data Sharing via Efficient Sanitization for VANETs.
IEEE Trans. Mob. Comput., June, 2025
DataFly: A Confidentiality-Preserving Data Migration Across Heterogeneous Blockchains.
IEEE Trans. Computers, June, 2025
Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage.
IEEE Trans. Computers, May, 2025
EFSC: Efficient and Forward-Secure Conditional Privacy-Preserving Scheme for Internet of Vehicles.
IEEE Internet Things J., April, 2025
Certificateless Searchable Public Key Encryption With Trapdoor Indistinguishability for IoV.
IEEE Trans. Veh. Technol., March, 2025
Permissioned Blockchain-Based Trusted and Robust Consensus Optimization Orienting Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2025
A Multiserver Authentication Protocol With Integrated Monitoring for IoMT-Based Healthcare System.
IEEE Internet Things J., January, 2025
Blockchain-Assisted Flexible Revocable Anonymous Authentication in Industrial Internet of Things.
IEEE Trans. Netw. Sci. Eng., 2025
Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT.
IEEE Trans. Inf. Forensics Secur., 2025
BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2025
RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2025
PM-ABE: Puncturable Bilateral Fine-Grained Access Control From Lattices for Secret Sharing.
IEEE Trans. Dependable Secur. Comput., 2025
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision.
IEEE Trans. Dependable Secur. Comput., 2025
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
2024
RIC-SDA: A Reputation Incentive Committee-Based Secure Conditional Dual Authentication Scheme for VANETs.
IEEE Trans. Mob. Comput., December, 2024
A Threshold-Based Full-Decentralized Authentication and Key Agreement Scheme for VANETs Powered by Consortium Blockchain.
IEEE Trans. Mob. Comput., December, 2024
Privacy-Preserving and Secure Distributed Data Sharing Scheme for VANETs.
IEEE Trans. Mob. Comput., December, 2024
LH-IDS: Lightweight Hybrid Intrusion Detection System Based on Differential Privacy in VANETs.
IEEE Trans. Mob. Comput., December, 2024
A Distributed Ledger-Assisted Robust and Trusted Service Protocol for VANETs.
IEEE Internet Things J., December, 2024
Optimizing Dilithium Implementation with AVX2/-512.
ACM Trans. Embed. Comput. Syst., November, 2024
Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration.
IEEE Trans. Veh. Technol., October, 2024
Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs.
IEEE Internet Things J., October, 2024
MM-SDVN: Efficient Mobility Management Scheme for Optimal Network Handover in Software-Defined Vehicular Network.
IEEE Internet Things J., October, 2024
A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus.
IEEE Trans. Intell. Transp. Syst., August, 2024
A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems.
IEEE Trans. Aerosp. Electron. Syst., August, 2024
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences.
IEEE Trans. Inf. Theory, July, 2024
CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks.
IEEE Trans. Mob. Comput., June, 2024
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks.
IEEE Trans. Mob. Comput., May, 2024
Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey.
IEEE Trans. Knowl. Data Eng., May, 2024
Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing.
IEEE Internet Things J., May, 2024
PEACS: A Privacy-Enhancing and Accountable Car Sharing System.
IEEE Internet Things J., May, 2024
Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT.
IEEE Internet Things J., May, 2024
LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems.
IEEE Trans. Veh. Technol., April, 2024
Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things.
IEEE Internet Things J., April, 2024
The governance technology for blockchain systems: a survey.
Frontiers Comput. Sci., April, 2024
DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Mob. Comput., February, 2024
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs.
IEEE Trans. Intell. Veh., February, 2024
Multi-Party Privacy-Preserving Faster R-CNN Framework for Object Detection.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
PSSC: Practical and Secure Sidechain Construction for Heterogeneous Blockchains Orienting IoT.
IEEE Internet Things J., February, 2024
LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs.
IEEE Trans. Veh. Technol., January, 2024
PpNNT: Multiparty Privacy-Preserving Neural Network Training System.
IEEE Trans. Artif. Intell., January, 2024
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size.
Comput. Stand. Interfaces, January, 2024
ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs.
IEEE Trans. Veh. Technol., 2024
Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning.
IEEE Trans. Sustain. Comput., 2024
RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare.
IEEE Trans. Serv. Comput., 2024
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024
Constant-Size Verifiable Timed Signatures from RSA Group for Bitcoin-Based Voting Protocols.
IEEE Trans. Serv. Comput., 2024
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024
Practical Privacy-Preserving Convolutional Neural Network Inference Framework With Edge Computing for Health Monitoring.
IEEE Trans. Netw. Sci. Eng., 2024
Toward Open-Set Intrusion Detection in VANETs: An Efficient Meta-Recognition Approach.
IEEE Trans. Netw. Sci. Eng., 2024
A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IEEE Trans. Netw. Sci. Eng., 2024
LISP-MM: Efficient LISP-Based Mobility Management in Software Defined Vehicular Networks.
IEEE Trans. Netw. Sci. Eng., 2024
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System.
IEEE Trans. Inf. Forensics Secur., 2024
SecureGPT: A Framework for Multi-Party Privacy-Preserving Transformer Inference in GPT.
IEEE Trans. Inf. Forensics Secur., 2024
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance.
IEEE Trans. Inf. Forensics Secur., 2024
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset.
IEEE Trans. Inf. Forensics Secur., 2024
Accountable and Secure Threshold EdDSA Signature and Its Applications.
IEEE Trans. Inf. Forensics Secur., 2024
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs.
IEEE Trans. Inf. Forensics Secur., 2024
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs.
IEEE Trans. Inf. Forensics Secur., 2024
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT.
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2024
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2024
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
The implementation of polynomial multiplication for lattice-based cryptography: A survey.
J. Inf. Secur. Appl., 2024
Post-quantum identity-based traitor tracing.
J. Inf. Secur. Appl., 2024
An efficient quantum-resistant undeniable signature protocol for the E-voting system.
J. Inf. Secur. Appl., 2024
Bounded Collusion-Resistant Registered Functional Encryption for Circuits.
IACR Cryptol. ePrint Arch., 2024
Parameter-Hiding Order-Revealing Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2024
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication.
IACR Cryptol. ePrint Arch., 2024
MultiReg-FE: Registered FE for Unbounded Inner-Product and Attribute-Weighted Sums.
IACR Cryptol. ePrint Arch., 2024
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing.
IACR Cryptol. ePrint Arch., 2024
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability.
Comput. J., 2024
Multi-party privacy-preserving decision tree training with a privileged party.
Sci. China Inf. Sci., 2024
Secure Federated Distillation Framework for Encrypted Traffic Classification.
Proceedings of the Information Security Practice and Experience, 2024
Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning.
Proceedings of the Information Security Practice and Experience, 2024
SG-FCB: A Stackelberg Game-Driven Fair Committee-Based Blockchain Consensus Protocol.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Universal and Trustless Large-Value Payments in Cryptocurrencies.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Server-Assisted Certificateless Searchable Encryption Scheme for Industrial Internet of Things Against Keyword Guessing Attacks.
Proceedings of the Twelfth International Conference on Advanced Cloud and Big Data, 2024
2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage.
IEEE Trans. Parallel Distributed Syst., December, 2023
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain.
IEEE Trans. Computers, December, 2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023
Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles.
IEEE Trans. Veh. Technol., November, 2023
MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids.
J. Syst. Archit., October, 2023
Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach.
IEEE Trans. Parallel Distributed Syst., September, 2023
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023
Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512.
ACM Trans. Embed. Comput. Syst., September, 2023
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023
Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoT.
IEEE Internet Things J., September, 2023
User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Internet Things J., August, 2023
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023
On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum.
IEEE Trans. Inf. Theory, June, 2023
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
IEEE Syst. J., June, 2023
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things.
IEEE Internet Things J., May, 2023
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things.
Ad Hoc Networks, May, 2023
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU.
ACM Trans. Embed. Comput. Syst., March, 2023
BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs.
Veh. Commun., 2023
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023
Exploring Dynamic Task Loading in SGX-Based Distributed Computing.
IEEE Trans. Serv. Comput., 2023
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation.
IEEE Trans. Serv. Comput., 2023
EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023
A Survey on Redactable Blockchain: Challenges and Opportunities.
IEEE Trans. Netw. Sci. Eng., 2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs.
IEEE Trans. Inf. Forensics Secur., 2023
Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2023
Lattice-Based Group Signatures With Time-Bound Keys via Redactable Signatures.
IEEE Trans. Inf. Forensics Secur., 2023
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership.
IEEE Trans. Inf. Forensics Secur., 2023
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023
On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme.
IEEE Trans. Dependable Secur. Comput., 2023
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2023
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Dependable Secur. Comput., 2023
An Efficient Identity-Based Encryption With Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2023
Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature.
IEEE Open J. Commun. Soc., 2023
An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks.
IEEE Open J. Comput. Soc., 2023
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System.
IEEE Open J. Comput. Soc., 2023
Communication-Efficient and Byzantine-Robust Federated Learning for Mobile Edge Computing Networks.
IEEE Netw., 2023
An identity-based dynamic group signature scheme for reputation evaluation systems.
J. Syst. Archit., 2023
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services.
IEEE Internet Things J., 2023
Lattice Based Signatures with Additional Functionalities.
IACR Cryptol. ePrint Arch., 2023
Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14.
IACR Cryptol. ePrint Arch., 2023
CUFT: Cuflow-Based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification.
Proceedings of the Security and Privacy in Communication Networks, 2023
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme.
Proceedings of the Provable and Practical Security, 2023
Secure CNN Training and Inference based on Multi-key Fully Homomorphic Encryption.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning.
IEEE Trans. Netw. Serv. Manag., December, 2022
Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Veh. Technol., 2022
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022
A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy.
IEEE Trans. Netw. Sci. Eng., 2022
SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
Synchronized Provable Data Possession Based on Blockchain for Digital Twin.
IEEE Trans. Inf. Forensics Secur., 2022
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare.
IEEE Trans. Emerg. Top. Comput. Intell., 2022
Dual-Server Public-Key Authenticated Encryption with Keyword Search.
IEEE Trans. Cloud Comput., 2022
DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services.
IEEE Syst. J., 2022
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices.
IEEE Syst. J., 2022
High-throughput block cipher implementations with SIMD.
J. Inf. Secur. Appl., 2022
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
J. Inf. Secur. Appl., 2022
Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
IEEE Internet Things J., 2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT.
IEEE Internet Things J., 2022
Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs.
IEEE Internet Things J., 2022
Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT.
IEEE Internet Things J., 2022
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022
A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., 2022
Hash-balanced binary tree-based public auditing in vehicular edge computing and networks.
Int. J. Commun. Syst., 2022
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
An efficient data aggregation scheme with local differential privacy in smart grid.
Digit. Commun. Networks, 2022
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022
The Application of the Blockchain Technology in Voting Systems: A Review.
ACM Comput. Surv., 2022
An adaptive access control scheme based on trust degrees for edge computing.
Comput. Stand. Interfaces, 2022
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9.
Comput. J., 2022
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022
Lattice-based undeniable signature scheme.
Ann. des Télécommunications, 2022
Secure Distributed Outsourcing of Large-scale Linear Systems.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
Proceedings of the Emerging Information Security and Applications, 2022
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Reliable and Secure e-Health Networks.
Wirel. Pers. Commun., 2021
Provable Data Possession with Outsourced Data Transfer.
IEEE Trans. Serv. Comput., 2021
A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme.
ACM Trans. Reconfigurable Technol. Syst., 2021
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System.
ACM Trans. Internet Techn., 2021
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications.
ACM Trans. Internet Techn., 2021
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities.
ACM Trans. Internet Techn., 2021
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment.
IEEE Trans. Ind. Informatics, 2021
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.
IEEE Trans. Emerg. Top. Comput., 2021
Blockchain-Based Private Provable Data Possession.
IEEE Trans. Dependable Secur. Comput., 2021
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021
Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021
A Survey of Blockchain Applications in the Energy Sector.
IEEE Syst. J., 2021
The Applications of Blockchain in Artificial Intelligence.
Secur. Commun. Networks, 2021
Blockchain-Based Secure Communication for Space Information Networks.
IEEE Netw., 2021
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021
Blockchain-based multi-party proof of assets with privacy preservation.
Inf. Sci., 2021
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks.
IEEE Internet Things J., 2021
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021
CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things.
IEEE Internet Things J., 2021
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2021
Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids.
Comput. Stand. Interfaces, 2021
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud.
Connect. Sci., 2021
A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Informatics, 2020
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
On the Security of a Key Agreement and Key Protection Scheme.
IEEE Trans. Inf. Forensics Secur., 2020
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020
Blockchain-Based Anonymous Reporting Scheme With Anonymous Rewarding.
IEEE Trans. Engineering Management, 2020
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020
CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs.
IEEE Syst. J., 2020
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
IEEE Syst. J., 2020
White-Box Implementation of Shamir's Identity-Based Signature Scheme.
IEEE Syst. J., 2020
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020
Blockchain-based identity management systems: A review.
J. Netw. Comput. Appl., 2020
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020
CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
J. Inf. Secur. Appl., 2020
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020
An efficient and provable certificate-based proxy signature scheme for IIoT environment.
Inf. Sci., 2020
Blockchain-based system for secure outsourcing of bilinear pairings.
Inf. Sci., 2020
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.
IEEE Internet Things J., 2020
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
Future Gener. Comput. Syst., 2020
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020
A lightweight authentication and key agreement scheme for Internet of Drones.
Comput. Commun., 2020
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.
Sci. China Inf. Sci., 2020
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020
Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid.
IEEE Access, 2020
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.
IEEE Access, 2020
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Authenticated key agreement scheme for fog-driven IoT healthcare system.
Wirel. Networks, 2019
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019
Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Inf. Forensics Secur., 2019
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019
Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices.
IEEE Syst. J., 2019
Anonymous and Efficient Message Authentication Scheme for Smart Grid.
Secur. Commun. Networks, 2019
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2019
Blockchain in healthcare applications: Research challenges and opportunities.
J. Netw. Comput. Appl., 2019
A survey on privacy protection in blockchain system.
J. Netw. Comput. Appl., 2019
Isogeny-Based Cryptography: A Promising Post-Quantum Technique.
IT Prof., 2019
Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019
Parking Management: A Blockchain-Based Privacy-Preserving System.
IEEE Consumer Electron. Mag., 2019
Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
Ann. des Télécommunications, 2019
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Proceedings of the 28th USENIX Security Symposium, 2019
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.
Wirel. Commun. Mob. Comput., 2018
Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.
IEEE Trans. Sustain. Comput., 2018
Privacy-preserving auditing scheme for shared data in public clouds.
J. Supercomput., 2018
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
Soft Comput., 2018
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018
Attribute-based fuzzy identity access control in multicloud computing environments.
Soft Comput., 2018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
IEEE Syst. J., 2018
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Syst. J., 2018
A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Secur. Commun. Networks, 2018
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Secur. Commun. Networks, 2018
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Secur. Commun. Networks, 2018
Signature-based three-factor authenticated key exchange for internet of things applications.
Multim. Tools Appl., 2018
Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distributed Comput., 2018
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018
An efficient and secure 3-factor user-authentication protocol for multiserver environment.
Int. J. Commun. Syst., 2018
Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Commun. Syst., 2018
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018
Taxonomy and analysis of security protocols for Internet of Things.
Future Gener. Comput. Syst., 2018
A general compiler for password-authenticated group key exchange protocol in the standard model.
Discret. Appl. Math., 2018
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018
Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Commun. Mag., 2018
Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks.
IEEE Access, 2018
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018
2017
Advances and Challenges in Convergent Communication Networks.
Wirel. Pers. Commun., 2017
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wirel. Pers. Commun., 2017
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017
A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
J. Supercomput., 2017
Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017
Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Syst. J., 2017
Secure public data auditing scheme for cloud storage in smart city.
Pers. Ubiquitous Comput., 2017
Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2017
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017
Special issue on Secure Computation on Encrypted Data.
J. Inf. Secur. Appl., 2017
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Commun. Syst., 2017
An efficient chaos-based 2-party key agreement protocol with provable security.
Int. J. Commun. Syst., 2017
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Inf. Secur., 2017
A secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2017
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017
Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Gener. Comput. Syst., 2017
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Comput. Electr. Eng., 2017
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017
Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.
IEEE Access, 2017
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017
Efficient Revocable ID-Based Signature With Cloud Revocation Server.
IEEE Access, 2017
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wirel. Networks, 2016
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
J. Supercomput., 2016
Security analysis of a user registration approach.
J. Supercomput., 2016
A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016
ESDR: an efficient and secure data repairing paradigm in cloud storage.
Secur. Commun. Networks, 2016
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Secur. Commun. Networks, 2016
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016
One-to-many authentication for access control in mobile pay-TV systems.
Sci. China Inf. Sci., 2016
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015
Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electron., 2015
Robust Biometrics-Based Authentication Scheme for Multiserver Environment.
IEEE Syst. J., 2015
Efficient provably secure password-based explicit authenticated key agreement.
Pervasive Mob. Comput., 2015
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multim. Syst., 2015
New biometrics-based authentication scheme for multi-server environment in critical systems.
J. Ambient Intell. Humaniz. Comput., 2015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks.
Inf. Sci., 2015
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
IEEE Internet Things J., 2015
Enhanced authentication protocol for session initiation protocol using smart card.
Int. J. Electron. Secur. Digit. Forensics, 2015
A new handover authentication protocol based on bilinear pairing functions for wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015
Authentication protocol for an ambient assisted living system.
IEEE Commun. Mag., 2015
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015
Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015
Proxy Provable Data Possession with General Access Structure in Public Clouds.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wirel. Pers. Commun., 2014
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014
Enhanced three-factor security protocol for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2014
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Syst., 2014
Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol.
Inf. Technol. Control., 2014
Provably Secure Proxy Multi-Signature Scheme Based on ECC.
Inf. Technol. Control., 2014
Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol.
Int. J. Netw. Secur., 2014
On the Security of a RSA-based Certificateless Signature Scheme.
Int. J. Netw. Secur., 2014
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptol. ePrint Arch., 2014
2013
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment.
Wirel. Pers. Commun., 2013
Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electron., 2013
An efficient certificateless proxy signature scheme without pairing.
Math. Comput. Model., 2013
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards.
Int. J. Netw. Secur., 2013
Cryptanalysis of a key agreement protocol based on chaotic Hash.
Int. J. Electron. Secur. Digit. Forensics, 2013
On the security of an authentication scheme for multi-server architecture.
Int. J. Electron. Secur. Digit. Forensics, 2013
New certificateless short signature scheme.
IET Inf. Secur., 2013
Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments.
IEICE Trans. Inf. Syst., 2013
An efficient certificateless designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2013
Efficient ID-based multiproxy multisignature without bilinear maps in ROM.
Ann. des Télécommunications, 2013
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".
Proceedings of the 12th IEEE International Conference on Trust, 2013
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013
2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Secur. Commun. Networks, 2012
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography.
Secur. Commun. Networks, 2012
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Math. Comput. Model., 2012
A More Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.
Inf. Fusion, 2012
Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment.
Int. J. Electron. Secur. Digit. Forensics, 2012
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing.
Int. J. Electron. Secur. Digit. Forensics, 2012
An efficient and provably-secure certificateless signature scheme without bilinear pairings.
Int. J. Commun. Syst., 2012
A pairing-free certificateless authenticated key agreement protocol.
Int. J. Commun. Syst., 2012
Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments.
IEICE Trans. Commun., 2012
A note on 'An efficient certificateless aggregate signature with constant pairing computations'.
IACR Cryptol. ePrint Arch., 2012
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2012
Robust biometric-based user authentication scheme for wireless sensor networks.
IACR Cryptol. ePrint Arch., 2012
An efficient certificateless two-party authenticated key agreement protocol.
Comput. Math. Appl., 2012
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings.
Ad Hoc Networks, 2012
Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
2011
A new two-round certificateless authenticated key agreement protocol without bilinear pairings.
Math. Comput. Model., 2011
Weaknesses of a Remote User Password Authentication Scheme Using Smart Card.
Int. J. Netw. Secur., 2011
An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves.
Int. J. Comput. Commun. Control, 2011
A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model.
IACR Cryptol. ePrint Arch., 2011
An efficient certificateless two-party authenticated key agreement scheme from pairings.
IACR Cryptol. ePrint Arch., 2011
Identity-based Digital Signature Scheme Without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011
Comments on a password authentication and update scheme based on elliptic curve cryptography.
IACR Cryptol. ePrint Arch., 2011
Security flaws in a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of a key agreement protocol based on chaotic Hash.
IACR Cryptol. ePrint Arch., 2011
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.
IACR Cryptol. ePrint Arch., 2011
Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography
CoRR, 2011
An efficient certificateless authenticated key agreement protocol without bilinear pairings
CoRR, 2011
An efficient identity-based blind signature scheme without bilinear pairings.
Comput. Electr. Eng., 2011
An ID-based proxy signature schemes without bilinear pairings.
Ann. des Télécommunications, 2011
2010
Cryptanalysis of a Simple Three-party Key Exchange Protocol.
Informatica (Slovenia), 2010
Weaknesses of a dynamic ID-based remote user authentication scheme.
Int. J. Electron. Secur. Digit. Forensics, 2010
Efficient and provably-secure certificateless signature scheme without bilinear pairings.
IACR Cryptol. ePrint Arch., 2010
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
IACR Cryptol. ePrint Arch., 2010
Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptol. ePrint Arch., 2010
On security of a remote user authentication scheme without using smart cards.
IACR Cryptol. ePrint Arch., 2010
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
IACR Cryptol. ePrint Arch., 2010
Cryptanalysis of a DoS-resistant ID-based password authentication.
IACR Cryptol. ePrint Arch., 2010
A Random Number Generator Based on Isogenies Operations.
IACR Cryptol. ePrint Arch., 2010
Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
CoRR, 2010
2009
Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009