2025
Enhancing Security and Privacy in Federated Learning Using Low-Dimensional Update Representation and Proximity-Based Defense.
IEEE Trans. Knowl. Data Eng., June, 2025
Preserving Privacy in Fine-Grained Data Distillation With Sparse Answers for Efficient Edge Computing.
IEEE Internet Things J., April, 2025
A Vision of 3GPP Wireless Sensing for Intelligent Vehicles: Scenarios, Architectures, Security Challenges, Solutions, and Future Trends.
IEEE Netw., March, 2025
NSAA: A Network Slice Access Authentication and Service Authorization Scheme for Integrated Satellite-Terrestrial Network.
IEEE Internet Things J., March, 2025
Efficient and Expressive Public Key Authenticated Encryption with Keyword Search in Multi-user Scenarios.
CoRR, March, 2025
Vulnerabilities and Security Patches Detection in OSS: A Survey.
ACM Comput. Surv., January, 2025
COKV: Key-Value Data Collection With Condensed Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2025
Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud.
IEEE Trans. Dependable Secur. Comput., 2025
Manipulated Transaction Collision Attack on Execute-Order-Validate Blockchain.
IEEE Trans. Dependable Secur. Comput., 2025
A Formal Analysis of 5G ProSe AKA Protocols for U2N Relay Communication.
IEEE Trans. Dependable Secur. Comput., 2025
PRISM: PSI and Voronoi diagram based Automated Exposure Notification with location privacy.
J. Netw. Comput. Appl., 2025
SplitAD: A lightweight and privacy-enhancing vertical federated anomaly detection framework based on hierarchical autoencoders.
Inf. Sci., 2025
Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity.
IEEE Internet Things J., 2025
Knowledge-enhanced heterogeneous graph attention networks for privacy co-disclosure detection in online social network.
Expert Syst. Appl., 2025
Insights into KPI-based performance anomaly detection in database systems: A comprehensive study.
Expert Syst. Appl., 2025
Blockchain-based anonymous and self-tallying voting with time-bounded ballot secrecy.
Comput. Networks, 2025
2024
Exploring a Secure Device Pairing Using Human Body as a Conductor.
IEEE Trans. Mob. Comput., December, 2024
Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing.
IEEE Internet Things J., December, 2024
ADEAS: Authentication Using Doppler Effect of Acoustic Signals Caused by Hands Moving.
IEEE Internet Things J., December, 2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT.
Peer Peer Netw. Appl., July, 2024
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector.
IEEE Internet Things J., May, 2024
CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing.
IEEE Internet Things J., May, 2024
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
IEEE Trans. Netw. Serv. Manag., April, 2024
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024
Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid.
IEEE Internet Things J., March, 2024
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT.
IEEE Internet Things J., January, 2024
Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT.
IEEE Internet Things J., January, 2024
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024
Efficient and Privacy-Preserving Federated Learning Against Poisoning Adversaries.
IEEE Trans. Serv. Comput., 2024
ELXGB: An Efficient and Privacy-Preserving XGBoost for Vertical Federated Learning.
IEEE Trans. Serv. Comput., 2024
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE.
IEEE Trans. Inf. Forensics Secur., 2024
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2024
CODER: Protecting Privacy in Image Retrieval With Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2024
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2024
Enabling Space-Air integration: A Satellite-UAV networking authentication scheme.
Secur. Saf., 2024
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles.
Microprocess. Microsystems, 2024
iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks.
Inf. Sci., 2024
Achieving federated logistic regression training towards model confidentiality with semi-honest TEE.
Inf. Sci., 2024
Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things.
IEEE Internet Things J., 2024
SC-Chain: An Efficient Blockchain Framework for Smart City.
IEEE Internet Things J., 2024
Differential privacy in deep learning: A literature survey.
Neurocomputing, 2024
Quartet: A Query Aware Database Adaptive Compilation Decision System.
Expert Syst. Appl., 2024
Data complexity-based batch sanitization method against poison in distributed learning.
Digit. Commun. Networks, 2024
Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense.
CoRR, 2024
Novel_Authentication_Protocols_Tailored_for_Ambient_IoT_Devices_in_3GPP_5G_Networks.
CoRR, 2024
Seamless group handover authentication protocol for vehicle networks: Services continuity.
Comput. Networks, 2024
UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential Privacy.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
RDLNet: A Novel and Accurate Real-world Document Localization Method.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
A Message-based Lightweight Session Key Distribution Scheme for Intra-Vehicle Network.
Proceedings of the 2024 IEEE Global Communications Conference, 2024
2023
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption.
Inf. Sci., December, 2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023
A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects.
IEEE Internet Things J., September, 2023
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023
A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy.
IEEE Internet Things J., August, 2023
Blockchain-based cloud-edge clock calibration in IoT.
Peer Peer Netw. Appl., May, 2023
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
IEEE Trans. Inf. Forensics Secur., 2023
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023
Protecting Regression Models With Personalized Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
A Software-Based Remote Attestation Scheme for Internet of Things Devices.
IEEE Trans. Dependable Secur. Comput., 2023
VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression.
IEEE Trans. Cloud Comput., 2023
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End.
IEEE Trans. Cloud Comput., 2023
Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud.
IEEE Netw., 2023
An Automatic Privacy-Aware Framework for Text Data in Online Social Network Based on a Multi-Deep Learning Model.
Int. J. Intell. Syst., 2023
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023
Identification of Malicious Encrypted Traffic Through Feature Fusion.
IEEE Access, 2023
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Proceedings of the 32nd USENIX Security Symposium, 2023
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023
Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data.
Proceedings of the IEEE Global Communications Conference, 2023
Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences.
Proceedings of the IEEE Global Communications Conference, 2023
Class Attention Transfer Based Knowledge Distillation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
A Framework for Personalized Location Privacy.
IEEE Trans. Mob. Comput., 2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022
Privacy Preserving Participant Recruitment for Coverage Maximization in Location Aware Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets.
IEEE Trans. Dependable Secur. Comput., 2022
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022
Blockchain-based trust management for verifiable time synchronization service in IoT.
Peer-to-Peer Netw. Appl., 2022
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N.
J. Netw. Comput. Appl., 2022
CORK: A privacy-preserving and lossless federated learning scheme for deep neural network.
Inf. Sci., 2022
MARS: Automated Protocol Analysis Framework for Internet of Things.
IEEE Internet Things J., 2022
An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services.
IEEE Internet Things J., 2022
Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems.
IEEE Internet Things J., 2022
Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices.
IEEE Internet Things J., 2022
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation.
CoRR, 2022
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022
ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data.
Sci. China Inf. Sci., 2022
BiTouch: enabling secure touch-to-access device pairing based on human body's electrical response.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Enabling secure touch-to-access device pairing based on human body's electrical response.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.
Proceedings of the Information Security - 25th International Conference, 2022
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022
ARCANE: An Efficient Architecture for Exact Machine Unlearning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment.
IEEE Trans. Wirel. Commun., 2021
Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data.
IEEE Trans. Ind. Informatics, 2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021
Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data.
IEEE Trans. Cloud Comput., 2021
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage.
Secur. Commun. Networks, 2021
A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services.
Secur. Commun. Networks, 2021
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud.
Peer-to-Peer Netw. Appl., 2021
A blockchain-based privacy preservation scheme in multimedia network.
Multim. Tools Appl., 2021
Cross-domain access control based on trusted third-party and attribute mapping center.
J. Syst. Archit., 2021
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent.
Inf. Sci., 2021
An anomaly detection method based on double encoder-decoder generative adversarial networks.
Ind. Robot, 2021
Data-Driven Optimization for Cooperative Edge Service Provisioning With Demand Uncertainty.
IEEE Internet Things J., 2021
Efficient attribute-based encryption with repeated attributes optimization.
Int. J. Inf. Sec., 2021
Smart home: Keeping privacy based on Air-Padding.
IET Inf. Secur., 2021
Detection and defense against network isolation attacks in software-defined networks.
Trans. Emerg. Telecommun. Technol., 2021
Provenance-based data flow control mechanism for Internet of things.
Trans. Emerg. Telecommun. Technol., 2021
An ultra light weight and secure RFID batch authentication scheme for IoMT.
Comput. Commun., 2021
Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation.
Proceedings of the Network and System Security - 15th International Conference, 2021
To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Privacy-preserving Decentralized Federated Deep Learning.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021
2020
Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs.
IEEE Wirel. Commun., 2020
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Inside-Out Precoding to Manage Multiple Interferences From the Same Source.
IEEE Trans. Veh. Technol., 2020
Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding.
Sensors, 2020
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer-to-Peer Netw. Appl., 2020
Hyperspectral Imagery Classification Based on Compressed Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2020
A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020
Exploiting location-related behaviors without the GPS data on smartphones.
Inf. Sci., 2020
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020
Mining the frequency of time-constrained serial episodes over massive data sequences and streams.
Future Gener. Comput. Syst., 2020
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020
A personalized range-sensitive privacy-preserving scheme in LBSs.
Concurr. Comput. Pract. Exp., 2020
A Survey on Security Aspects for 3GPP 5G Networks.
IEEE Commun. Surv. Tutorials, 2020
Aggregation-based location privacy: An information theoretic approach.
Comput. Secur., 2020
Privacy-preserving searchable encryption in the intelligent edge computing.
Comput. Commun., 2020
Prediction of dissolved oxygen in aquaculture based on gradient boosting decision tree and long short-term memory network: A study of Chang Zhou fishery demonstration base, China.
Comput. Electron. Agric., 2020
A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Lightweight Secure Data Exchange in Decentralized VANETs with Physical Layer Security.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
CHASSIS: Conformity Meets Online Information Diffusion.
Proceedings of the 2020 International Conference on Management of Data, 2020
BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Beam Management for Cellular-Connected UAVs: A Fast Link Recovery Approach.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
An Enhanced Handover Scheme for Cellular-Connected UAVs.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
A Blockchain-Based Vehicle Platoon Leader Updating Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019
Online Location Trace Privacy: An Information Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2019
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019
Pruneable sharding-based blockchain protocol.
Peer-to-Peer Netw. Appl., 2019
A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Netw., 2019
On distributivity equations of implications over overlap functions and contrapositive symmetry equations of implications.
J. Intell. Fuzzy Syst., 2019
Counting the frequency of time-constrained serial episodes in a streaming sequence.
Inf. Sci., 2019
The optimal upper bound of the number of queries for Laplace mechanism under differential privacy.
Inf. Sci., 2019
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019
Blockchain-Based Secure Time Protection Scheme in IoT.
IEEE Internet Things J., 2019
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019
An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019
Light-load efficiency improving boost converter with the hybrid modulation of hysteresis current mode and burst mode.
IEICE Electron. Express, 2019
A Secure and Efficient Location-based Service Scheme for Smart Transportation.
Future Gener. Comput. Syst., 2019
Efficient and privacy preserving access control scheme for fog-enabled IoT.
Future Gener. Comput. Syst., 2019
A blockchain-based clock synchronization Scheme in IoT.
Future Gener. Comput. Syst., 2019
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel.
Entropy, 2019
IHP: improving the utility in differential private histogram publication.
Distributed Parallel Databases, 2019
Verifiable algorithm for outsourced database with updating.
Clust. Comput., 2019
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019
Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare.
IEEE Access, 2019
An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT.
IEEE Access, 2019
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
A Security Formal Model for Multiple Channels Communication.
Proceedings of the 2019 IEEE SmartWorld, 2019
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019
HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A Secure Cross-Domain Access Control Scheme in Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Physical Layer Security of OFDM Communication Using Artificial Pilot Noise.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Participant Recruitment for Coverage-Aware Mobile Crowdsensing with Location Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted Ultra-Dense Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018
Lightweight RFID Protocol for Medical Privacy Protection in IoT.
IEEE Trans. Ind. Informatics, 2018
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018
HAC: Hybrid Access Control for Online Social Networks.
Secur. Commun. Networks, 2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018
Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Netw. Appl., 2018
Secure, efficient and revocable data sharing scheme for vehicular fogs.
Peer-to-Peer Netw. Appl., 2018
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer-to-Peer Netw. Appl., 2018
Secure and private key management scheme in big data networking.
Peer-to-Peer Netw. Appl., 2018
Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018
MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.
J. Medical Syst., 2018
Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet Things J., 2018
Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet Things J., 2018
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks.
Int. J. Distributed Sens. Networks, 2018
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018
Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptol. ePrint Arch., 2018
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Gener. Comput. Syst., 2018
ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018
Chameleon all-but-one extractable hash proof and its applications.
Sci. China Inf. Sci., 2018
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT.
IEEE Access, 2018
Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Secure Time Synchronization Scheme in IoT Based on Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
An MEC-Based DoS Attack Detection Mechanism for C-V2X Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing.
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018
Blockchain-Based Privacy Preserving Deep Learning.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intell. Transp. Syst., 2017
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomed. Health Informatics, 2017
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Sensors, 2017
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017
NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017
Secure group information exchange scheme for vehicular ad hoc networks.
Pers. Ubiquitous Comput., 2017
Towards privacy protection and malicious behavior traceability in smart health.
Pers. Ubiquitous Comput., 2017
An ultra-lightweight RFID authentication scheme for mobile commerce.
Peer-to-Peer Netw. Appl., 2017
A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach.
Mob. Inf. Syst., 2017
Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding.
J. Inf. Sci. Eng., 2017
Different strategies for differentially private histogram publication.
J. Commun. Inf. Networks, 2017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017
Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017
Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services.
IEEE Internet Things J., 2017
An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy.
IEEE Internet Things J., 2017
Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens.
Comput. Stand. Interfaces, 2017
A two-party privacy preserving set intersection protocol against malicious users in cloud computing.
Comput. Stand. Interfaces, 2017
A secure SDN based multi-RANs architecture for future 5G networks.
Comput. Secur., 2017
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017
APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017
Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017
A new method to construct golay complementary set and near-complementary set by paraunitary matrices.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017
Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
PCD: A privacy-preserving predictive clinical decision scheme with E-health big data based on RNN.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017
Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Privacy Preservation Strategy in Time-Sensitive LBSs.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
An Expressive Hidden Access Policy CP-ABE.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Cloud-Based Lightweight RFID Mutual Authentication Protocol.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Target: category-based android malware detection revisited.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
U2F based secure mutual authentication protocol for mobile payment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Secure machine-type communications in LTE networks.
Wirel. Commun. Mob. Comput., 2016
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Veh. Technol., 2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016
Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.
Sensors, 2016
EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Secur. Commun. Networks, 2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016
Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Secur. Commun. Networks, 2016
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016
Efficient attribute-based data sharing in mobile clouds.
Pervasive Mob. Comput., 2016
Efficient multi-party concurrent signature from lattices.
Inf. Process. Lett., 2016
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Int. J. Technol. Hum. Interact., 2016
PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
Int. J. Embed. Syst., 2016
A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
A Secure RFID Application Revocation Scheme for IoT.
IEICE Trans. Inf. Syst., 2016
MIMO relay channel signal transmission in transformed signal subspace.
Digit. Signal Process., 2016
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016
Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016
A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016
Privacy protection based access control scheme in cloud-based services.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
IEEE Trans. Serv. Comput., 2015
Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs.
IEEE Trans. Dependable Secur. Comput., 2015
Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015
GBAAM: group-based access authentication for MTC in LTE networks.
Secur. Commun. Networks, 2015
PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Secur. Commun. Networks, 2015
V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mob. Inf. Syst., 2015
The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks.
KSII Trans. Internet Inf. Syst., 2015
A reputation-based secure scheme in vehicular ad hoc networks.
Int. J. Grid Util. Comput., 2015
PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid.
Int. J. Distributed Sens. Networks, 2015
Adaptive Sensing Private Property Protection Protocol Based on Cloud.
Int. J. Distributed Sens. Networks, 2015
Key management for Smart Grid based on asymmetric key-wrapping.
Int. J. Comput. Math., 2015
A novel attack to spatial cloaking schemes in location-based services.
Future Gener. Comput. Syst., 2015
A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerg. Telecommun. Technol., 2015
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services.
Comput. J., 2015
ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
RFID Secure Application Revocation for IoT in 5G.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Circular Range Search on Encrypted Spatial Data.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
Ciphertext Retrieval in Super-Peer P2P Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wirel. Pers. Commun., 2014
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014
Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs.
IEEE Trans. Inf. Forensics Secur., 2014
Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud.
IEEE Trans. Cloud Comput., 2014
Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart Comput. Rev., 2014
Achieving dynamic privileges in secure data sharing on cloud storage.
Secur. Commun. Networks, 2014
Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014
Loss-tolerant authentication with digital signatures.
Secur. Commun. Networks, 2014
Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014
Group-based authentication and key agreement for machine-type communication.
Int. J. Grid Util. Comput., 2014
Signalling scheme for achieving dynamic degrees of freedom in MIMO Y channel.
Int. J. Grid Util. Comput., 2014
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
Int. J. Grid Util. Comput., 2014
Authenticated asymmetric group key agreement based on certificateless cryptosystem.
Int. J. Comput. Math., 2014
Complex signal transmission for multi-user multiple-input multiple-output relay.
IET Commun., 2014
Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding".
IEEE Commun. Lett., 2014
Error- and loss-tolerant bundle fragment authentication for space DTNs.
Frontiers Comput. Sci., 2014
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014
Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014
RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurr. Comput. Pract. Exp., 2014
A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Commun. Surv. Tutorials, 2014
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014
EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014
SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014
MPPM: Malware propagation and prevention model in online SNS.
Proceedings of the IEEE International Conference on Communications, 2014
Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014
Privacy-area aware dummy generation algorithms for Location-Based Services.
Proceedings of the IEEE International Conference on Communications, 2014
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014
A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Group Key Agreement in Multimedia Service for Machine Type Communication.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014
LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014
2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Secur. Commun. Networks, 2013
An novel three-party authenticated key exchange protocol using one-time key.
J. Netw. Comput. Appl., 2013
Key distribution for heterogeneous public-key cryptosystems.
J. Commun. Networks, 2013
Activity clustering for anomaly detection.
Int. J. Intell. Inf. Database Syst., 2013
Privacy-preserving logistic regression outsourcing in cloud computing.
Int. J. Grid Util. Comput., 2013
Interference management strategy for multiuser two-way relay networks.
Int. J. Embed. Syst., 2013
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
IET Inf. Secur., 2013
The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Cyclic code from the first class Whiteman's generalized cyclotomic sequence with order 4
CoRR, 2013
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Comput. Networks, 2013
PPAS: privacy protection authentication scheme for VANET.
Clust. Comput., 2013
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture.
Clust. Comput., 2013
Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013
The cross-correlation distribution of a p-ary m-sequence of period p<sup>2k</sup>-1 and its decimated sequence by ( (p<sup>k</sup>+1)<sup>2</sup> / 2(p<sup>e</sup>+1) ).
Adv. Math. Commun., 2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Public auditing for shared data with efficient user revocation in the cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
An Adaptive Feedback Load Balancing Algorithm in HDFS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
CSP-Based General Detection Model of Network Covert Storage Channels.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013
MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wirel. Commun., 2012
Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Secur. Commun. Networks, 2012
A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012
Group key agreement for secure group communication in dynamic peer systems.
J. Parallel Distributed Comput., 2012
Group Key Agreement From Signcryption.
KSII Trans. Internet Inf. Syst., 2012
Security Issues on Machine to Machine Communications.
KSII Trans. Internet Inf. Syst., 2012
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012
Message from the Guest Editors.
Int. J. Inf. Sec., 2012
A method for efficient parallel computation of Tate pairing.
Int. J. Grid Util. Comput., 2012
Fairness electronic payment protocol.
Int. J. Grid Util. Comput., 2012
A new proxy blind signature scheme.
Int. J. Grid Util. Comput., 2012
An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerg. Telecommun. Technol., 2012
A simple and robust handover authentication between HeNB and eNB in LTE networks.
Comput. Networks, 2012
Codes Based Tracing and Revoking Scheme with Constant Ciphertext.
Proceedings of the Provable Security - 6th International Conference, 2012
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012
A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Smart-blocking file storage method in cloud computing.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Gmatch: Secure and privacy-preserving group matching in social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2012
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Robustness of Weighting Receive Antenna Selection Algorithm.
Wirel. Pers. Commun., 2011
Identity-based key distribution for mobile Ad Hoc networks.
Frontiers Comput. Sci. China, 2011
Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China, 2011
The cross-correlation distribution of a p-ary m-sequence of period p<sup>2m</sup>-1 and its decimation by (p<sup>m</sup>+1)<sup>2</sup> / 2(p<sup>e</sup>+1).
CoRR, 2011
On the Cross-Correlation of a Ternary m-sequence of Period 3<sup>4k</sup>-1 and Its Decimated Sequence by (3<sup>2k</sup>+1)<sup>2</sup> / 20.
CoRR, 2011
$p$-ary sequences with six-valued cross-correlation function: a new decimation of Niho type
CoRR, 2011
On the cross-correlation of a ternary m-sequence of period 3<sup>4k</sup> - 1 and its decimated sequence by (3<sup>2k</sup>+1)<sup>2</sup>/20.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011
Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Abuse-freeness Electronic Payment Protocol.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Forward Secure Proxy Blind Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Delay Tolerant Networking.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010
ID-based authenticated group key agreement from bilinear maps.
Frontiers Comput. Sci. China, 2010
Performance analysis of optimal antenna scheme in transmit diversity systems.
Proceedings of the Sixth International Conference on Natural Computation, 2010
Behavior Clustering for Anomaly Detection.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
A Stream Pattern Matching Method for Traffic Analysis.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
DASR: Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2009
Secure Error-Correction Network Coding in a Randomized Setting.
Proceedings of the Advances in Information Security and Assurance, 2009
An Efficient Fast Authentication Protocol.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A New Abuse-Free Fair Electronic Payment Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Security Analysis of the Kerberos Protocol Using BAN Logic.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves.
IACR Cryptol. ePrint Arch., 2008
Polynomials for Ate Pairing and Ate<sub>i</sub> Pairing.
IACR Cryptol. ePrint Arch., 2008
Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR, 2008
The Design of Optimal Period Interleaver.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Mobile ip registration in certificateless public key infrastructure.
IET Inf. Secur., 2007
2005
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
A Token-Based Single Sign-On Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
A Classified Method Based on Support Vector Machine for Grid Computing Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004