Chunhua Jin

Orcid: 0000-0002-1667-1410

According to our database1, Chunhua Jin authored at least 63 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A blockchain-based auditable deduplication scheme for multi-cloud storage.
Peer Peer Netw. Appl., September, 2024

Finite Time Blow-Up and Chemotactic Collapse in Keller-Segel Model with Signal Consumption.
J. Nonlinear Sci., August, 2024

BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication.
J. Syst. Archit., February, 2024

Efficient and secure heterogeneous online/offline signcryption for wireless body area network.
Pervasive Mob. Comput., 2024

Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV.
Comput. Commun., 2024

2023
A heterogeneous online/offline signcryption scheme for Internet of Vehicles.
Veh. Commun., October, 2023

An efficient heterogeneous signcryption scheme for internet of things.
Pervasive Mob. Comput., August, 2023

How an industrial internet platform empowers the digital transformation of SMEs: theoretical mechanism and business model.
J. Knowl. Manag., 2023

Research on Optimization of Public Opinion Supervision Model of Social Network Platform Based on Evolutionary Game.
Inf., 2023

An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks.
Comput. Syst. Sci. Eng., 2023

2022
Secure fuzzy identity-based public verification for cloud storage.
J. Syst. Archit., 2022

Heterogeneous online/offline signcryption for secure communication in Internet of Things.
J. Syst. Archit., 2022

A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

The Motivations Behind Luxury Consumption: Application of Grounded Theory Approach.
Proceedings of the Digitalization and Management Innovation, 2022

2021
An identity-based proxy re-encryption for data deduplication in cloud.
J. Syst. Archit., 2021

EBIAC: Efficient biometric identity-based access control for wireless body area networks.
J. Syst. Archit., 2021

Order-Preserving and Order-Reversing Mappings between Consumption Bundles and Utilities.
Complex., 2021

2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020

Road Manhole Cover Delineation Using Mobile Laser Scanning Point Cloud Data.
IEEE Geosci. Remote. Sens. Lett., 2020

A general integration scheme in quadrature element method.
Appl. Math. Lett., 2020

Heterogeneous Deniable Authenticated Encryption Protocol.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Certificateless deniably authenticated encryption and its application to e-voting system.
Telecommun. Syst., 2019

Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
Mob. Networks Appl., 2019

Two-level attention with two-stage multi-task learning for facial emotion recognition.
J. Vis. Commun. Image Represent., 2019

Identity-based Deniable Authenticated Encryption for E-voting Systems.
KSII Trans. Internet Inf. Syst., 2019

Heterogeneous deniable authentication and its application to e-voting systems.
J. Inf. Secur. Appl., 2019

Effects of socialization interactions on customer engagement in online travel communities.
Internet Res., 2019

A Blockchain-Based Medical Data Sharing and Protection Scheme.
IEEE Access, 2019

Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection.
IEEE Access, 2019

Two-Level Attention with Multi-task Learning for Facial Emotion Estimation.
Proceedings of the MultiMedia Modeling - 25th International Conference, 2019

2018
Cost-Effective and Anonymous Access Control for Wireless Body Area Networks.
IEEE Syst. J., 2018

Existence and Stability of Traveling Waves for Degenerate Reaction-Diffusion Equation with Time Delay.
J. Nonlinear Sci., 2018

Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
J. Medical Syst., 2018

An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.
J. Medical Syst., 2018

Certificateless aggregate deniable authentication protocol for ad hoc networks.
Int. J. Electron. Secur. Digit. Forensics, 2018

A Fast PQ Hash Code Indexing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Combination of valence-sensitive loss with restrictive center loss for facial expression recognition.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Heterogeneous Deniable Authentication for E-Voting Systems.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Certificateless online/offline signcryption for the Internet of Things.
Wirel. Networks, 2017

Efficient and Short Identity-Based Deniable Authenticated Encryption.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Practical Signcryption for Secure Communication of Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

Identity-based deniable authenticated encryption and its application to e-mail system.
Telecommun. Syst., 2016

Secure and efficient data transmission in the Internet of Things.
Telecommun. Syst., 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016

Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016

Practical access control for sensor networks in the context of the Internet of Things.
Comput. Commun., 2016

2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015

A post-quantum communication secure identity-based proxy-signcryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2015

An efficient certificateless deniable authentication protocol without pairings.
Int. J. Electron. Secur. Digit. Forensics, 2015

Weak form quadrature element method for accurate free vibration analysis of thin skew plates.
Comput. Math. Appl., 2015

ID-Based Deniable Threshold Ring Authentication.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014

Identity-based deniable authentication for ad hoc networks.
Computing, 2014

Efficient forward secure identity-based shorter signature from lattice.
Comput. Electr. Eng., 2014

Novel weak form quadrature element method with expanded Chebyshev nodes.
Appl. Math. Lett., 2014

Non-oscillatory solutions for a nonlinear neutral delay differential equation.
Appl. Math. Comput., 2014

2013
A novel certificateless deniable authentication protocol.
IACR Cryptol. ePrint Arch., 2013

2011
The pricing model construction of reverse supply chain based on game theory.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A quenching phenomenon for one-dimensional p-Laplacian with singular boundary flux.
Appl. Math. Lett., 2010

2009
Estimating Nitrogen Status of Plant by Vis/NIR Spectroscopy and Mathematical Model.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Study on an Advanced Treatment of Domestic Wastewater by Bio-filtration and Water-Quality Measurement System.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2007
Existence of positive periodic solutions for the p-Laplacian system.
Appl. Math. Lett., 2007


  Loading...