Fagen Li
Orcid: 0000-0001-6289-1265
According to our database1,
Fagen Li
authored at least 211 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2025
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025
Multi-Scale Convolutional Neural Networks optimized by elite strategy dung beetle optimization algorithm for encrypted traffic classification.
Expert Syst. Appl., 2025
2024
Telecommun. Syst., October, 2024
A new construction of public key authenticated encryption with keyword search based on LWE.
Telecommun. Syst., June, 2024
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability.
Telecommun. Syst., May, 2024
Blockchain-Based Privacy-Preserving Authentication With Hierarchical Access Control Using Polynomial Commitment for Mobile Cloud Computing.
IEEE Internet Things J., May, 2024
IEEE Internet Things J., April, 2024
A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees.
Telecommun. Syst., March, 2024
Quantum Inf. Process., February, 2024
Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement.
Quantum Inf. Process., February, 2024
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage.
J. Syst. Archit., 2024
J. Inf. Secur. Appl., 2024
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.
J. Inf. Secur. Appl., 2024
J. Inf. Secur. Appl., 2024
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024
Inf. Sci., 2024
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.
Expert Syst. Appl., 2024
Computer vision based distributed denial of service attack detection for resource-limited devices.
Comput. Electr. Eng., 2024
Appl. Intell., 2024
LA-IMDCN: A Lightweight Authentication Scheme With Smart Contract in Implantable Medical Device Communication Networks.
IEEE Access, 2024
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024
2023
J. Syst. Archit., December, 2023
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation.
Peer Peer Netw. Appl., November, 2023
A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing.
J. Syst. Archit., September, 2023
J. Univers. Comput. Sci., August, 2023
Traffic data extraction and labeling for machine learning based attack detection in IoT networks.
Int. J. Mach. Learn. Cybern., July, 2023
Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles.
IEEE Trans. Veh. Technol., May, 2023
Peer Peer Netw. Appl., May, 2023
Mitigation of a poisoning attack in federated learning by using historical distance detection.
Ann. des Télécommunications, April, 2023
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing.
Telecommun. Syst., March, 2023
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023
An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles.
J. Syst. Archit., March, 2023
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage.
IEEE Trans. Cloud Comput., 2023
Secur. Priv., 2023
J. Syst. Archit., 2023
J. Inf. Secur. Appl., 2023
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Proceedings of the Provable and Practical Security, 2023
2022
Telecommun. Syst., 2022
Telecommun. Syst., 2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022
J. Syst. Archit., 2022
J. Syst. Archit., 2022
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks.
Inf. Sci., 2022
IEEE Internet Things J., 2022
A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things.
IEEE Internet Things J., 2022
Comput. Sci. Rev., 2022
IEEE Access, 2022
2021
J. Syst. Archit., 2021
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks.
J. Syst. Archit., 2021
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability.
J. Syst. Archit., 2021
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification.
J. Syst. Archit., 2021
J. Ambient Intell. Humaniz. Comput., 2021
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks.
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things.
IEEE Internet Things J., 2021
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs.
Veh. Commun., 2020
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs.
IEEE Trans. Veh. Technol., 2020
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information.
Quantum Inf. Process., 2020
Quantum Inf. Process., 2020
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020
J. Syst. Archit., 2020
J. Syst. Archit., 2020
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments.
J. Syst. Archit., 2020
J. Syst. Archit., 2020
A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud.
J. Syst. Archit., 2020
An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs.
J. Syst. Archit., 2020
J. Inf. Secur. Appl., 2020
Int. J. Netw. Secur., 2020
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT.
IACR Cryptol. ePrint Arch., 2020
An efficient and practical certificateless signcryption scheme for wireless body area networks.
Comput. Commun., 2020
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020
2019
A combined public-key scheme in the case of attribute-based for wireless body area networks.
Wirel. Networks, 2019
Veh. Commun., 2019
Certificateless deniably authenticated encryption and its application to e-voting system.
Telecommun. Syst., 2019
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid.
Telecommun. Syst., 2019
Secur. Priv., 2019
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
Mob. Networks Appl., 2019
An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid.
J. Syst. Archit., 2019
A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs.
J. Syst. Archit., 2019
IEEE Internet Things J., 2019
IACR Cryptol. ePrint Arch., 2019
Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system.
Ann. des Télécommunications, 2019
A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments.
IEEE Access, 2019
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
2018
Wirel. Networks, 2018
Wirel. Networks, 2018
Wirel. Commun. Mob. Comput., 2018
IEEE Syst. J., 2018
Secur. Priv., 2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018
J. Medical Syst., 2018
J. Medical Syst., 2018
An efficient certificateless user authentication and key exchange protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2018
Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things.
IEEE Internet Things J., 2018
Inf., 2018
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Wirel. Networks, 2017
J. Medical Syst., 2017
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.
Int. J. Netw. Secur., 2017
Future Gener. Comput. Syst., 2017
Computing, 2017
Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment.
Proceedings of the Advances in Internetworking, 2017
2016
Wirel. Pers. Commun., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Identity-based deniable authenticated encryption and its application to e-mail system.
Telecommun. Syst., 2016
Telecommun. Syst., 2016
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
Symmetry, 2016
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016
J. Medical Syst., 2016
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016
Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Practical access control for sensor networks in the context of the Internet of Things.
Comput. Commun., 2016
2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015
KSII Trans. Internet Inf. Syst., 2015
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
Int. J. Netw. Secur., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015
DiSNPindel: improved intra-individual SNP and InDel detection in direct amplicon sequencing of a diploid.
BMC Bioinform., 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
2014
Int. J. Netw. Secur., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
Wirel. Pers. Commun., 2013
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013
Math. Comput. Model., 2013
New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013
Inf. Sci., 2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013
2012
IEEE Wirel. Commun. Lett., 2012
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012
Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012
J. Netw. Comput. Appl., 2012
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Expert Syst. Appl., 2012
Comput. Electr. Eng., 2012
Comput. Electr. Eng., 2012
2011
Int. J. Netw. Secur., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Fundam. Informaticae, 2011
Comput. Electr. Eng., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
2010
Informatica, 2010
Int. J. Netw. Secur., 2010
Sci. China Inf. Sci., 2010
2009
Int. J. Netw. Secur., 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Int. J. Secur. Networks, 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Fundam. Informaticae, 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Int. J. Mob. Commun., 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Int. J. Netw. Secur., 2006
IACR Cryptol. ePrint Arch., 2006
ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005