Hu Xiong
Orcid: 0000-0001-6137-6667
According to our database1,
Hu Xiong
authored at least 176 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Future Gener. Comput. Syst., 2025
2024
ACM Comput. Surv., December, 2024
A Conditional Privacy-Preserving Mutual Authentication Protocol With Fine-Grained Forward and Backward Security in IoV.
IEEE Trans. Intell. Transp. Syst., November, 2024
Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System.
IEEE J. Biomed. Health Informatics, September, 2024
Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT.
Trans. Emerg. Telecommun. Technol., June, 2024
Heterogeneous Signcryption Scheme With Group Equality Test for Satellite-Enabled IoVs.
IEEE Internet Things J., March, 2024
Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse.
IEEE Trans. Consumer Electron., February, 2024
Blockchain-Enabled Privacy-Preserving Authentication Mechanism for Transportation CPS With Cloud-Edge Computing.
IEEE Trans. Engineering Management, 2024
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system.
J. Syst. Archit., 2024
Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training.
J. Ind. Inf. Integr., 2024
Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening.
Inf. Fusion, 2024
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT.
Comput. Electr. Eng., 2024
Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption.
Comput. Electr. Eng., 2024
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles.
Comput. Electr. Eng., 2024
Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models.
Appl. Soft Comput., 2024
2023
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System.
IEEE Trans. Ind. Informatics, November, 2023
Trans. Emerg. Telecommun. Technol., November, 2023
Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things.
IEEE J. Sel. Areas Commun., October, 2023
An Efficient Online/Offline Heterogeneous Signcryption Scheme With Equality Test for IoVs.
IEEE Trans. Veh. Technol., September, 2023
Pers. Ubiquitous Comput., April, 2023
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2023
Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT.
IEEE Trans. Dependable Secur. Comput., 2023
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023
Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2023
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT.
IEEE Internet Things J., 2023
Proceedings of the Big Data Technologies and Applications, 2023
2022
IEEE Trans. Serv. Comput., 2022
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs.
IEEE Trans. Dependable Secur. Comput., 2022
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing.
IEEE Trans. Big Data, 2022
An Anonymous Authentication Protocol With Delegation and Revocation for Content Delivery Networks.
IEEE Syst. J., 2022
Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs.
IEEE Syst. J., 2022
IEEE Syst. J., 2022
Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city.
Multim. Tools Appl., 2022
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system.
J. Ambient Intell. Humaniz. Comput., 2022
J. Ambient Intell. Humaniz. Comput., 2022
IEEE Internet Things J., 2022
Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message.
IEEE Internet Things J., 2022
Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems.
Trans. Emerg. Telecommun. Technol., 2022
Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov).
Comput. Electr. Eng., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
2021
Wirel. Networks, 2021
An Efficient Certificateless Authenticated Key Exchange Protocol Resistant to Ephemeral Key Leakage Attack for V2V Communication in IoV.
IEEE Trans. Veh. Technol., 2021
A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.
IEEE Trans. Fuzzy Syst., 2021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021
Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data".
IEEE Trans. Cloud Comput., 2021
A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity.
IEEE Syst. J., 2021
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV.
IEEE Syst. J., 2021
Multim. Tools Appl., 2021
KSII Trans. Internet Inf. Syst., 2021
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System.
KSII Trans. Internet Inf. Syst., 2021
IEEE Internet Things J., 2021
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things.
IEEE Internet Things J., 2021
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT.
Trans. Emerg. Telecommun. Technol., 2021
Trans. Emerg. Telecommun. Technol., 2021
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT.
Wirel. Pers. Commun., 2020
Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles.
Veh. Commun., 2020
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
Telecommun. Syst., 2020
Symmetry, 2020
Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments.
IEEE Syst. J., 2020
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.
Peer-to-Peer Netw. Appl., 2020
An efficient certificateless public key cryptography with authorized equality test in IIoT.
J. Ambient Intell. Humaniz. Comput., 2020
KSII Trans. Internet Inf. Syst., 2020
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things.
J. Inf. Secur. Appl., 2020
Mobile access and flexible search over encrypted cloud data in heterogeneous systems.
Inf. Sci., 2020
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT.
IEEE Internet Things J., 2020
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0".
IEEE Internet Things J., 2020
Int. J. Netw. Secur., 2020
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability.
Int. J. Inf. Sec., 2020
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT.
IACR Cryptol. ePrint Arch., 2020
Frontiers Comput. Sci., 2020
An efficient certificateless aggregate signature scheme for the Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020
CoRR, 2020
Clust. Comput., 2020
2019
ACM Trans. Manag. Inf. Syst., 2019
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing.
IEEE Syst. J., 2019
Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2019
A New Provably Secure Certificateless Signature with Revocation in the Standard Model.
Informatica, 2019
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing.
Future Gener. Comput. Syst., 2019
ACM Comput. Surv., 2019
Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels.
CoRR, 2019
Computing, 2019
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles.
IEEE Access, 2019
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario.
Secur. Commun. Networks, 2018
Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud".
Inf. Process. Lett., 2018
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation.
Int. J. Netw. Secur., 2018
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing.
IEEE Access, 2018
IEEE Access, 2018
Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records.
IEEE Access, 2018
2017
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing".
IEEE Trans. Dependable Secur. Comput., 2017
Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things.
Mob. Inf. Syst., 2017
Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation".
Inf. Process. Lett., 2017
Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare.
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet.
Int. J. Netw. Secur., 2017
A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability.
Int. J. Netw. Secur., 2017
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
Int. J. Netw. Secur., 2017
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.
Comput. Stand. Interfaces, 2017
Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity.
IEEE Access, 2017
2016
Quantum Inf. Process., 2016
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems.
J. Medical Syst., 2016
Inf. Process. Lett., 2016
Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Artificial Intelligence Research and Development, 2016
2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015
Wirel. Pers. Commun., 2015
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks.
IEEE Trans. Inf. Forensics Secur., 2015
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015
Strongly secure certificateless key-insulated signature secure in the standard model.
Ann. des Télécommunications, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
2014
Wirel. Pers. Commun., 2014
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
Wirel. Pers. Commun., 2014
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol.
IEEE Trans. Inf. Forensics Secur., 2014
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Simultaneous community discovery and user interests extraction in social network based on probabilistic model.
Int. J. Intell. Inf. Database Syst., 2014
IACR Cryptol. ePrint Arch., 2014
Sci. China Inf. Sci., 2014
2013
New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013
Inf. Sci., 2013
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.
Inf. Sci., 2013
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption.
Int. J. Secur. Networks, 2013
Int. J. Netw. Secur., 2013
Int. J. Netw. Secur., 2013
Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013
2012
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012
Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.
Int. J. Netw. Secur., 2012
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Expert Syst. Appl., 2012
Comput. Electr. Eng., 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
Int. J. Netw. Secur., 2011
Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011
Fundam. Informaticae, 2011
Comput. Electr. Eng., 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
Informatica, 2010
Int. J. Netw. Secur., 2010
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
CoRR, 2010
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
2009
Int. J. Netw. Secur., 2009
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
CoRR, 2009
DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
2008
Fundam. Informaticae, 2008
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007