Jian Shen

Orcid: 0000-0003-0519-9058

Affiliations:
  • Nanjing University of Information Science and Technology, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, China
  • Chosun University, South Korea (PhD 2012)


According to our database1, Jian Shen authored at least 239 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Trustworthiness in Cross-Border Data Exchange in 5G-Powered Intelligent Connected Vehicles.
IEEE Netw., November, 2024

ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024

Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning.
IEEE Trans. Consumer Electron., February, 2024

Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs.
IEEE Trans. Veh. Technol., January, 2024

PpNNT: Multiparty Privacy-Preserving Neural Network Training System.
IEEE Trans. Artif. Intell., January, 2024

DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing.
IEEE Trans. Inf. Forensics Secur., 2024

Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder.
IEEE Trans. Inf. Forensics Secur., 2024

Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud-Edge Computing Environment.
IEEE Trans. Engineering Management, 2024

SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs.
Digit. Commun. Networks, 2024

2023
Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
Inf. Sci., October, 2023

TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023

Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023

Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

A Novel Key Agreement Protocol Applying Latin Square for Cloud Data Sharing.
IEEE Trans. Sustain. Comput., 2023

PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2023

ID-Based Ring Signature against Continual Side Channel Attack.
Symmetry, 2023

Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems.
Future Gener. Comput. Syst., 2023

Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems.
Future Gener. Comput. Syst., 2023

Anonymous Authentication Scheme for Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022

IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022

A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs.
ACM Trans. Internet Techn., 2022

Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022

A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022

Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey.
J. Netw. Comput. Appl., 2022

A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022

A location-based privacy-preserving oblivious sharing scheme for indoor navigation.
Future Gener. Comput. Syst., 2022

A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2021

Profile Matching for IoMT: A Verifiable Private Set Intersection Scheme.
IEEE J. Biomed. Health Informatics, 2021

Fuzzy-Based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks.
IEEE Trans. Fuzzy Syst., 2021

B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021

A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data.
IEEE Trans. Emerg. Top. Comput., 2021

Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network.
IEEE Trans. Emerg. Top. Comput., 2021

Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure.
IEEE Trans. Big Data, 2021

Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs.
Sensors, 2021

Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.
Secur. Commun. Networks, 2021

A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare.
Secur. Commun. Networks, 2021

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021

An efficient resource sharing scheme based on the linear feedback shift register.
Int. J. Sens. Networks, 2021

An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities.
Int. J. Distributed Sens. Networks, 2021

Security preservation in industrial medical CPS using Chebyshev map: An AI approach.
Future Gener. Comput. Syst., 2021

Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021

A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids.
Connect. Sci., 2021

A certificateless signcryption scheme for smart home networks.
Concurr. Comput. Pract. Exp., 2021

Key Exposure Resistant Group Key Agreement Protocol.
Proceedings of the Provable and Practical Security, 2021

A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

A Novel Dynamic Group Signature with Membership Privacy.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices.
Wirel. Commun. Mob. Comput., 2020

Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020

Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020

Content-Centric Group User Authentication for Secure Social Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020

Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security.
Multim. Tools Appl., 2020

Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020

A practical group blind signature scheme for privacy protection in smart grid.
J. Parallel Distributed Comput., 2020

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020

Secure and Efficient Data Sharing in Dynamic Vehicular Networks.
IEEE Internet Things J., 2020

Collaborative filtering-based recommendation system for big data.
Int. J. Comput. Sci. Eng., 2020

A Novel Structure-Based Data Sharing Scheme in Cloud Computing.
IEICE Trans. Inf. Syst., 2020

Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020

SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020

Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020

Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020

Anonymous data collection scheme for cloud-aided mobile edge networks.
Digit. Commun. Networks, 2020

ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020

Energy Conservation Techniques for Flying Ad Hoc Networks.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019

Towards efficient privacy-preserving encrypted image search in cloud computing.
Soft Comput., 2019

Intelligent agent-based region division scheme for mobile sensor networks.
Soft Comput., 2019

Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds.
IEEE Syst. J., 2019

Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management.
Sensors, 2019

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.
Peer-to-Peer Netw. Appl., 2019

Publicly verifiable privacy-preserving aggregation and its application in IoT.
J. Netw. Comput. Appl., 2019

Secure big data communication for energy efficient intra-cluster in WSNs.
Inf. Sci., 2019

Key-policy attribute-based encryption against continual auxiliary input leakage.
Inf. Sci., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Efficient two-party certificateless authenticated key agreement protocol under GDH assumption.
Int. J. Ad Hoc Ubiquitous Comput., 2019

Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2019

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019

Dynamic Offloading for Energy Harvesting Mobile Edge Computing: Architecture, Case Studies, and Future Directions.
IEEE Access, 2019

Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Rethinking Authentication on Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.
J. Supercomput., 2018

A Novel Latin-Square-Based Secret Sharing for M2M Communications.
IEEE Trans. Ind. Informatics, 2018

Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Linear complexity of a class of pseudorandom sequences over a general finite field.
Soft Comput., 2018

Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Syst. J., 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Secur. Commun. Networks, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018

Cloud Based Data Protection in Anonymously Controlled SDN.
Secur. Commun. Networks, 2018

Artificial Intelligence Inspired Multi-Dimensional Traffic Control for Heterogeneous Networks.
IEEE Netw., 2018

Secure Emergent Data Protection Scheme for a Space-Terrestrial Integrated Network.
IEEE Netw., 2018

Implicit authentication protocol and self-healing key management for WBANs.
Multim. Tools Appl., 2018

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.
J. Netw. Comput. Appl., 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet Things J., 2018

Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

A lightweight multi-layer authentication protocol for wireless body area networks.
Future Gener. Comput. Syst., 2018

Secure intelligent traffic light control using fog computing.
Future Gener. Comput. Syst., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Gener. Comput. Syst., 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018

Fingerprint-based access to personally controlled health records in emergency situations.
Sci. China Inf. Sci., 2018

A provably secure password-based anonymous authentication scheme for wireless body area networks.
Comput. Electr. Eng., 2018

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain.
IEEE Access, 2018

A Short Linearly Homomorphic Proxy Signature Scheme.
IEEE Access, 2018

An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services.
IEEE Access, 2018

A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing.
Proceedings of the 2018 International Conference on Computing, 2018

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Adaptive task scheduling strategy in cloud: when energy consumption meets performance guarantee.
World Wide Web, 2017

A query refinement framework for xml keyword search.
World Wide Web, 2017

Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network.
Wirel. Pers. Commun., 2017

An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices.
Wirel. Pers. Commun., 2017

Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wirel. Pers. Commun., 2017

Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wirel. Pers. Commun., 2017

A Fairness-Enhanced Micropayment Scheme.
Wirel. Pers. Commun., 2017

Secure Data Access and Sharing Scheme for Cloud Storage.
Wirel. Pers. Commun., 2017

Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2017

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2017

EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs.
Telecommun. Syst., 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Pers. Ubiquitous Comput., 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017

A secure cloud-assisted urban data sharing framework for ubiquitous-cities.
Pervasive Mob. Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive Mob. Comput., 2017

Distributed Energy Management for Vehicle-to-Grid Networks.
IEEE Netw., 2017

Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
KSII Trans. Internet Inf. Syst., 2017

An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.
KSII Trans. Internet Inf. Syst., 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Inf. Technol. Control., 2017

A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Inf., 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017

Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence.
Int. J. Found. Comput. Sci., 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Comput. Stand. Interfaces, 2017

Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

Medical image classification based on multi-scale non-negative sparse coding.
Artif. Intell. Medicine, 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Ann. des Télécommunications, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Novel Clustering Solution for Wireless Sensor Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

An Expressive Hidden Access Policy CP-ABE.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Fibonacci Based Batch Auditing Protocol for Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Movie Recommendation System Employing the User-Based CF in Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

An Integrated LSTM Prediction Method Based on Multi-scale Trajectory Space.
Proceedings of the 4th IAPR Asian Conference on Pattern Recognition, 2017

2016
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
J. Supercomput., 2016

Security analysis of a user registration approach.
J. Supercomput., 2016

Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems.
ACM Trans. Embed. Comput. Syst., 2016

An adaptive approach to better load balancing in a consumer-centric cloud environment.
IEEE Trans. Consumer Electron., 2016

Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment.
Sensors, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Secur. Commun. Networks, 2016

A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
Secur. Commun. Networks, 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Secur. Commun. Networks, 2016

Efficient data integrity auditing for storage security in mobile health cloud.
Peer-to-Peer Netw. Appl., 2016

Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems.
Mob. Networks Appl., 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016

Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.
J. Medical Syst., 2016

An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016

E2GSM: Energy Effective Gear-Shifting Mechanism in Cloud Storage System.
KSII Trans. Internet Inf. Syst., 2016

A Privacy-Preserving Health Data Aggregation Scheme.
KSII Trans. Internet Inf. Syst., 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

Consensus-based sparse signal reconstruction algorithm for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

Insecurity of a Certificateless Aggregate Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intell. Autom. Soft Comput., 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Gener. Comput. Syst., 2016

Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Certificateless Authentication Protocol for Wireless Body Area Network.
Proceedings of the Genetic and Evolutionary Computing, 2016

A load-balancing approach based on modified K-ELM and NSGA-II in a heterogeneous cloud environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

A Survey on the Research of Indoor RFID Positioning System.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Exploiting Group Signature to Implement User Authentication in Cloud Computing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Enhanced secure sensor association and key management in wireless body area networks.
J. Commun. Networks, 2015

Multiple mobile sink-based routing algorithm for data dissemination in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

Outsourced data tagging via authority and delegable auditing for cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

EECD: A Code Dissemination protocol in a WSN-based Home Energy Management System.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

An Optimized Strategy for Speculative Execution in a Heterogeneous Environment.
Proceedings of the 9th International Conference on Future Generation Communication and Networking, 2015

A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Buffer scheme optimization of epidemic routing in delay tolerant networks.
J. Commun. Networks, 2014

Performance Comparison of Typical Routing Protocols in Ad-hoc Networks.
Proceedings of the Intelligent Systems and Applications, 2014

An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection.
Proceedings of the Intelligent Systems and Applications, 2014

A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers.
Proceedings of the Intelligent Systems and Applications, 2014

A Comparative Survey on RFID Grouping Authentication Protocols.
Proceedings of the Intelligent Systems and Applications, 2014

Phased Array and Image Enhancement Method Based Structural Health Monitoring.
Proceedings of the Intelligent Systems and Applications, 2014

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Improved Stable Election Based Routing Protocol with Mobile Sink for Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Mobile-Sink Routing Algorithm Based on Energy and Distance for Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

An enhanced routing algorithm for congestion control in a home energy management system.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

A Novel Verifiably Encrypted Signature from Weil Pairing.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

A Comparative Study on Routing Protocols in Underwater Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Location-Aware Routing Protocol for Underwater Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Efficient Key Management Scheme for SCADA System.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2012
Identity-based key agreement protocol employing a symmetric balanced incomplete block design.
J. Commun. Networks, 2012

2010
Comment: "Eenhanced novel access control protocol over wireless sensor networks".
IEEE Trans. Consumer Electron., 2010

A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks.
IEICE Trans. Inf. Syst., 2010


  Loading...