Jian Shen
Orcid: 0000-0003-0519-9058Affiliations:
- Nanjing University of Information Science and Technology, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, China
- Chosun University, South Korea (PhD 2012)
According to our database1,
Jian Shen
authored at least 239 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Blockchain-Based Trustworthiness in Cross-Border Data Exchange in 5G-Powered Intelligent Connected Vehicles.
IEEE Netw., November, 2024
ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024
Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Veh. Technol., January, 2024
IEEE Trans. Artif. Intell., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud-Edge Computing Environment.
IEEE Trans. Engineering Management, 2024
Digit. Commun. Networks, 2024
2023
Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
Inf. Sci., October, 2023
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
IEEE Trans. Sustain. Comput., 2023
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2023
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems.
Future Gener. Comput. Syst., 2023
Future Gener. Comput. Syst., 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs.
ACM Trans. Internet Techn., 2022
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Emerg. Top. Comput. Intell., 2022
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey.
J. Netw. Comput. Appl., 2022
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health.
Proceedings of the IEEE Global Communications Conference, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE J. Biomed. Health Informatics, 2021
Fuzzy-Based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks.
IEEE Trans. Fuzzy Syst., 2021
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Emerg. Top. Comput., 2021
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network.
IEEE Trans. Emerg. Top. Comput., 2021
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure.
IEEE Trans. Big Data, 2021
Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs.
Sensors, 2021
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.
Secur. Commun. Networks, 2021
A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare.
Secur. Commun. Networks, 2021
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021
Int. J. Sens. Networks, 2021
An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities.
Int. J. Distributed Sens. Networks, 2021
Future Gener. Comput. Syst., 2021
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids.
Connect. Sci., 2021
Concurr. Comput. Pract. Exp., 2021
Proceedings of the Provable and Practical Security, 2021
A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020
IEEE Trans. Emerg. Top. Comput., 2020
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security.
Multim. Tools Appl., 2020
Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020
J. Parallel Distributed Comput., 2020
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020
IEEE Internet Things J., 2020
Int. J. Comput. Sci. Eng., 2020
IEICE Trans. Inf. Syst., 2020
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Soft Comput., 2019
Soft Comput., 2019
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds.
IEEE Syst. J., 2019
Sensors, 2019
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.
Peer-to-Peer Netw. Appl., 2019
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
Inf. Sci., 2019
Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019
Efficient two-party certificateless authenticated key agreement protocol under GDH assumption.
Int. J. Ad Hoc Ubiquitous Comput., 2019
Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2019
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019
Dynamic Offloading for Energy Harvesting Mobile Edge Computing: Architecture, Case Studies, and Future Directions.
IEEE Access, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.
J. Supercomput., 2018
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
Soft Comput., 2018
Soft Comput., 2018
Soft Comput., 2018
Soft Comput., 2018
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018
IEEE Syst. J., 2018
Secur. Commun. Networks, 2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Artificial Intelligence Inspired Multi-Dimensional Traffic Control for Heterogeneous Networks.
IEEE Netw., 2018
IEEE Netw., 2018
Multim. Tools Appl., 2018
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.
J. Netw. Comput. Appl., 2018
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018
Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet Things J., 2018
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018
Future Gener. Comput. Syst., 2018
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018
A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018
Fingerprint-based access to personally controlled health records in emergency situations.
Sci. China Inf. Sci., 2018
A provably secure password-based anonymous authentication scheme for wireless body area networks.
Comput. Electr. Eng., 2018
IEEE Access, 2018
An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services.
IEEE Access, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Adaptive task scheduling strategy in cloud: when energy consumption meets performance guarantee.
World Wide Web, 2017
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network.
Wirel. Pers. Commun., 2017
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices.
Wirel. Pers. Commun., 2017
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs.
Telecommun. Syst., 2017
Soft Comput., 2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017
A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Pers. Ubiquitous Comput., 2017
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017
Pervasive Mob. Comput., 2017
Pervasive Mob. Comput., 2017
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
KSII Trans. Internet Inf. Syst., 2017
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.
KSII Trans. Internet Inf. Syst., 2017
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Inf. Technol. Control., 2017
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Inf., 2017
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017
Int. J. Found. Comput. Sci., 2017
Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017
Comput. Stand. Interfaces, 2017
Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017
Comput. Electr. Eng., 2017
Artif. Intell. Medicine, 2017
Efficient designated server identity-based encryption with conjunctive keyword search.
Ann. des Télécommunications, 2017
IEEE Access, 2017
An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 4th IAPR Asian Conference on Pattern Recognition, 2017
2016
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
J. Supercomput., 2016
Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems.
ACM Trans. Embed. Comput. Syst., 2016
An adaptive approach to better load balancing in a consumer-centric cloud environment.
IEEE Trans. Consumer Electron., 2016
Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment.
Sensors, 2016
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Secur. Commun. Networks, 2016
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems.
Mob. Networks Appl., 2016
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016
J. Medical Syst., 2016
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016
KSII Trans. Internet Inf. Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016
Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016
Int. J. Distributed Sens. Networks, 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Intell. Autom. Soft Comput., 2016
Future Gener. Comput. Syst., 2016
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Genetic and Evolutionary Computing, 2016
A load-balancing approach based on modified K-ELM and NSGA-II in a heterogeneous cloud environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Enhanced secure sensor association and key management in wireless body area networks.
J. Commun. Networks, 2015
Multiple mobile sink-based routing algorithm for data dissemination in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the IEEE International Conference on Consumer Electronics, 2015
An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform.
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the 9th International Conference on Future Generation Communication and Networking, 2015
A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
J. Commun. Networks, 2014
Proceedings of the Intelligent Systems and Applications, 2014
An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection.
Proceedings of the Intelligent Systems and Applications, 2014
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
An Improved Stable Election Based Routing Protocol with Mobile Sink for Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Mobile-Sink Routing Algorithm Based on Energy and Distance for Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
An enhanced routing algorithm for congestion control in a home energy management system.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2012
Identity-based key agreement protocol employing a symmetric balanced incomplete block design.
J. Commun. Networks, 2012
2010
IEEE Trans. Consumer Electron., 2010
A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks.
IEICE Trans. Inf. Syst., 2010