Jianfen Chu
According to our database1,
Jianfen Chu
authored at least 27 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers.
IEEE Trans. Parallel Distributed Syst., 2023
2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
2020
A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment.
Symmetry, 2020
A Sparse Bayesian Learning Method for Structural Equation Model-Based Gene Regulatory Network Inference.
IEEE Access, 2020
2019
IEEE Access, 2019
IEEE Access, 2019
2018
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
Multim. Tools Appl., 2018
2017
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
KSII Trans. Internet Inf. Syst., 2017
2016
The efficiency improved scheme for secure access control of digital video distribution.
Multim. Tools Appl., 2016
2015
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
J. Commun., 2015
J. Commun., 2015
2014
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
Secur. Commun. Networks, 2013
J. Networks, 2013
J. Comput., 2013
J. Commun., 2013
2012
J. Softw., 2012
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
J. Networks, 2012
A Survey on Data Migration Management in Cloud Environment.
J. Digit. Inf. Manag., 2012
J. Comput., 2012
J. Comput., 2012
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
KSII Trans. Internet Inf. Syst., 2012
2011
J. Networks, 2011
Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
J. Networks, 2011
2010
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010