Kai Fan

Orcid: 0000-0001-6870-6657

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
  • Xidian University, China (PhD 2007)


According to our database1, Kai Fan authored at least 93 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing.
IEEE Internet Things J., December, 2024

A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET.
IEEE Internet Things J., September, 2024

Lower rounds lattice-based anonymous AKA under the seCK model for the IoT.
Peer Peer Netw. Appl., July, 2024

EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector.
IEEE Internet Things J., May, 2024

CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing.
IEEE Internet Things J., May, 2024

Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments.
IEEE Internet Things J., April, 2024

Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid.
IEEE Internet Things J., March, 2024

PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024

Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT.
IEEE Internet Things J., January, 2024

Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT.
IEEE Internet Things J., January, 2024

FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024

LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024

Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things.
IEEE Internet Things J., 2024

SC-Chain: An Efficient Blockchain Framework for Smart City.
IEEE Internet Things J., 2024

Data complexity-based batch sanitization method against poison in distributed learning.
Digit. Commun. Networks, 2024

Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense.
CoRR, 2024

Seamless group handover authentication protocol for vehicle networks: Services continuity.
Comput. Networks, 2024

2023
A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects.
IEEE Internet Things J., September, 2023

Blockchain-based cloud-edge clock calibration in IoT.
Peer Peer Netw. Appl., May, 2023

Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023

MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud.
IEEE Netw., 2023

2022
Blockchain-based trust management for verifiable time synchronization service in IoT.
Peer-to-Peer Netw. Appl., 2022

Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems.
IEEE Internet Things J., 2022

Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022

A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022

2021
Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data.
IEEE Trans. Ind. Informatics, 2021

PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage.
Secur. Commun. Networks, 2021

A blockchain-based privacy preservation scheme in multimedia network.
Multim. Tools Appl., 2021

Cross-domain access control based on trusted third-party and attribute mapping center.
J. Syst. Archit., 2021

Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021

An ultra light weight and secure RFID batch authentication scheme for IoMT.
Comput. Commun., 2021

2020
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer-to-Peer Netw. Appl., 2020

A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020

Cloud-based lightweight secure RFID mutual authentication protocol in IoT.
Inf. Sci., 2020

Privacy-preserving searchable encryption in the intelligent edge computing.
Comput. Commun., 2020

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020

A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019

A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Netw., 2019

Blockchain-Based Secure Time Protection Scheme in IoT.
IEEE Internet Things J., 2019

Efficient and privacy preserving access control scheme for fog-enabled IoT.
Future Gener. Comput. Syst., 2019

A blockchain-based clock synchronization Scheme in IoT.
Future Gener. Comput. Syst., 2019

An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT.
IEEE Access, 2019

A Secure Cross-Domain Access Control Scheme in Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Lightweight RFID Protocol for Medical Privacy Protection in IoT.
IEEE Trans. Ind. Informatics, 2018

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018

Secure, efficient and revocable data sharing scheme for vehicular fogs.
Peer-to-Peer Netw. Appl., 2018

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer-to-Peer Netw. Appl., 2018

Secure and private key management scheme in big data networking.
Peer-to-Peer Netw. Appl., 2018

Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.
J. Medical Syst., 2018

Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018

Secure Time Synchronization Scheme in IoT Based on Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing.
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018

2017
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Sensors, 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017

Proxy-assisted access control scheme of cloud data for smart cities.
Pers. Ubiquitous Comput., 2017

An ultra-lightweight RFID authentication scheme for mobile commerce.
Peer-to-Peer Netw. Appl., 2017

ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G.
Mob. Inf. Syst., 2017

An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Cloud-Based Lightweight RFID Mutual Authentication Protocol.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

U2F based secure mutual authentication protocol for mobile payment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016

A Secure RFID Application Revocation Scheme for IoT.
IEICE Trans. Inf. Syst., 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Privacy protection based access control scheme in cloud-based services.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Adaptive Sensing Private Property Protection Protocol Based on Cloud.
Int. J. Distributed Sens. Networks, 2015

ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

RFID Secure Application Revocation for IoT in 5G.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Ciphertext Retrieval in Super-Peer P2P Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurr. Comput. Pract. Exp., 2014

LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
An Adaptive Feedback Load Balancing Algorithm in HDFS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Fairness electronic payment protocol.
Int. J. Grid Util. Comput., 2012

A new proxy blind signature scheme.
Int. J. Grid Util. Comput., 2012

ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Smart-blocking file storage method in cloud computing.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2011
Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Abuse-freeness Electronic Payment Protocol.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Forward Secure Proxy Blind Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010

2009
A New Abuse-Free Fair Electronic Payment Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Analysis of the Kerberos Protocol Using BAN Logic.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
Watermarking protocol of secure verification.
J. Electronic Imaging, 2007

Mobile ip registration in certificateless public key infrastructure.
IET Inf. Secur., 2007

A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Adaptive Encrypted Information Hiding Scheme for Images.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...