Kai Fan
Orcid: 0000-0001-6870-6657Affiliations:
- Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Xidian University, China (PhD 2007)
According to our database1,
Kai Fan
authored at least 92 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET.
IEEE Internet Things J., September, 2024
Peer Peer Netw. Appl., July, 2024
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector.
IEEE Internet Things J., May, 2024
CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing.
IEEE Internet Things J., May, 2024
Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments.
IEEE Internet Things J., April, 2024
Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid.
IEEE Internet Things J., March, 2024
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT.
IEEE Internet Things J., January, 2024
Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT.
IEEE Internet Things J., January, 2024
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024
Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things.
IEEE Internet Things J., 2024
IEEE Internet Things J., 2024
Data complexity-based batch sanitization method against poison in distributed learning.
Digit. Commun. Networks, 2024
Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense.
CoRR, 2024
Seamless group handover authentication protocol for vehicle networks: Services continuity.
Comput. Networks, 2024
2023
A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects.
IEEE Internet Things J., September, 2023
Peer Peer Netw. Appl., May, 2023
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End.
IEEE Trans. Cloud Comput., 2023
Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud.
IEEE Netw., 2023
2022
Blockchain-based trust management for verifiable time synchronization service in IoT.
Peer-to-Peer Netw. Appl., 2022
Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems.
IEEE Internet Things J., 2022
Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022
2021
IEEE Trans. Ind. Informatics, 2021
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
Cross-domain access control based on trusted third-party and attribute mapping center.
J. Syst. Archit., 2021
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021
Comput. Commun., 2021
2020
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer-to-Peer Netw. Appl., 2020
A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020
Inf. Sci., 2020
Comput. Commun., 2020
A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019
IEEE Netw., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
IEEE Trans. Ind. Informatics, 2018
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018
Peer-to-Peer Netw. Appl., 2018
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018
J. Medical Syst., 2018
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018
2017
Sensors, 2017
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Peer-to-Peer Netw. Appl., 2017
ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G.
Mob. Inf. Syst., 2017
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Concurr. Comput. Pract. Exp., 2014
LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2007
IET Inf. Secur., 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007