Li Xu

Orcid: 0000-0002-8972-3373

Affiliations:
  • Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
  • Nanjing University of Posts and Telecommunications, China (PhD 2004)


According to our database1, Li Xu authored at least 204 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Blockchain-Based Data Aggregation Scheme With Privacy-Preserving on the Smart Grid.
IEEE Trans. Smart Grid, November, 2024

Endogenous Security of $FQ_{n}$ Networks: Adaptive System-Level Fault Self-Diagnosis.
IEEE Trans. Reliab., September, 2024

Influence maximization in mobile social networks based on RWP-CELF.
Computing, June, 2024

Community anomaly detection in attribute networks based on refining context.
Computing, June, 2024

Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks.
IEEE Trans. Reliab., March, 2024

Graph Reconfigurable Pooling for Graph Representation Learning.
IEEE Trans. Emerg. Top. Comput., 2024

2023
Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements.
Comput. J., August, 2023

Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs.
Comput. J., May, 2023

Fault Diagnosability of Networks With Fault-Free Block at Local Vertex Under MM* Model.
IEEE Trans. Reliab., March, 2023

Key Extraction Using Ambient Sounds for Smart Devices.
ACM Trans. Sens. Networks, February, 2023

Influence maximization based on SATS scheme in social networks.
Computing, February, 2023

Component Fault Diagnosability of Hierarchical Cubic Networks.
ACM Trans. Design Autom. Electr. Syst., 2023

Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach.
IEEE Trans. Inf. Forensics Secur., 2023

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection.
Sensors, 2023

Differential privacy preservation for graph auto-encoders: A novel anonymous graph publishing model.
Neurocomputing, 2023

BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Text Summarization Generation Based on Improved Transformer Model.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Strong Reliability of Star Graphs Interconnection Networks.
IEEE Trans. Reliab., 2022

A Pessimistic Fault Diagnosability of Large-Scale Connected Networks via Extra Connectivity.
IEEE Trans. Parallel Distributed Syst., 2022

FFNLFD: Fault Diagnosis of Multiprocessor Systems at Local Node With Fault-Free Neighbors Under PMC Model and MM* Model.
IEEE Trans. Parallel Distributed Syst., 2022

Influence Maximization Based on Network Motifs in Mobile Social Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks.
IEEE Trans. Computers, 2022

Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy.
IEEE Syst. J., 2022

Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks.
Secur. Commun. Networks, 2022

Controllable software licensing system for sub-licensing.
J. Inf. Secur. Appl., 2022

Subgraph Reliability of Alternating Group Graph With Uniform and Nonuniform Vertex Fault-Free Probabilities.
Comput. J., 2022

Relationship between g-extra Connectivity and g-restricted Connectivity in Networks.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Information spreading in mobile social networks: identifying the influential nodes using FPSO algorithm.
Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City, 2022

2021
An Analysis on the Reliability of the Alternating Group Graph.
IEEE Trans. Reliab., 2021

A Complete Fault Tolerant Method for Extra Fault Diagnosability of Alternating Group Graphs.
IEEE Trans. Reliab., 2021

A Novel Measurement for Network Reliability.
IEEE Trans. Computers, 2021

Graph partition based privacy-preserving scheme in social networks.
J. Netw. Comput. Appl., 2021

Graph Matching Based Privacy-Preserving Scheme in Social Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021

2020
Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach.
IEEE Trans. Wirel. Commun., 2020

Restricted connectivity and good-neighbor diagnosability of split-star networks.
Theor. Comput. Sci., 2020

A new proof for exact relationship between extra connectivity and extra diagnosability of regular connected graphs under MM* model.
Theor. Comput. Sci., 2020

Decision aids on breast conserving surgery for early stage breast cancer patients: a systematic review.
BMC Medical Informatics Decis. Mak., 2020

Lightweight privacy preservation for secondary users in cognitive radio networks.
J. Netw. Comput. Appl., 2020

Entropy-driven data aggregation method for energy-efficient wireless sensor networks.
Inf. Fusion, 2020

Rollout algorithm for light-weight physical-layer authentication in cognitive radio networks.
IET Commun., 2020

Efficient physical layer key generation technique in wireless communications.
EURASIP J. Wirel. Commun. Netw., 2020

Influence maximization based on activity degree in mobile social networks.
Concurr. Comput. Pract. Exp., 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing.
IEEE Access, 2020

De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks.
Proceedings of the Security and Privacy in Digital Economy, 2020

User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid.
Proceedings of the Security and Privacy in Digital Economy, 2020

An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Learning Based Energy Efficient Radar Power Control Against Deceptive Jamming.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Minimization of delay and collision with cross cube spanning tree in wireless sensor networks.
Wirel. Networks, 2019

Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks.
IEEE Trans. Dependable Secur. Comput., 2019

Extra diagnosability and good-neighbor diagnosability of <i>n</i>-dimensional alternating group graph <i>AG</i><sub><i>n</i></sub> under the PMC model.
Theor. Comput. Sci., 2019

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.
Secur. Commun. Networks, 2019

Privacy-preserving aggregation for cooperative spectrum sensing.
J. Netw. Comput. Appl., 2019

On exploiting priority relation graph for reliable multi-path communication in mobile social networks.
Inf. Sci., 2019

The Conditional Diagnosability with g-Good-Neighbor of Exchanged Hypercubes.
Comput. J., 2019

An efficient privacy-preserving protocol for database-driven cognitive radio networks.
Ad Hoc Networks, 2019

Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage.
IEEE Access, 2019

Component Reliability Evaluation on Split-Stars.
IEEE Access, 2019

Minimum Neighborhood of Alternating Group Graphs.
IEEE Access, 2019

2018
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Veh. Technol., 2018

The Relationship Between g-Restricted Connectivity and g-Good-Neighbor Fault Diagnosability of General Regular Networks.
IEEE Trans. Reliab., 2018

A shareable keyword search over encrypted data in cloud computing.
J. Supercomput., 2018

Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme.
IEEE Trans. Inf. Forensics Secur., 2018

The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs.
IEEE Trans. Dependable Secur. Comput., 2018

Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Soc. Syst., 2018

The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model.
J. Comput. Syst. Sci., 2018

The (t, k) -Diagnosability of Balanced Hypercube under the PMC Model.
Int. J. Comput. Math. Comput. Syst. Theory, 2018

The flexible and privacy-preserving proximity detection in mobile social network.
Future Gener. Comput. Syst., 2018

An anonymous batch handover authentication protocol for big flow wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2018

Identity-based non-repudiable dynamic provable data possession in cloud storage.
Comput. Electr. Eng., 2018

Online Internet traffic monitoring system using spark streaming.
Big Data Min. Anal., 2018

2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Sci. Program., 2017

Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017

Self-adaptive trust management based on game theory in fuzzy large-scale networks.
Soft Comput., 2017

A Straight Skeleton Based Connectivity Restoration Strategy in the Presence of Obstacles for WSNs.
Sensors, 2017

Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks.
J. Netw. Comput. Appl., 2017

Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.
J. Inf. Sci. Eng., 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017

An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Comput. Commun., 2017

A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks.
Comput. Electr. Eng., 2017

Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Appl. Math. Comput., 2017

Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems.
IEEE Access, 2017

Private and Flexible Proximity Detection Based on Geohash.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

2016
The Extra Connectivity, Extra Conditional Diagnosability, and t/m-Diagnosability of Arrangement Graphs.
IEEE Trans. Reliab., 2016

The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks.
IEEE Trans. Parallel Distributed Syst., 2016

Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model.
Theor. Comput. Sci., 2016

The t/k-Diagnosability for Regular Networks.
IEEE Trans. Computers, 2016

Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks.
Sensors, 2016

Trustworthiness-hypercube-based reliable communication in mobile social networks.
Inf. Sci., 2016

Evolutionarily stable opportunistic spectrum access in cognitive radio networks.
IET Commun., 2016

Secure routing and resource allocation based on game theory in cooperative cognitive radio networks.
Concurr. Comput. Pract. Exp., 2016

Worm propagation model in mobile network.
Concurr. Comput. Pract. Exp., 2016

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

A privacy-preserving Proximity Detection Method in social network.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

An Adaptive Error Concealment Algorithm Based on Partition Model.
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016

2015
The Reliability of Subgraphs in the Arrangement Graph.
IEEE Trans. Reliab., 2015

The Extra Connectivity and Conditional Diagnosability of Alternating Group Networks.
IEEE Trans. Parallel Distributed Syst., 2015

A novel sleep scheduling scheme in green wireless sensor networks.
J. Supercomput., 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015

Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommun. Syst., 2015

Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model.
Theor. Comput. Sci., 2015

The t/k-Diagnosability of Star Graph Networks.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks.
J. Univers. Comput. Sci., 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

Batch public auditing for distributed mobile cloud computing.
Int. J. High Perform. Comput. Netw., 2015

Cooperative attribute-based access control for enterprise computing system.
Int. J. Embed. Syst., 2015

Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks.
Int. J. Distributed Sens. Networks, 2015

Collecting all data continuously in wireless sensor networks with a mobile base station.
Int. J. Comput. Sci. Eng., 2015

Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model.
Int. J. Comput. Math., 2015

Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Int. J. Appl. Math. Comput. Sci., 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Localization for Jamming Attack in Wireless Sensor Networks.
Proceedings of the Intelligent Data Analysis and Applications, 2015

An AGV Mechanism Based Secure Routing Protocol for Internet of Things.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wirel. Pers. Commun., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Distributed Separate Coding for Continuous Data Collection in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014

Conditional diagnosability of arrangement graphs under the PMC model.
Theor. Comput. Sci., 2014

Anomaly diagnosis based on regression and classification analysis of statistical traffic features.
Secur. Commun. Networks, 2014

A local joint fast handoff scheme in cognitive wireless mesh networks.
Secur. Commun. Networks, 2014

Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014

Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism.
J. Appl. Math., 2014

A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intell. Humaniz. Comput., 2014

Matrix-based pairwise key establishment for wireless mesh networks.
Future Gener. Comput. Syst., 2014

Security of new generation computing systems.
Concurr. Comput. Pract. Exp., 2014

Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014

Ticket-based handoff authentication for wireless mesh networks.
Comput. Networks, 2014

GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

Identity-Based Transitive Signcryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

The Social Feature-Based Priority Relation Graph of Mobile Social Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

A Supermodular Game Framework for Power Control of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

An efficient self-diagnosis protocol for hierarchical wireless mesh networks.
Concurr. Comput. Pract. Exp., 2013

Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.
Concurr. Comput. Pract. Exp., 2013

Software Service Signature (S3) for authentication in cloud computing.
Clust. Comput., 2013

Data dynamics for remote data possession checking in cloud storage.
Comput. Electr. Eng., 2013

Group Data Collection in wireless sensor networks with a mobile base station.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Congestion Control Based on Cross-Layer Game Optimization in Wireless Mesh Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Constructing Connected Dominating Set Based on Crossed Cube in WSN.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Cloud Storage System from Threshold Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Attribute-Based Signatures with Efficient Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

A Novel Data Collection Scheme for WSNs.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Role Based Privacy-Aware Secure Routing in WMNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Multi-objective Optimization Based Virtual Resource Allocation Strategy for Cloud Computing.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Authentications and Key Management in 3G-WLAN Interworking.
Mob. Networks Appl., 2011

A USIM-Based Uniform Access Authentication Framework in Mobile Communication.
EURASIP J. Wirel. Commun. Netw., 2011

Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game.
Comput. Math. Appl., 2011

A study of subdividing hexagon-clustered WSN for power saving: Analysis and simulation.
Ad Hoc Networks, 2011

2010
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
Int. J. Secur. Networks, 2010

Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves.
Int. J. Netw. Secur., 2010

QoS analysis of medium access control in LR-WPANs under bursty error channels.
Future Gener. Comput. Syst., 2010

How to Construct a Divisible Online/Offline Signature.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

RFID System Security Using Identity-Based Cryptography.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Service Price Discrimination in Wireless Network.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2009

QoS Performance Analysis of IEEE 802.15.4 MAC in LR-WPAN with Bursty Error Channels.
Proceedings of the MSN 2009, 2009

2008
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks.
J. Commun., 2008

Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network.
J. Commun., 2008

A New Security Mechanism Based on SIP in Wireless LAN-3G Integration.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007

Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007

A new group rekeying scheme based on t-packing designs for ad hoc networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Anti-Collusion Anonymous Credentials Scheme.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006


  Loading...