Qingfeng Cheng
Orcid: 0000-0001-6149-4807
According to our database1,
Qingfeng Cheng
authored at least 67 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Frontiers Comput. Sci., October, 2024
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain.
Frontiers Comput. Sci., June, 2024
STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles.
IEEE Trans. Veh. Technol., April, 2024
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping.
IEEE Trans. Dependable Secur. Comput., 2024
2023
An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing.
IEEE Syst. J., December, 2023
Des. Codes Cryptogr., November, 2023
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare.
Comput. Stand. Interfaces, August, 2023
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid.
Frontiers Comput. Sci., February, 2023
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
A Group Covert Communication Method of Digital Currency Based on Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Ind. Informatics, 2022
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022
A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network.
Mob. Networks Appl., 2022
A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT.
IEEE Internet Things J., 2022
An efficient and authenticated key establishment scheme based on fog computing for healthcare system.
Frontiers Comput. Sci., 2022
Frontiers Comput. Sci., 2022
An anonymous key agreement protocol with robust authentication for smart grid infrastructure.
Sci. China Inf. Sci., 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
Proceedings of the Progress in Cryptology, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
IEEE Syst. J., 2021
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
Secur. Commun. Networks, 2021
Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2021
A secure spectrum auction scheme without the trusted party based on the smart contract.
Digit. Commun. Networks, 2021
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment.
Sci. China Inf. Sci., 2021
Proceedings of the Provable and Practical Security, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Analysis and improvement of a key exchange and authentication protocol in client-server environment.
J. Ambient Intell. Humaniz. Comput., 2020
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.
Int. J. Netw. Secur., 2020
Concurr. Comput. Pract. Exp., 2020
2019
Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Int. J. Netw. Secur., 2019
User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019
IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019
2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018
Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018
2017
J. Medical Syst., 2017
Inf. Technol. Control., 2017
Int. J. Commun. Syst., 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.
Int. J. Commun. Syst., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round.
Int. J. Netw. Secur., 2015
Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks.
Int. J. Netw. Secur., 2015
2014
Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings.
Int. J. Netw. Secur., 2014
2013
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
IACR Cryptol. ePrint Arch., 2013
2012
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
EURASIP J. Wirel. Commun. Netw., 2011
Comput. Electr. Eng., 2011
Analysis and improvement of a new authenticated group key agreement in a mobile environment.
Ann. des Télécommunications, 2011
2010
A modified eCK model with stronger security for tripartite authenticated key exchange.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
CoRR, 2010
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings.
Proceedings of the Information Computing and Applications - First International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009