Shanyu Tang
Orcid: 0000-0002-2447-8135
According to our database1,
Shanyu Tang
authored at least 39 papers
between 2008 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication.
IEEE Trans. Ind. Electron., 2021
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography.
IEEE Trans. Dependable Secur. Comput., 2021
2018
Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement.
IEEE Trans. Ind. Electron., 2018
Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates.
Multim. Tools Appl., 2018
An efficient and secure VoIP communication system with chaotic mapping and message digest.
Multim. Syst., 2018
Secure and robust digital image watermarking scheme using logistic and RSA encryption.
Expert Syst. Appl., 2018
2017
Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol.
Wirel. Networks, 2017
Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.
IEEE J. Biomed. Health Informatics, 2017
Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking.
Multim. Tools Appl., 2017
Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions.
Eng. Appl. Artif. Intell., 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
2016
Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation.
ACM Trans. Multim. Comput. Commun. Appl., 2016
Secur. Commun. Networks, 2016
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP.
Peer-to-Peer Netw. Appl., 2016
An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks.
J. Netw. Comput. Appl., 2016
2015
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015
Proceedings of the Advances in Swarm and Computational Intelligence, 2015
2014
Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards.
Secur. Commun. Networks, 2014
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card.
Int. J. Commun. Syst., 2014
Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications.
IET Commun., 2014
Audio steganography with AES for real-time covert voice over internet protocol communications.
Sci. China Inf. Sci., 2014
2013
Comput. Informatics, 2013
ECC-Based Authenticated Key Agreement Protocol with Privacy Protection for VoIP Communications.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Network service registration based on role-goal-process-service meta-model in a P2P network.
IET Commun., 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
IET Inf. Secur., 2011
Proceedings of the Engineering Applications of Neural Networks, 2011
2009
KSII Trans. Internet Inf. Syst., 2009
2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008