Shoushan Luo
Orcid: 0000-0002-9900-1518
According to our database1,
Shoushan Luo
authored at least 40 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
2023
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network.
Entropy, 2023
DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023
2022
IEEE Trans. Cloud Comput., 2022
Chaotic analysis and entropy estimation of the entropy source based on semiconductor superlattice chaos.
Microelectron. J., 2022
2021
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control.
Wirel. Commun. Mob. Comput., 2021
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021
2020
Comput. Networks, 2020
2019
IEEE J. Biomed. Health Informatics, 2019
IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.
KSII Trans. Internet Inf. Syst., 2019
IEEE Access, 2019
IEEE Access, 2019
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019
IEEE Access, 2019
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography.
IEEE Access, 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks.
J. Sensors, 2018
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems.
IEEE Access, 2018
2017
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks.
IEEE Access, 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Proceedings of the Data Science, 2017
2016
2015
KSII Trans. Internet Inf. Syst., 2015
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Towards a multiobjective framework for evaluating network security under exploit attacks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2013
J. Comput., 2013
2012
Efficient entanglement channel construction schemes for a theoretical quantum network model with <i>d</i>-level system.
Quantum Inf. Process., 2012
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks.
Int. J. Comput. Intell. Syst., 2012
2011
Proceedings of the Information Computing and Applications, 2011
A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007