Xiong Li

Orcid: 0000-0001-6619-554X

Affiliations:
  • University of Electronic Science and Technology of China, Chengdu, China
  • Hunan University of Science and Technology, Xiangtan, China (former)
  • Beijing University of Posts and Telecommunications, Department of Computer Science and Technology, China (PhD 2012)


According to our database1, Xiong Li authored at least 232 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
REC-Fed: A Robust and Efficient Clustered Federated System for Dynamic Edge Networks.
IEEE Trans. Mob. Comput., December, 2024

Blockchain-Based Data Deduplication and Distributed Audit for Shared Data in Cloud-Fog Computing-Based VANETs.
IEEE Trans. Netw. Serv. Manag., October, 2024

Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment.
IEEE Trans. Intell. Transp. Syst., September, 2024

A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., September, 2024

HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems.
IEEE Trans. Green Commun. Netw., September, 2024

VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server.
Telecommun. Syst., August, 2024

An Unsupervised Image Dehazing Method Using Patch-Line and Fuzzy Clustering-Line Priors.
IEEE Trans. Fuzzy Syst., June, 2024

Pushing the Limits of Acoustic Spatial Perception via Incident Angle Encoding.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024

Versatile Remote Data Checking Scheme for Cloud-Assisted Internet of Things.
IEEE Internet Things J., April, 2024

A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT.
IEEE Trans. Ind. Informatics, March, 2024

Secure Aggregation in Heterogeneous Federated Learning for Digital Ecosystems.
IEEE Trans. Consumer Electron., February, 2024

Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET.
IEEE Trans. Consumer Electron., February, 2024

Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication.
IEEE Trans. Consumer Electron., February, 2024

Data Verifiable Personalized Access Control Electronic Healthcare Record Sharing Based on Blockchain in IoT Environment.
IEEE Internet Things J., February, 2024

RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things.
J. Netw. Comput. Appl., January, 2024

An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring.
J. Ambient Intell. Humaniz. Comput., January, 2024

DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
Veh. Commun., 2024

Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving.
IEEE Trans. Sustain. Comput., 2024

HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism.
IEEE Trans. Netw. Sci. Eng., 2024

MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024

Monero With Multi-Grained Redaction.
IEEE Trans. Dependable Secur. Comput., 2024

CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning.
J. Netw. Comput. Appl., 2024

Two-Phase Sparsification With Secure Aggregation for Privacy-Aware Federated Learning.
IEEE Internet Things J., 2024

A lightweight network for abdominal multi-organ segmentation based on multi-scale context fusion and dual self-attention.
Inf. Fusion, 2024

Improved gradient leakage attack against compressed gradients in federated learning.
Neurocomputing, 2024

Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024

Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024

Towards Efficient Delegated Private Set Intersection Cardinality Protocol.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification.
IEEE Trans. Netw. Serv. Manag., December, 2023

Talking face generation driven by time-frequency domain features of speech audio.
Displays, December, 2023

Edge intelligent collaborative privacy protection solution for smart medical.
Cyber Secur. Appl., December, 2023

An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network.
IEEE Trans. Intell. Transp. Syst., September, 2023

An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity.
J. Syst. Archit., September, 2023

GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023

Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing.
Future Gener. Comput. Syst., July, 2023

Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing.
ACM Trans. Sens. Networks, May, 2023

Cloud-assisted authentication scheme supporting dynamic pseudo-identity for autonomous vehicles.
Trans. Emerg. Telecommun. Technol., May, 2023

TD-Net: A Hybrid End-to-End Network for Automatic Liver Tumor Segmentation From CT Images.
IEEE J. Biomed. Health Informatics, March, 2023

An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023

Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism.
IEEE Trans. Sustain. Comput., 2023

AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network.
IEEE Internet Things J., 2023

Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of Things.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Research on Software Defect Prediction Method Based on Model Reuse.
Proceedings of the 3rd International Conference on Electronic Information Technology and Smart Agriculture, 2023

SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023

Low-overhead Privacy-preserving Location-based Skyline Query.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs.
ACM Trans. Internet Techn., November, 2022

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning.
ACM Trans. Internet Techn., 2022

Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption.
IEEE Trans. Netw. Serv. Manag., 2022

Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs.
IEEE Trans. Netw. Sci. Eng., 2022

Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022

Imitation Learning Based Heavy-Hitter Scheduling Scheme in Software-Defined Industrial Networks.
IEEE Trans. Ind. Informatics, 2022

A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
IEEE Trans. Ind. Informatics, 2022

Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System.
IEEE Trans. Green Commun. Netw., 2022

A mutual authentication scheme in VANET providing vehicular anonymity and tracking.
Telecommun. Syst., 2022

Service Chain Caching and Workload Scheduling in Mobile Edge Computing.
IEEE Syst. J., 2022

Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application.
IEEE Syst. J., 2022

A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.
Sensors, 2022

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022

An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs.
J. Syst. Archit., 2022

A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT.
IEEE Internet Things J., 2022

A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT.
IEEE Internet Things J., 2022

A PUF-based lightweight authentication and key agreement protocol for smart UAV networks.
IET Commun., 2022

Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things.
Trans. Emerg. Telecommun. Technol., 2022

Speech driven facial animation generation based on GAN.
Displays, 2022

An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system.
Digit. Commun. Networks, 2022

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing.
Comput. Networks, 2022

Privacy-preserving task allocation for edge computing-based mobile crowdsensing.
Comput. Electr. Eng., 2022

Multi-dimensional Data Quick Query for Blockchain-Based Federated Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

An Investigation of Blockchain-Based Sharding.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

TSHN: A Trajectory Similarity Hybrid Networks for Dummy Trajectory Identification.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle.
Proceedings of the IEEE International Conference on Communications, 2022

Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Stochastic Gradient Descent Algorithm Based on Adaptive Differential Privacy.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks.
IEEE Trans. Netw. Sci. Eng., 2021

A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control.
IEEE Trans. Intell. Transp. Syst., 2021

Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems.
IEEE Trans. Ind. Informatics, 2021

A new authentication and key agreement protocol for 5G wireless networks.
Telecommun. Syst., 2021

On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage.
IEEE Trans. Big Data, 2021

A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion.
IEEE Syst. J., 2021

Cloud-based privacy- and integrity-protecting density peaks clustering.
Future Gener. Comput. Syst., 2021

A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks.
Comput. Stand. Interfaces, 2021

An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network.
Comput. Commun., 2021

A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.
Comput. Electr. Eng., 2021

Joint mobile vehicle-UAV scheme for secure data collection in a smart city.
Ann. des Télécommunications, 2021

2020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020

Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data".
IEEE Trans. Inf. Forensics Secur., 2020

Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing.
Sustain. Comput. Informatics Syst., 2020

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Syst. J., 2020

A Lightweight Privacy-Preserving Authentication Protocol for VANETs.
IEEE Syst. J., 2020

Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services.
J. Medical Syst., 2020

Energy-aware MAC protocol for data differentiated services in sensor-cloud computing.
J. Cloud Comput., 2020

Special issue on "Brain computing for healthcare and wellness applications".
J. Ambient Intell. Humaniz. Comput., 2020

Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.
Int. J. Netw. Secur., 2020

Revised anonymous authentication protocol for adaptive client-server infrastructure.
Int. J. Commun. Syst., 2020

Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis.
Hum. centric Comput. Inf. Sci., 2020

Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020

MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost.
Future Gener. Comput. Syst., 2020

A privacy-preserving scheme with identity traceable property for smart grid.
Comput. Commun., 2020

An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion.
Ann. des Télécommunications, 2020

2019
Secure CLS and CL-AS schemes designed for VANETs.
J. Supercomput., 2019

Optimality criteria for fuzzy-valued fractional multi-objective optimization problem.
Soft Comput., 2019

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019

An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019

Pattern Recognition Techniques for Non Verbal Human Behavior (NVHB).
Pattern Recognit. Lett., 2019

Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users.
Mob. Networks Appl., 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019

A provably secure and anonymous message authentication scheme for smart grids.
J. Parallel Distributed Comput., 2019

Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare.
J. Medical Syst., 2019

Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications.
IEEE Internet Things J., 2019

Lightweight IoT-based authentication scheme in cloud computing circumstance.
Future Gener. Comput. Syst., 2019

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019

Pixel-wise depth based intelligent station for inferring fine-grained PM<sub>2.5</sub>.
Future Gener. Comput. Syst., 2019

Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT.
EURASIP J. Wirel. Commun. Netw., 2019

To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs.
IEEE Access, 2019

Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns.
IEEE Access, 2019

Broadcast Based Code Dissemination Scheme for Duty Cycle Based Wireless Sensor Networks.
IEEE Access, 2019

A Collaboration Platform for Effective Task and Data Reporter Selection in Crowdsourcing Network.
IEEE Access, 2019

Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things.
IEEE Access, 2019

Battery-Friendly Relay Selection Scheme for Prolonging the Lifetimes of Sensor Nodes in the Internet of Things.
IEEE Access, 2019

A Queuing Delay Utilization Scheme for On-Path Service Aggregation in Services-Oriented Computing Networks.
IEEE Access, 2019

Deployment Optimization of Data Centers in Vehicular Networks.
IEEE Access, 2019

Adaptive Neural-Network-Based Control for a Class of Nonlinear Systems With Unknown Output Disturbance and Time Delays.
IEEE Access, 2019

2018
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers.
Wirel. Commun. Mob. Comput., 2018

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommun. Syst., 2018

A certificateless aggregate signature scheme for healthcare wireless sensor network.
Sustain. Comput. Informatics Syst., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Secur. Commun. Networks, 2018

Systematic Comparison of Power Line Classification Methods from ALS and MLS Point Cloud Data.
Remote. Sens., 2018

An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018

New cubic reference table based image steganography.
Multim. Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018

Using convolution control block for Chinese sentiment analysis.
J. Parallel Distributed Comput., 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018

Design and implementation of a multibiometric system based on hand's traits.
Expert Syst. Appl., 2018

Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation.
Comput. Commun., 2018

Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices.
IEEE Consumer Electron. Mag., 2018

A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion.
Comput. Electr. Eng., 2018

Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm.
Comput. Electr. Eng., 2018

Verifiable keyword search over encrypted cloud data in smart city.
Comput. Electr. Eng., 2018

Medical JPEG image steganography based on preserving inter-block dependencies.
Comput. Electr. Eng., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

A Multi-Features Fusion Method Based on Convolutional Neural Network for Vehicle Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Study on IP Protection Techniques for Integrated Circuit in IOT Environment.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

Secure Data Access and Sharing Scheme for Cloud Storage.
Wirel. Pers. Commun., 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017

A new and secure authentication scheme for wireless sensor networks with formal proof.
Peer-to-Peer Netw. Appl., 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2017

A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
Multim. Syst., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

Wireless and Mobile Networks: Security and Privacy Issues.
J. Electr. Comput. Eng., 2017

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
J. Ambient Intell. Humaniz. Comput., 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm.
Int. J. Netw. Secur., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

Medical image classification based on multi-scale non-negative sparse coding.
Artif. Intell. Medicine, 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016

Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016

Android platform-based individual privacy information protection system.
Pers. Ubiquitous Comput., 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

A more secure digital rights management authentication scheme based on smart card.
Multim. Tools Appl., 2016

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016

An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016

A User Anonymous Mutual Authentication Protocol.
KSII Trans. Internet Inf. Syst., 2016

Design of a user anonymous password authentication scheme without smart card.
Int. J. Commun. Syst., 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2015

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015

A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
Secur. Commun. Networks, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks.
Comput. Electr. Eng., 2015

2014
A novel user authentication scheme with anonymity for wireless communications.
Secur. Commun. Networks, 2014

Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Secur. Commun. Networks, 2014

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Secur. Commun. Networks, 2014

A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC.
KSII Trans. Internet Inf. Syst., 2014

Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings.
Int. J. Distributed Sens. Networks, 2014

Robust dynamic ID-based remote user authentication scheme using smart cards.
Int. J. Ad Hoc Ubiquitous Comput., 2014

An improved remote user authentication scheme with key agreement.
Comput. Electr. Eng., 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A secure remote user mutual authentication scheme using smart cards.
Proceedings of the IEEE Computers, 2014

2013
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.
Math. Comput. Model., 2013

Improvement of trace-driven I-Cache timing attack on the RSA algorithm.
J. Syst. Softw., 2013

An enhanced smart card based remote user password authentication scheme.
J. Netw. Comput. Appl., 2013

Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards.
J. Netw. Comput. Appl., 2012

Multiple ant colony algorithm method for selecting tag SNPs.
J. Biomed. Informatics, 2012

2011
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards.
J. Netw. Comput. Appl., 2011


  Loading...