Xiong Li
Orcid: 0000-0001-6619-554XAffiliations:
- University of Electronic Science and Technology of China, Chengdu, China
- Hunan University of Science and Technology, Xiangtan, China (former)
- Beijing University of Posts and Telecommunications, Department of Computer Science and Technology, China (PhD 2012)
According to our database1,
Xiong Li
authored at least 231 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orkg.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Blockchain-Based Data Deduplication and Distributed Audit for Shared Data in Cloud-Fog Computing-Based VANETs.
IEEE Trans. Netw. Serv. Manag., October, 2024
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment.
IEEE Trans. Intell. Transp. Syst., September, 2024
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., September, 2024
HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems.
IEEE Trans. Green Commun. Netw., September, 2024
VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server.
Telecommun. Syst., August, 2024
An Unsupervised Image Dehazing Method Using Patch-Line and Fuzzy Clustering-Line Priors.
IEEE Trans. Fuzzy Syst., June, 2024
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024
IEEE Internet Things J., April, 2024
IEEE Trans. Ind. Informatics, March, 2024
IEEE Trans. Consumer Electron., February, 2024
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET.
IEEE Trans. Consumer Electron., February, 2024
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication.
IEEE Trans. Consumer Electron., February, 2024
Data Verifiable Personalized Access Control Electronic Healthcare Record Sharing Based on Blockchain in IoT Environment.
IEEE Internet Things J., February, 2024
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things.
J. Netw. Comput. Appl., January, 2024
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring.
J. Ambient Intell. Humaniz. Comput., January, 2024
DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
Veh. Commun., 2024
Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving.
IEEE Trans. Sustain. Comput., 2024
HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism.
IEEE Trans. Netw. Sci. Eng., 2024
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning.
J. Netw. Comput. Appl., 2024
Two-Phase Sparsification With Secure Aggregation for Privacy-Aware Federated Learning.
IEEE Internet Things J., 2024
A lightweight network for abdominal multi-organ segmentation based on multi-scale context fusion and dual self-attention.
Inf. Fusion, 2024
Neurocomputing, 2024
Appl. Intell., 2024
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification.
IEEE Trans. Netw. Serv. Manag., December, 2023
Displays, December, 2023
Cyber Secur. Appl., December, 2023
An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network.
IEEE Trans. Intell. Transp. Syst., September, 2023
An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity.
J. Syst. Archit., September, 2023
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023
Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing.
Future Gener. Comput. Syst., July, 2023
ACM Trans. Sens. Networks, May, 2023
Cloud-assisted authentication scheme supporting dynamic pseudo-identity for autonomous vehicles.
Trans. Emerg. Telecommun. Technol., May, 2023
TD-Net: A Hybrid End-to-End Network for Automatic Liver Tumor Segmentation From CT Images.
IEEE J. Biomed. Health Informatics, March, 2023
An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023
Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism.
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Internet Things J., 2023
Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of Things.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 3rd International Conference on Electronic Information Technology and Smart Agriculture, 2023
SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs.
ACM Trans. Internet Techn., November, 2022
ACM Trans. Internet Techn., 2022
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption.
IEEE Trans. Netw. Serv. Manag., 2022
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs.
IEEE Trans. Netw. Sci. Eng., 2022
Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022
Imitation Learning Based Heavy-Hitter Scheduling Scheme in Software-Defined Industrial Networks.
IEEE Trans. Ind. Informatics, 2022
A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
IEEE Trans. Ind. Informatics, 2022
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System.
IEEE Trans. Green Commun. Netw., 2022
Telecommun. Syst., 2022
IEEE Syst. J., 2022
Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application.
IEEE Syst. J., 2022
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.
Sensors, 2022
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs.
J. Syst. Archit., 2022
A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT.
IEEE Internet Things J., 2022
A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT.
IEEE Internet Things J., 2022
A PUF-based lightweight authentication and key agreement protocol for smart UAV networks.
IET Commun., 2022
Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things.
Trans. Emerg. Telecommun. Technol., 2022
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system.
Digit. Commun. Networks, 2022
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing.
Comput. Networks, 2022
Comput. Electr. Eng., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control.
IEEE Trans. Intell. Transp. Syst., 2021
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems.
IEEE Trans. Ind. Informatics, 2021
Telecommun. Syst., 2021
On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage.
IEEE Trans. Big Data, 2021
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion.
IEEE Syst. J., 2021
Future Gener. Comput. Syst., 2021
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks.
Comput. Stand. Interfaces, 2021
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network.
Comput. Commun., 2021
A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.
Comput. Electr. Eng., 2021
Ann. des Télécommunications, 2021
2020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data".
IEEE Trans. Inf. Forensics Secur., 2020
Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing.
Sustain. Comput. Informatics Syst., 2020
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services.
J. Medical Syst., 2020
Energy-aware MAC protocol for data differentiated services in sensor-cloud computing.
J. Cloud Comput., 2020
J. Ambient Intell. Humaniz. Comput., 2020
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.
Int. J. Netw. Secur., 2020
Int. J. Commun. Syst., 2020
Hum. centric Comput. Inf. Sci., 2020
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Comput. Commun., 2020
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion.
Ann. des Télécommunications, 2020
2019
Optimality criteria for fuzzy-valued fractional multi-objective optimization problem.
Soft Comput., 2019
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019
Pattern Recognit. Lett., 2019
Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users.
Mob. Networks Appl., 2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019
J. Parallel Distributed Comput., 2019
J. Medical Syst., 2019
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019
Pixel-wise depth based intelligent station for inferring fine-grained PM<sub>2.5</sub>.
Future Gener. Comput. Syst., 2019
Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT.
EURASIP J. Wirel. Commun. Netw., 2019
To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs.
IEEE Access, 2019
Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns.
IEEE Access, 2019
Broadcast Based Code Dissemination Scheme for Duty Cycle Based Wireless Sensor Networks.
IEEE Access, 2019
A Collaboration Platform for Effective Task and Data Reporter Selection in Crowdsourcing Network.
IEEE Access, 2019
Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things.
IEEE Access, 2019
Battery-Friendly Relay Selection Scheme for Prolonging the Lifetimes of Sensor Nodes in the Internet of Things.
IEEE Access, 2019
A Queuing Delay Utilization Scheme for On-Path Service Aggregation in Services-Oriented Computing Networks.
IEEE Access, 2019
Adaptive Neural-Network-Based Control for a Class of Nonlinear Systems With Unknown Output Disturbance and Time Delays.
IEEE Access, 2019
2018
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers.
Wirel. Commun. Mob. Comput., 2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommun. Syst., 2018
Sustain. Comput. Informatics Syst., 2018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018
Secur. Commun. Networks, 2018
Systematic Comparison of Power Line Classification Methods from ALS and MLS Point Cloud Data.
Remote. Sens., 2018
An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018
A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018
J. Parallel Distributed Comput., 2018
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018
A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018
Expert Syst. Appl., 2018
Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation.
Comput. Commun., 2018
Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices.
IEEE Consumer Electron. Mag., 2018
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion.
Comput. Electr. Eng., 2018
Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm.
Comput. Electr. Eng., 2018
Comput. Electr. Eng., 2018
Comput. Electr. Eng., 2018
Comput. Electr. Eng., 2018
A Multi-Features Fusion Method Based on Convolutional Neural Network for Vehicle Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018
2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017
A new and secure authentication scheme for wireless sensor networks with formal proof.
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
Multim. Tools Appl., 2017
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
Multim. Syst., 2017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017
J. Electr. Comput. Eng., 2017
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
J. Ambient Intell. Humaniz. Comput., 2017
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017
Int. J. Netw. Secur., 2017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017
Artif. Intell. Medicine, 2017
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017
IEEE Access, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016
Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016
Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks, 2016
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016
Pers. Ubiquitous Comput., 2016
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Commun. Syst., 2016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Wirel. Pers. Commun., 2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
Secur. Commun. Networks, 2015
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks.
Comput. Electr. Eng., 2015
2014
Secur. Commun. Networks, 2014
Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Secur. Commun. Networks, 2014
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Secur. Commun. Networks, 2014
A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC.
KSII Trans. Internet Inf. Syst., 2014
Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings.
Int. J. Distributed Sens. Networks, 2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
Comput. Electr. Eng., 2014
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the IEEE Computers, 2014
2013
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.
Math. Comput. Model., 2013
J. Syst. Softw., 2013
J. Netw. Comput. Appl., 2013
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards.
J. Netw. Comput. Appl., 2012
J. Biomed. Informatics, 2012
2011
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards.
J. Netw. Comput. Appl., 2011