Chunhua Jin

According to our database1, Chunhua Jin
  • authored at least 25 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wireless Personal Communications, 2017

Certificateless online/offline signcryption for the Internet of Things.
Wireless Networks, 2017

Efficient and Short Identity-Based Deniable Authenticated Encryption.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Practical Signcryption for Secure Communication of Wireless Sensor Networks.
Wireless Personal Communications, 2016

Identity-based deniable authenticated encryption and its application to e-mail system.
Telecommunication Systems, 2016

Secure and efficient data transmission in the Internet of Things.
Telecommunication Systems, 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Systems, 2016

Enabling identity-based cloud storage public auditing with quantum computers resistance.
IJESDF, 2016

Practical access control for sensor networks in the context of the Internet of Things.
Computer Communications, 2016

2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Systems, 2015

A post-quantum communication secure identity-based proxy-signcryption scheme.
IJESDF, 2015

An efficient certificateless deniable authentication protocol without pairings.
IJESDF, 2015

Weak form quadrature element method for accurate free vibration analysis of thin skew plates.
Computers & Mathematics with Applications, 2015

ID-Based Deniable Threshold Ring Authentication.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Generation Comp. Syst., 2014

Identity-based deniable authentication for ad hoc networks.
Computing, 2014

Efficient forward secure identity-based shorter signature from lattice.
Computers & Electrical Engineering, 2014

Novel weak form quadrature element method with expanded Chebyshev nodes.
Appl. Math. Lett., 2014

Non-oscillatory solutions for a nonlinear neutral delay differential equation.
Applied Mathematics and Computation, 2014

2013
A novel certificateless deniable authentication protocol.
IACR Cryptology ePrint Archive, 2013

2011
The pricing model construction of reverse supply chain based on game theory.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A quenching phenomenon for one-dimensional p-Laplacian with singular boundary flux.
Appl. Math. Lett., 2010

2009
Estimating Nitrogen Status of Plant by Vis/NIR Spectroscopy and Mathematical Model.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Study on an Advanced Treatment of Domestic Wastewater by Bio-filtration and Water-Quality Measurement System.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2007
Existence of positive periodic solutions for the p-Laplacian system.
Appl. Math. Lett., 2007


  Loading...