Hui Li

According to our database1, Hui Li
  • authored at least 227 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Lightweight RFID Protocol for Medical Privacy Protection in IoT.
IEEE Trans. Industrial Informatics, 2018

HAC: Hybrid Access Control for Online Social Networks.
Security and Communication Networks, 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Security and Communication Networks, 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Networking and Applications, 2018

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Networking and Applications, 2018

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer-to-Peer Networking and Applications, 2018

Secure and private key management scheme in big data networking.
Peer-to-Peer Networking and Applications, 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Network and Computer Applications, 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Generation Comp. Syst., 2018

Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Generation Comp. Syst., 2018

2017
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intelligent Transportation Systems, 2017

Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomedical and Health Informatics, 2017

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Sensors, 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Security and Communication Networks, 2017

Towards privacy protection and malicious behavior traceability in smart health.
Personal and Ubiquitous Computing, 2017

An ultra-lightweight RFID authentication scheme for mobile commerce.
Peer-to-Peer Networking and Applications, 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services.
IEEE Internet of Things Journal, 2017

An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy.
IEEE Internet of Things Journal, 2017

A two-party privacy preserving set intersection protocol against malicious users in cloud computing.
Computer Standards & Interfaces, 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Computers & Security, 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
SCIENCE CHINA Information Sciences, 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
SCIENCE CHINA Information Sciences, 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017

A new method to construct golay complementary set and near-complementary set by paraunitary matrices.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Privacy Preservation Strategy in Time-Sensitive LBSs.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Cloud-Based Lightweight RFID Mutual Authentication Protocol.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

U2F based secure mutual authentication protocol for mobile payment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Secure machine-type communications in LTE networks.
Wireless Communications and Mobile Computing, 2016

An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Vehicular Technology, 2016

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2016

Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.
Sensors, 2016

EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Security and Communication Networks, 2016

Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Security and Communication Networks, 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Security and Communication Networks, 2016

Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Security and Communication Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive and Mobile Computing, 2016

An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
IJTHI, 2016

PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
IJES, 2016

A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems.
IEICE Transactions, 2016

A Secure RFID Application Revocation Scheme for IoT.
IEICE Transactions, 2016

Packet Header Anomaly Detection Using Bayesian Topic Models.
IACR Cryptology ePrint Archive, 2016

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Computer Networks, 2016

Time obfuscation-based privacy-preserving scheme for location-based services.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Privacy protection based access control scheme in cloud-based services.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Services Computing, 2015

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
IEEE Trans. Services Computing, 2015

Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs.
IEEE Trans. Dependable Sec. Comput., 2015

Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015

GBAAM: group-based access authentication for MTC in LTE networks.
Security and Communication Networks, 2015

PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Security and Communication Networks, 2015

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mobile Information Systems, 2015

A reputation-based secure scheme in vehicular ad hoc networks.
IJGUC, 2015

PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid.
IJDSN, 2015

Adaptive Sensing Private Property Protection Protocol Based on Cloud.
IJDSN, 2015

Key management for Smart Grid based on asymmetric key-wrapping.
Int. J. Comput. Math., 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Generation Comp. Syst., 2015

A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerging Telecommunications Technologies, 2015

Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Communications Magazine, 2015

Information Diffusion Model Based on Privacy Setting in Online Social Networking Services.
Comput. J., 2015

ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

RFID Secure Application Revocation for IoT in 5G.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Circular Range Search on Encrypted Spatial Data.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Ciphertext Retrieval in Super-Peer P2P Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Circular range search on encrypted spatial data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wireless Personal Communications, 2014

Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2014

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distrib. Syst., 2014

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs.
IEEE Trans. Information Forensics and Security, 2014

Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud.
IEEE Trans. Cloud Computing, 2014

Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart CR, 2014

Achieving dynamic privileges in secure data sharing on cloud storage.
Security and Communication Networks, 2014

Preserving identity privacy on multi-owner cloud data during public verification.
Security and Communication Networks, 2014

Loss-tolerant authentication with digital signatures.
Security and Communication Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
Journal of Communications and Networks, 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
TIIS, 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet of Things Journal, 2014

Group-based authentication and key agreement for machine-type communication.
IJGUC, 2014

Signalling scheme for achieving dynamic degrees of freedom in MIMO Y channel.
IJGUC, 2014

More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
IJGUC, 2014

Authenticated asymmetric group key agreement based on certificateless cryptosystem.
Int. J. Comput. Math., 2014

Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding".
IEEE Communications Letters, 2014

Error- and loss-tolerant bundle fragment authentication for space DTNs.
Frontiers Comput. Sci., 2014

Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014

Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurrency and Computation: Practice and Experience, 2014

RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurrency and Computation: Practice and Experience, 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Communications Surveys and Tutorials, 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Computer Networks, 2014

A Power Efficient and Compact Optical Interconnect for Network-on-Chip.
Computer Architecture Letters, 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014

MPPM: Malware propagation and prevention model in online SNS.
Proceedings of the IEEE International Conference on Communications, 2014

Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014

Privacy-area aware dummy generation algorithms for Location-Based Services.
Proceedings of the IEEE International Conference on Communications, 2014

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Security and Communication Networks, 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Network and Computer Applications, 2013

Key distribution for heterogeneous public-key cryptosystems.
Journal of Communications and Networks, 2013

Activity clustering for anomaly detection.
IJIIDS, 2013

Privacy-preserving logistic regression outsourcing in cloud computing.
IJGUC, 2013

Interference management strategy for multiuser two-way relay networks.
IJES, 2013

Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
IET Information Security, 2013

The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation.
IEICE Transactions, 2013

Cyclic code from the first class Whiteman's generalized cyclotomic sequence with order 4
CoRR, 2013

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Computer Networks, 2013

PPAS: privacy protection authentication scheme for VANET.
Cluster Computing, 2013

End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture.
Cluster Computing, 2013

Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013

A hybrid packet-circuit switched router for optical network on chip.
Computers & Electrical Engineering, 2013

The cross-correlation distribution of a p-ary m-sequence of period p2k-1 and its decimated sequence by ( (pk+1)2 / 2(pe+1) ).
Adv. in Math. of Comm., 2013

An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Public auditing for shared data with efficient user revocation in the cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Adaptive Feedback Load Balancing Algorithm in HDFS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

CSP-Based General Detection Model of Network Covert Storage Channels.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wireless Communications, 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Security and Communication Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Security and Communication Networks, 2012

Group key agreement for secure group communication in dynamic peer systems.
J. Parallel Distrib. Comput., 2012

Group Key Agreement From Signcryption.
TIIS, 2012

Security Issues on Machine to Machine Communications.
TIIS, 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
IJRFITA, 2012

A method for efficient parallel computation of Tate pairing.
IJGUC, 2012

Fairness electronic payment protocol.
IJGUC, 2012

A new proxy blind signature scheme.
IJGUC, 2012

An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerging Telecommunications Technologies, 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Computer Networks, 2012

Codes Based Tracing and Revoking Scheme with Constant Ciphertext.
Proceedings of the Provable Security - 6th International Conference, 2012

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Smart-blocking file storage method in cloud computing.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Gmatch: Secure and privacy-preserving group matching in social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2012

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Robustness of Weighting Receive Antenna Selection Algorithm.
Wireless Personal Communications, 2011

Identity-based key distribution for mobile Ad Hoc networks.
Frontiers Comput. Sci. China, 2011

Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China, 2011

The cross-correlation distribution of a p-ary m-sequence of period p2m-1 and its decimation by (pm+1)2 / 2(pe+1).
CoRR, 2011

On the Cross-Correlation of a Ternary m-sequence of Period 34k-1 and Its Decimated Sequence by (32k+1)2 / 20.
CoRR, 2011

$p$-ary sequences with six-valued cross-correlation function: a new decimation of Niho type
CoRR, 2011

On the cross-correlation of a ternary m-sequence of period 34k - 1 and its decimated sequence by (32k+1)2/20.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011

Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Abuse-freeness Electronic Payment Protocol.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Forward Secure Proxy Blind Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wireless Communications, 2010

Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010

ID-based authenticated group key agreement from bilinear maps.
Frontiers Comput. Sci. China, 2010

Performance analysis of optimal antenna scheme in transmit diversity systems.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Behavior Clustering for Anomaly Detection.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

A Stream Pattern Matching Method for Traffic Analysis.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

DASR: Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
Secure Error-Correction Network Coding in a Randomized Setting.
Proceedings of the Advances in Information Security and Assurance, 2009

An Efficient Fast Authentication Protocol.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A New Abuse-Free Fair Electronic Payment Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Analysis of the Kerberos Protocol Using BAN Logic.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves.
IACR Cryptology ePrint Archive, 2008

Polynomials for Ate Pairing and Atei Pairing.
IACR Cryptology ePrint Archive, 2008

Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR, 2008

The Design of Optimal Period Interleaver.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Mobile ip registration in certificateless public key infrastructure.
IET Information Security, 2007


  Loading...