Jian Shen

According to our database1, Jian Shen authored at least 83 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Key-policy attribute-based encryption against continual auxiliary input leakage.
Inf. Sci., 2019

2018
A Novel Latin-Square-Based Secret Sharing for M2M Communications.
IEEE Trans. Industrial Informatics, 2018

Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Systems Journal, 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Security and Communication Networks, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Security and Communication Networks, 2018

Cloud Based Data Protection in Anonymously Controlled SDN.
Security and Communication Networks, 2018

Implicit authentication protocol and self-healing key management for WBANs.
Multimedia Tools Appl., 2018

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.
J. Network and Computer Applications, 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intelligence and Humanized Computing, 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet of Things Journal, 2018

Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
IJSNet, 2018

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

A lightweight multi-layer authentication protocol for wireless body area networks.
Future Generation Comp. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Generation Comp. Syst., 2018

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain.
IEEE Access, 2018

A Short Linearly Homomorphic Proxy Signature Scheme.
IEEE Access, 2018

2017
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network.
Wireless Personal Communications, 2017

Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wireless Personal Communications, 2017

Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wireless Personal Communications, 2017

Secure Data Access and Sharing Scheme for Cloud Storage.
Wireless Personal Communications, 2017

Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Information Forensics and Security, 2017

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Information Forensics and Security, 2017

Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Personal and Ubiquitous Computing, 2017

A secure cloud-assisted urban data sharing framework for ubiquitous-cities.
Pervasive and Mobile Computing, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Network and Computer Applications, 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
TIIS, 2017

An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.
TIIS, 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
IJSNet, 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. Journal of Network Management, 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Generation Comp. Syst., 2017

Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Computer Communications, 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Computers & Electrical Engineering, 2017

Medical image classification based on multi-scale non-negative sparse coding.
Artificial Intelligence in Medicine, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

A Novel Clustering Solution for Wireless Sensor Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Fibonacci Based Batch Auditing Protocol for Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
The Journal of Supercomputing, 2016

Security analysis of a user registration approach.
The Journal of Supercomputing, 2016

An adaptive approach to better load balancing in a consumer-centric cloud environment.
IEEE Trans. Consumer Electronics, 2016

Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment.
Sensors, 2016

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Security and Communication Networks, 2016

A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.
Security and Communication Networks, 2016

Efficient data integrity auditing for storage security in mobile health cloud.
Peer-to-Peer Networking and Applications, 2016

An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intelligence and Humanized Computing, 2016

Insecurity of a Certificateless Aggregate Signature Scheme.
IEICE Transactions, 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Generation Comp. Syst., 2016

Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Certificateless Authentication Protocol for Wireless Body Area Network.
Proceedings of the Genetic and Evolutionary Computing, 2016

A load-balancing approach based on modified K-ELM and NSGA-II in a heterogeneous cloud environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Enhanced secure sensor association and key management in wireless body area networks.
Journal of Communications and Networks, 2015

Multiple mobile sink-based routing algorithm for data dissemination in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

Outsourced data tagging via authority and delegable auditing for cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

An Optimized Strategy for Speculative Execution in a Heterogeneous Environment.
Proceedings of the 9th International Conference on Future Generation Communication and Networking, 2015

A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Performance Comparison of Typical Routing Protocols in Ad-hoc Networks.
Proceedings of the Intelligent Systems and Applications, 2014

An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection.
Proceedings of the Intelligent Systems and Applications, 2014

A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers.
Proceedings of the Intelligent Systems and Applications, 2014

A Comparative Survey on RFID Grouping Authentication Protocols.
Proceedings of the Intelligent Systems and Applications, 2014

Phased Array and Image Enhancement Method Based Structural Health Monitoring.
Proceedings of the Intelligent Systems and Applications, 2014

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Improved Stable Election Based Routing Protocol with Mobile Sink for Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Mobile-Sink Routing Algorithm Based on Energy and Distance for Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

A Novel Verifiably Encrypted Signature from Weil Pairing.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

A Comparative Study on Routing Protocols in Underwater Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Location-Aware Routing Protocol for Underwater Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Efficient Key Management Scheme for SCADA System.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013


  Loading...