Jianfen Chu

According to our database1, Jianfen Chu authored at least 27 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers.
IEEE Trans. Parallel Distributed Syst., 2023

2021
Trend Analysis and Countermeasure Research of DDoS Attack Under 5G Network.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

2020
A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment.
Symmetry, 2020

A Sparse Bayesian Learning Method for Structural Equation Model-Based Gene Regulatory Network Inference.
IEEE Access, 2020

2019
An Unsupervised Approach for Keyphrase Extraction Using Within-Collection Resources.
IEEE Access, 2019

An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks.
IEEE Access, 2019

2018
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
Multim. Tools Appl., 2018

Updated SSDP Scheme for DDoS Attack Defense.
KSII Trans. Internet Inf. Syst., 2018

2017
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
KSII Trans. Internet Inf. Syst., 2017

2016
The efficiency improved scheme for secure access control of digital video distribution.
Multim. Tools Appl., 2016

2015
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
J. Commun., 2015

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage.
J. Commun., 2015

2014
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
Secur. Commun. Networks, 2013

An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering.
J. Networks, 2013

Intrusion Classifier based on Multiple Attribute Selection Algorithms.
J. Comput., 2013

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks.
J. Commun., 2013

A Survey on Green Computing Based on Cloud Environment.
Int. J. Online Eng., 2013

2012
An Improved Dynamic Password based Group Key Agreement against Dictionary Attack.
J. Softw., 2012

Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
J. Networks, 2012

A Survey on Data Migration Management in Cloud Environment.
J. Digit. Inf. Manag., 2012

Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme.
J. Comput., 2012

Analysis and Enhancement of Three Identity-based Signcryption Protocols.
J. Comput., 2012

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
KSII Trans. Internet Inf. Syst., 2012

2011
Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol.
J. Networks, 2011

Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
J. Networks, 2011

2010
Registration and Private Key Distribution Protocol Based on IBE.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010


  Loading...