Jianfeng Ma

According to our database1, Jianfeng Ma authored at least 406 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
SRDPV: secure route discovery and privacy-preserving verification in MANETs.
Wireless Networks, 2019

Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing.
Security and Communication Networks, 2019

Inference attack in Android Activity based on program fingerprint.
J. Network and Computer Applications, 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Communication Systems, 2019

Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model.
IET Information Security, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms.
IEEE Access, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wireless Communications and Mobile Computing, 2018

Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wireless Commun., 2018

Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks.
IEEE Trans. Vehicular Technology, 2018

Dlog: diagnosing router events with syslogs for anomaly detection.
The Journal of Supercomputing, 2018

Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Information Forensics and Security, 2018

Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018

EOABS: expressive outsourced attribute-based signature.
Peer-to-Peer Networking and Applications, 2018

DOAS: Efficient data owner authorized search over encrypted cloud data.
Peer-to-Peer Networking and Applications, 2018

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Networking and Applications, 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Networking and Applications, 2018

Trust-based service composition and selection in service oriented architecture.
Peer-to-Peer Networking and Applications, 2018

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Network, 2018

A remotely keyed file encryption scheme under mobile cloud computing.
J. Network and Computer Applications, 2018

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.
J. Medical Systems, 2018

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
J. Inf. Sci. Eng., 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intelligence and Humanized Computing, 2018

Hidden community identification in location-based social network via probabilistic venue sequences.
Inf. Sci., 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet of Things Journal, 2018

PRE+: dual of proxy re-encryption for secure cloud data sharing service.
IJWGS, 2018

VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner.
IJHPCN, 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Generation Comp. Syst., 2018

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing.
Future Generation Comp. Syst., 2018

Evaluating operation and coordination efficiencies of parallel-series two-stage system: A data envelopment analysis approach.
Expert Syst. Appl., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed and Parallel Databases, 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018

SADUS: Secure data deletion in user space for mobile devices.
Computers & Security, 2018

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
SCIENCE CHINA Information Sciences, 2018

ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation.
Comput. Graph. Forum, 2018

Verifiable keyword search over encrypted cloud data in smart city.
Computers & Electrical Engineering, 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Computing and Informatics, 2018

Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments.
IEEE Access, 2018

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs.
IEEE Access, 2018

Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data.
IEEE Access, 2018

CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018

A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018

A Novel Dynamic Android Malware Detection System With Ensemble Learning.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks.
IEEE Trans. Vehicular Technology, 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Information Forensics and Security, 2017

An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything.
Security and Communication Networks, 2017

VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer-to-Peer Networking and Applications, 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive and Mobile Computing, 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive and Mobile Computing, 2017

Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mobile Information Systems, 2017

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mobile Information Systems, 2017

ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.
J. Medical Systems, 2017

An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

A Multi-Party Secret Handshake Scheme Based on Chaotic Maps.
ITC, 2017

A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.
Inf. Sci., 2017

Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems.
Inf. Sci., 2017

A fair data access control towards rational users in cloud storage.
Inf. Sci., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet of Things Journal, 2017

Reusable garbled gates for new fully homomorphic encryption service.
IJWGS, 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
IJWGS, 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. Journal of Network Management, 2017

An efficient revocable ID-based encryption scheme in the standard model.
IJES, 2017

Analysis and improvement of the Internet-Draft IKEv3 protocol.
Int. J. Communication Systems, 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Generation Comp. Syst., 2017

Test of Mechanical Failure for Via Holes and Solder Joints of Complex Interconnect Structure.
J. Electronic Testing, 2017

Efficiency measurement and decomposition in hybrid two-stage DEA with additional inputs.
Expert Syst. Appl., 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.
CoRR, 2017

Identifying opinion leaders in social networks with topic limitation.
Cluster Computing, 2017

An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
SCIENCE CHINA Information Sciences, 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
SCIENCE CHINA Information Sciences, 2017

VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.
SCIENCE CHINA Information Sciences, 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
SCIENCE CHINA Information Sciences, 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
SCIENCE CHINA Information Sciences, 2017

FCT: a fully-distributed context-aware trust model for location based service recommendation.
SCIENCE CHINA Information Sciences, 2017

Reconstruction methodology for rational secret sharing based on mechanism design.
SCIENCE CHINA Information Sciences, 2017

NetPro: detecting attacks in MANET routing with provenance and verification.
SCIENCE CHINA Information Sciences, 2017

APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.
SCIENCE CHINA Information Sciences, 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Computers & Electrical Engineering, 2017

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs.
IEEE Access, 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems.
IEEE Access, 2017

Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
A privacy preserving three-factor authentication protocol for e-Health clouds.
The Journal of Supercomputing, 2016

Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomedical and Health Informatics, 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Dynamic game model of botnet DDoS attack and defense.
Security and Communication Networks, 2016

Efficient keyword search over encrypted data in multi-cloud setting.
Security and Communication Networks, 2016

A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities.
Security and Communication Networks, 2016

Measuring the risk value of sensitive dataflow path in Android applications.
Security and Communication Networks, 2016

A new method to deduce counterexamples in secure routing protocols based on strand space model.
Security and Communication Networks, 2016

Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Network, 2016

LSOT: A Lightweight Self-Organized Trust Model in VANETs.
Mobile Information Systems, 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Network and Computer Applications, 2016

A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Systems, 2016

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Systems, 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Systems, 2016

Position based key exchange: defnitions and implementations.
J. Comm. Inform. Networks, 2016

On the architecture and development life cycle of secure cyber-physical systems.
J. Comm. Inform. Networks, 2016

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment.
TIIS, 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
ITC, 2016

An intelligent movie recommendation system through group-level sentiment analysis in microblogs.
Neurocomputing, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
IJGUC, 2016

Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
IJAHUC, 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Generation Comp. Syst., 2016

Revocable and anonymous searchable encryption in multi-user setting.
Concurrency and Computation: Practice and Experience, 2016

DALP: A demand-aware location privacy protection scheme in continuous location-based services.
Concurrency and Computation: Practice and Experience, 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Computers & Security, 2016

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Cluster Computing, 2016

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
SCIENCE CHINA Information Sciences, 2016

Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.
SCIENCE CHINA Information Sciences, 2016

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Computers & Electrical Engineering, 2016

Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Modeling Gap Seeking Behaviors for Agent-based Crowd Simulation.
Proceedings of the 29th International Conference on Computer Animation and Social Agents, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Improving the utility in differential private histogram publishing: Theoretical study and practice.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing.
Wireless Communications and Mobile Computing, 2015

Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility.
IEEE Trans. Wireless Communications, 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Information Forensics and Security, 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Sec. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Computational Collective Intelligence, 2015

Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Computational Collective Intelligence, 2015

Protocol Derivation System for the Needham-Schroeder family.
Security and Communication Networks, 2015

Provable ownership of files in deduplication cloud storage.
Security and Communication Networks, 2015

Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Security and Communication Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Security and Communication Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Networking and Applications, 2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Networking and Applications, 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mobile Information Systems, 2015

New access control systems based on outsourced attribute-based encryption.
Journal of Computer Security, 2015

A new proxy re-encryption scheme for protecting critical information systems.
J. Ambient Intelligence and Humanized Computing, 2015

A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems.
ITC, 2015

A Security Quantitative Analysis Method For Access Control Based on Security Entropy.
I. J. Network Security, 2015

Numerical investigation of restricted contact cutting tool in machining of AISI 1045 steel.
IJMR, 2015

A two-factor authenticated key exchange protocol based on RSA with dynamic passwords.
IJES, 2015

A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment.
IJDSN, 2015

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Communication Systems, 2015

Improvement of robust smart-card-based password authentication scheme.
Int. J. Communication Systems, 2015

Secure service composition with information flow control in service clouds.
Future Generation Comp. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Generation Comp. Syst., 2015

A two-stage DEA model considering shared inputs and free intermediate measures.
Expert Syst. Appl., 2015

Device-to-Device Communication in LTE-Advanced Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Computer Networks, 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

Universally composable secure positioning in the bounded retrieval model.
SCIENCE CHINA Information Sciences, 2015

Survey on cyberspace security.
SCIENCE CHINA Information Sciences, 2015

Bayesian mechanism for rational secret sharing scheme.
SCIENCE CHINA Information Sciences, 2015

A privacy-preserving data collection model for digital community.
SCIENCE CHINA Information Sciences, 2015

An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information.
SCIENCE CHINA Information Sciences, 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc & Sensor Wireless Networks, 2015

Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Data Owner Based Attribute Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

New Compact CCA Secure Elgamal Scheme in the Random Oracle Model.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Continuous Context-Aware Device Comfort Evaluation Method.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Improved Algorithm for Secure Outsourcing of Modular Exponentiations.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency.
Proceedings of the 10th International Conference on P2P, 2015

Another Look at Ciphertext Updating Algorithms for Cloud Storage.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wireless Personal Communications, 2014

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wireless Personal Communications, 2014

FLAP: An Efficient WLAN Initial Access Authentication Protocol.
IEEE Trans. Parallel Distrib. Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distrib. Syst., 2014

A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Computing, 2014

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
JSW, 2014

Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Network and Computer Applications, 2014

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Systems, 2014

The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.
JCP, 2014

Access Control Capability Assessment Method Based on Security Entropy.
JCP, 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
TIIS, 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
IJSNet, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
I. J. Network Security, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Information Security, 2014

New and efficient conditional e-payment systems with transferability.
Future Generation Comp. Syst., 2014

From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Cluster Computing, 2014

Trust-based service composition in multi-domain environments under time constraint.
SCIENCE CHINA Information Sciences, 2014

Automated enforcement for relaxed information release with reference points.
SCIENCE CHINA Information Sciences, 2014

Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Multi-domain Direct Anonymous Attestation Scheme from Pairings.
Proceedings of the Network and System Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

Verifiable Computation over Large Database with Incremental Updates.
Proceedings of the Computer Security - ESORICS 2014, 2014

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2013

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation.
IEEE Trans. Smart Grid, 2013

TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IEEE Trans. Information Forensics and Security, 2013

An Engine for Automatic Code Generation of Security Protocols in Multiple Languages.
Smart CR, 2013

A Collaborative QoS-Aware Service Evaluation Method for Service Selection.
JNW, 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Network and Computer Applications, 2013

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Systems, 2013

Constructing Verifiable Random Number in Finite Field.
J. Internet Serv. Inf. Secur., 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
ITC, 2013

A rational framework for secure communication.
Inf. Sci., 2013

Access control requirements for structured document in cloud computing.
IJGUC, 2013

MAP: Towards Authentication for Multiple Tags.
IJDSN, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
IJDSN, 2013

Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
IJDSN, 2013

Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.
IJDSN, 2013

Fair (t, n) threshold secret sharing scheme.
IET Information Security, 2013

Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013

Flexible relay selection for secure communication in two-hop wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013

Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
Data security in unattended wireless sensor networks with mobile sinks.
Wireless Communications and Mobile Computing, 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Security and Communication Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Security and Communication Networks, 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
IJRFITA, 2012

Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
I. J. Network Security, 2012

Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings.
I. J. Network Security, 2012

A method for efficient parallel computation of Tate pairing.
IJGUC, 2012

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
IJDSN, 2012

Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems.
IJDSN, 2012

Secrecy Transfer.
IJDSN, 2012

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerging Telecommunications Technologies, 2012

PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks.
EURASIP J. Wireless Comm. and Networking, 2012

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012

Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
CoRR, 2012

Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient WLAN initial access authentication protocol.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

New Algorithms for Secure Outsourcing of Modular Exponentiations.
Proceedings of the Computer Security - ESORICS 2012, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Verifying Location-Based Services with Declassification Enforcement.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Analysis on Variation and Factors of Water Resources Consumption Intensity in China.
Proceedings of the Modeling Risk Management for Resources and Environment in China, 2011

Authentications and Key Management in 3G-WLAN Interworking.
MONET, 2011

A novel re-authentication scheme based on tickets in wireless local area networks.
J. Parallel Distrib. Comput., 2011

A New Evaluation Model for Security Protocols.
JCM, 2011

Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario.
Intelligent Automation & Soft Computing, 2011

Reasonable routing in delay/disruption tolerant networks.
Frontiers Comput. Sci. China, 2011

Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China, 2011

A USIM-Based Uniform Access Authentication Framework in Mobile Communication.
EURASIP J. Wireless Comm. and Networking, 2011

Secret Sharing Scheme with Fairness.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Towards Location and Trajectory Privacy Protection in Participatory Sensing.
Proceedings of the Mobile Computing, Applications, and Services, 2011

From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011

Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Analysis of the Authentication Protocols Based on Game Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Protocol Derivation System for the Needham-Schroeder family.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wireless Communications, 2010

Efficient and Identity-based Signcryption with Provably-secure.
JDCTA, 2010

A highly secure identity-based authenticated key-exchange protocol for satellite communication.
Journal of Communications and Networks, 2010

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
I. J. Network Security, 2010

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
I. J. Network Security, 2010

Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks.
I. J. Network Security, 2010

An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment.
IEICE Transactions, 2010

Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks.
IEICE Transactions, 2010

SAM: Secure Access of Media Independent Information Service with User Anonymity.
EURASIP J. Wireless Comm. and Networking, 2010

Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Computers & Security, 2010

Universally composable one-time signature and broadcast authentication.
SCIENCE CHINA Information Sciences, 2010

Universally composable secure TNC model and EAP-TNC protocol in IF-T.
SCIENCE CHINA Information Sciences, 2010

Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2010

Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A novel data communication approach in wireless sensor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Digital Rights Management scheme based on rational share content.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010

Changeable Threshold Signature Scheme Based on Lattice Theory.
Proceedings of the International Conference on E-Business and E-Government, 2010

Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Wireless Mesh Networks-Based Multinetwork Convergence and Security Access.
Proceedings of the Guide to Wireless Mesh Networks, 2009

Modeling and analysis of a self-learning worm based on good point set scanning.
Wireless Communications and Mobile Computing, 2009

Asymmetric Key Pre-distribution Scheme for sensor networks.
IEEE Trans. Wireless Communications, 2009

Security and Trust in Digital Rights Management: A Survey.
I. J. Network Security, 2009

Robust Node Positioning in Wireless Sensor Networks.
IEICE Transactions, 2009

UC-Secure Source Routing Protocol.
IACR Cryptology ePrint Archive, 2009

Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Computers & Security, 2009

Key hierarchies for hierarchical access control in secure group communications.
Computer Networks, 2009

Secure Error-Correction Network Coding in a Randomized Setting.
Proceedings of the Advances in Information Security and Assurance, 2009

Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Predators Combat Good Point Set Scanning-Based Self-Learning Worms.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Cell Biocompatibility of Porous Nano-Hydroxyapatite/Polyamide66 Composite Scaffolds for Bone Tissue Engineering.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

An Active Defense Model and Framework of Insider Threats Detection and Sense.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Towards Provably Secure On-demand Source Routing in MANET.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Action-Based Access Control for Web Services.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves.
IACR Cryptology ePrint Archive, 2008

Polynomials for Ate Pairing and Atei Pairing.
IACR Cryptology ePrint Archive, 2008

Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wireless Comm. and Networking, 2008

Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR, 2008

A new approach for UC security concurrent deniable authentication.
Science in China Series F: Information Sciences, 2008

Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2008

Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks.
Proceedings of the MSN 2008, 2008

A pairwise key establishment scheme for heterogeneous sensor networks.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

Keying material based key pre-distribution scheme.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Secure and Efficient Group Key Agreement for Ad Hoc Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Enhanced Architecture of TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Aggregate Signature Scheme with Constant Pairing Operations.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

ECC-Based Threshold Digital Signature Scheme without a Trusted Party.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Towards Provably Secure On-Demand Distance Vector Routing in MANET.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Universally composable anonymous Hash certification model.
Science in China Series F: Information Sciences, 2007

A truly meshless pre- and post-processor for meshless analysis methods.
Advances in Engineering Software, 2007

Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Research on the Resilience of Key Management in Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment.
IEICE Transactions, 2006

Fault and intrusion tolerance of wireless sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Ternary Tree Based Group Key Management in Dynamic Peer Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Security extension for the Canetti-Krawczyk model in identity-based systems.
Science in China Series F: Information Sciences, 2005

Efficient Group Key Management for Dynamic Peer Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Security Analysis on Chinese Wireless LAN Standard and Its Solution.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

Design and Implementation of Survivable Network Systems.
Proceedings of the Advances in Intelligent Computing, 2005

An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005

A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Worm Propagation Modeling and Analysis on Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On the Security of the Canetti-Krawczyk Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A new authentication scheme with anonymity for wireless environments.
IEEE Trans. Consumer Electronics, 2004

An efficient and secure fault-tolerant conference-key distribution scheme.
IEEE Trans. Consumer Electronics, 2004

An intrusion-tolerant authorization and authentication scheme in distributed environments.
Operating Systems Review, 2004

Practical Secret Sharing Scheme Realizing Generalized Adversary Structure.
J. Comput. Sci. Technol., 2004

Availability Analysis and Comparison of Different Intrusion-Tolerant Systems.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004


  Loading...