Qi Jiang

According to our database1, Qi Jiang authored at least 44 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Pruneable sharding-based blockchain protocol.
Peer-to-Peer Networking and Applications, 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet of Things Journal, 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Communication Systems, 2019

2018
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Security and Communication Networks, 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Networking and Applications, 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multimedia Tools Appl., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intelligence and Humanized Computing, 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Generation Comp. Syst., 2018

Verifiable keyword search over encrypted cloud data in smart city.
Computers & Electrical Engineering, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive and Mobile Computing, 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive and Mobile Computing, 2017

A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing.
J. Inf. Sci. Eng., 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. Journal of Network Management, 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
SCIENCE CHINA Information Sciences, 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Computers & Electrical Engineering, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A privacy preserving three-factor authentication protocol for e-Health clouds.
The Journal of Supercomputing, 2016

A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities.
Security and Communication Networks, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multimedia Tools Appl., 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Network and Computer Applications, 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Systems, 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
ITC, 2016

Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks.
I. J. Network Security, 2016

Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks.
Wireless Personal Communications, 2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Networking and Applications, 2015

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Communication Systems, 2015

Improvement of robust smart-card-based password authentication scheme.
Int. J. Communication Systems, 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Computer Networks, 2015

Bayesian mechanism for rational secret sharing scheme.
SCIENCE CHINA Information Sciences, 2015

2014
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wireless Personal Communications, 2014

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Systems, 2014

2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2013

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Systems, 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
ITC, 2013

Fair (t, n) threshold secret sharing scheme.
IET Information Security, 2013

2012
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
I. J. Network Security, 2012

2011
A novel re-authentication scheme based on tickets in wireless local area networks.
J. Parallel Distrib. Comput., 2011

2010
SAM: Secure Access of Media Independent Information Service with User Anonymity.
EURASIP J. Wireless Comm. and Networking, 2010

A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...