Qingkuan Dong

Orcid: 0000-0001-8034-9170

According to our database1, Qingkuan Dong authored at least 22 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain.
Sensors, July, 2023

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly.
IEEE Internet Things J., 2023

2022
Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS.
IEEE Trans. Netw. Serv. Manag., 2022

A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022

2020
Energy-Efficient Neighbor Discovery for the Internet of Things.
IEEE Internet Things J., 2020

2019
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms.
J. Univers. Comput. Sci., 2019

基于云的轻量级RFID群组标签认证协议 (Cloud-based Lightweight RFID Group Tag Authentication Protocol).
计算机科学, 2019

2018
Cloud-based radio frequency identification authentication protocol with location privacy protection.
Int. J. Distributed Sens. Networks, 2018

2017
Natural sd-RCCA Secure Public-Key Encryptions.
Proceedings of the Provable Security, 2017

2016
A Trust Management System for Securing Data Plane of Ad-Hoc Networks.
IEEE Trans. Veh. Technol., 2016

A similarity-based indirect trust model with anti-spoofing capability.
Secur. Commun. Networks, 2016

TrustR: An Integrated Router Security Framework for Protecting Computer Networks.
IEEE Commun. Lett., 2016

2015
Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication.
Secur. Commun. Networks, 2015

Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.
Secur. Commun. Networks, 2015

Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud.
Int. J. Distributed Sens. Networks, 2015

Trust based routing mechanism for securing OSLR-based MANET.
Ad Hoc Networks, 2015

2014
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions.
Secur. Commun. Networks, 2014

An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2012
Two extensions of the ring signature scheme of Rivest-Shamir-Taumann.
Inf. Sci., 2012

RCCA Security for KEM+DEM Style Hybrid Encryptions.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2009
A Dynamic Layering Scheme of Multicast Key Management.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2005
Running-mode Analysis of the Lu-Smolka-SET protocol.
Proceedings of The 2005 International Conference on E-Business, 2005


  Loading...