Rongxing Lu

According to our database1, Rongxing Lu authored at least 309 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Vehicular Technology, 2019

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Vehicular Technology, 2019

Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things.
IEEE Trans. Circuits Syst. Video Techn., 2019

On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
TCPS, 2019

Privacy-Preserving iVector-Based Speaker Verification.
IEEE/ACM Trans. Audio, Speech & Language Processing, 2019

Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
J. Medical Systems, 2019

A Practical and Compatible Cryptographic Solution to ADS-B Security.
IEEE Internet of Things Journal, 2019

An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare.
IEEE Internet of Things Journal, 2019

A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT.
IEEE Internet of Things Journal, 2019

CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.
IEEE Internet of Things Journal, 2019

Cooperative jamming-based physical-layer security of cooperative cognitive radio networks: system model and enabling techniques.
IET Communications, 2019

A privacy-preserving sensory data sharing scheme in Internet of Vehicles.
Future Generation Comp. Syst., 2019

Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System.
IEEE Access, 2019

2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Vehicular Technology, 2018

Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles.
IEEE Trans. Vehicular Technology, 2018

A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks.
IEEE Trans. Industrial Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Sec. Comput., 2018

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Networking and Applications, 2018

FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.
Peer-to-Peer Networking and Applications, 2018

Security and Privacy of Connected Vehicular Cloud Computing.
IEEE Network, 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Network, 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE Journal on Selected Areas in Communications, 2018

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet of Things Journal, 2018

Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability.
IEEE Internet of Things Journal, 2018

Design of Secret Reconstruction With Optimal Communication Efficiency.
IEEE Communications Letters, 2018

PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.
Future Generation Comp. Syst., 2018

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Generation Comp. Syst., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Generation Comp. Syst., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Generation Comp. Syst., 2018

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.
IEEE Communications Magazine, 2018

Enabling Efficient and Privacy-Preserving Health Query Over Outsourced Cloud.
IEEE Access, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Anomalous Path Detection for Spatial Crowdsourcing-Based Indoor Navigation System.
Proceedings of the IEEE Global Communications Conference, 2018

PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

2017
A Reliable and Energy-Efficient Opportunistic Routing Protocol for Dense Lossy Networks.
IEEE Wireless Commun. Letters, 2017

REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET.
IEEE Trans. Vehicular Technology, 2017

Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomedical and Health Informatics, 2017

False Data Injection on State Estimation in Power Systems - Attacks, Impacts, and Defense: A Survey.
IEEE Trans. Industrial Informatics, 2017

Defending Against False Data Injection Attacks on Power System State Estimation.
IEEE Trans. Industrial Informatics, 2017

PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Sensors, 2017

Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.
Sensors, 2017

Security and Privacy in Emerging Wireless Networks.
Security and Communication Networks, 2017

A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities.
Peer-to-Peer Networking and Applications, 2017

TPSQ: Trust-based platoon service query via vehicular communications.
Peer-to-Peer Networking and Applications, 2017

PTRS: A privacy-preserving trust-based relay selection scheme in VANETs.
Peer-to-Peer Networking and Applications, 2017

A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance.
Peer-to-Peer Networking and Applications, 2017

Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distrib. Comput., 2017

Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017

Privacy-friendly spatial crowdsourcing in vehicular networks.
J. Comm. Inform. Networks, 2017

Guest Editorial Big Security Challenges in Big Data Era.
IEEE Internet of Things Journal, 2017

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks.
IEEE Internet of Things Journal, 2017

An Efficient Fog-Assisted Unstable Sensor Detection Scheme with Privacy Preserved.
CoRR, 2017

A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment.
CoRR, 2017

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Communications Magazine, 2017

Securing the Internet of Things in a Quantum World.
IEEE Communications Magazine, 2017

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Applied Mathematics and Computation, 2017

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017

Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017

EPP-DMM: An Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
Wireless Networks, Springer, ISBN: 978-3-319-32899-7, 2016

Secure machine-type communications in LTE networks.
Wireless Communications and Mobile Computing, 2016

An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Vehicular Technology, 2016

A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Vehicular Technology, 2016

Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomedical and Health Informatics, 2016

Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid".
IEEE Trans. Industrial Informatics, 2016

Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
IEEE Trans. Information Forensics and Security, 2016

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Information Forensics and Security, 2016

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Information Forensics and Security, 2016

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.
Sensors, 2016

EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Security and Communication Networks, 2016

SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems.
Security and Communication Networks, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive and Mobile Computing, 2016

Security and Privacy Challenges in Vehicular Cloud Computing.
Mobile Information Systems, 2016

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data.
IEEE Internet of Things Journal, 2016

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption.
IEEE Internet of Things Journal, 2016

BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid.
IEEE Internet of Things Journal, 2016

A New Digital Signature Scheme from Layered Cellular Automata.
I. J. Network Security, 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Generation Comp. Syst., 2016

Recent advances in security and privacy in large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Computer Networks, 2016

SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking.
Big Data Research, 2016

An Energy-Efficient and Self-Regioning Based RPL for Low-Power and Lossy Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Proxy Re-encryption with Delegatable Verifiability.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication.
Wireless Communications and Mobile Computing, 2015

Social on the road: enabling secure and efficient social networking on highways.
IEEE Wireless Commun., 2015

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System.
IEEE Trans. Vehicular Technology, 2015

Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications.
IEEE Trans. Smart Grid, 2015

Fast Distributed Demand Response With Spatially and Temporally Coupled Constraints in Smart Grid.
IEEE Trans. Industrial Informatics, 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Social Systems, 2015

Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015

Duth: a user-friendly dual-factor authentication for Android smartphone devices.
Security and Communication Networks, 2015

Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
Security and Communication Networks, 2015

ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Security and Communication Networks, 2015

PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Security and Communication Networks, 2015

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
Peer-to-Peer Networking and Applications, 2015

MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Networking and Applications, 2015

PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications.
Peer-to-Peer Networking and Applications, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Network, 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications.
IEEE Internet of Things Journal, 2015

Privacy Concerns for Photo Sharing in Online Social Networks.
IEEE Internet Computing, 2015

Trust-Based Anomaly Detection in Emerging Sensor Networks.
IJDSN, 2015

Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Communications Magazine, 2015

SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fine-grained data sharing in cloud computing for mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

EFPA: Efficient and flexible privacy-preserving mining of association rule in cloud.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

DDPFT: Secure data aggregation scheme with differential privacy and fault tolerance.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare.
Proceedings of the 10th International Conference on Information, 2015

A sybil attack detection scheme for privacy-preserving mobile social networks.
Proceedings of the 10th International Conference on Information, 2015

2014
Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014

Time Synchronization for Random Mobile Sensor Networks.
IEEE Trans. Vehicular Technology, 2014

PEACE: Polarization Enabled Active Cooperation Scheme Between Primary and Secondary Networks.
IEEE Trans. Vehicular Technology, 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distrib. Syst., 2014

An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid.
IEEE Systems Journal, 2014

Call for papers: systematic network optimizations for security parameters (security and communication networks).
Security and Communication Networks, 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Security and Communication Networks, 2014

SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection.
Security and Communication Networks, 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Network, 2014

RCare: Extending Secure Health Care to Rural Area Using VANETs.
MONET, 2014

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014

A New Public Key Encryption Scheme based on Layered Cellular Automata.
TIIS, 2014

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.
TIIS, 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet of Things Journal, 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet of Things Journal, 2014

Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding".
IEEE Communications Letters, 2014

A regular expression matching engine with hybrid memories.
Computer Standards & Interfaces, 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Communications Magazine, 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PLAM: A privacy-preserving framework for local-area mobile social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PAD: Privacy-preserving data dissemination in mobile social networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Achieving ranked range query in smart grid auction market.
Proceedings of the IEEE International Conference on Communications, 2014

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014

Incentive mechanism design for crowdsourcing-based cooperative transmission.
Proceedings of the IEEE Global Communications Conference, 2014

Optimal decentralized security software deployment in multihop wireless networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Security and Privacy in Mobile Social Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid.
IEEE Trans. Smart Grid, 2013

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
IEEE Trans. Parallel Distrib. Syst., 2013

An Efficient Data-Driven Particle PHD Filter for Multitarget Tracking.
IEEE Trans. Industrial Informatics, 2013

PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerging Topics Comput., 2013

A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network.
IEEE Trans. Emerging Topics Comput., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE Journal on Selected Areas in Communications, 2013

A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems.
IEEE Intelligent Systems, 2013

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Computer Networks, 2013

Real-time path planning for optimized spatial utilization and travel cost in vanet-enhanced transportation system.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

Particle filter based grid synchronization with voltage unbalance and frequency variation in smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

SND: Secure neighbor discovery for 60 GHz network with directional antenna.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

EATH: An efficient aggregate authentication protocol for smart grid communications.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A novel low-power mixed-mode implementation of weight update in particle PHD filters.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On optimal communication strategies for cooperative cognitive radio networking.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

APED: An efficient aggregation protocol with error detection for smart grid communications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Robust group key management with revocation and collusion resistance for SCADA in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

SPS: Secure personal health information sharing with patient-centric access control in cloud computing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Enabling pervasive healthcare through continuous remote health monitoring.
IEEE Wireless Commun., 2012

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Vehicular Technology, 2012

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Vehicular Technology, 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distrib. Syst., 2012

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2012

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Computer Communications, 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Communications Magazine, 2012

Toward secure targeted broadcast in smart grid.
IEEE Communications Magazine, 2012

Network selection strategy for cognitive radios with heterogeneous primary networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

A lightweight key management scheme for 60 GHz WPAN.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Trust-based anomaly detection in wireless sensor networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Energy-efficient and trust-aware cooperation in cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2012

Enabling pervasive healthcare with privacy preservation in smart community.
Proceedings of IEEE International Conference on Communications, 2012

PMDS: A probabilistic misbehavior detection scheme in DTN.
Proceedings of IEEE International Conference on Communications, 2012

VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
A Lightweight Message Authentication Scheme for Smart Grid Communications.
IEEE Trans. Smart Grid, 2011

An efficient and provably secure public key encryption scheme based on coding theory.
Security and Communication Networks, 2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network.
MONET, 2011

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
Journal of Communications and Networks, 2011

ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing.
IJSN, 2011

GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Communications Magazine, 2011

Smart community: an internet of things application.
IEEE Communications Magazine, 2011

Toward Reliable Actor Services in Wireless Sensor and Actor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks.
Proceedings of IEEE International Conference on Communications, 2011

Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient and Secure User Revocation Scheme in Mobile Social Networks.
Proceedings of the Global Communications Conference, 2011

Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011

Health-Post: A Delay-Tolerant Secure Long-Term Health Care Scheme in Rural Area.
Proceedings of the Global Communications Conference, 2011

2010
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
Wireless Communications and Mobile Computing, 2010

Complementing public key infrastructure to secure vehicular ad hoc networks.
IEEE Wireless Commun., 2010

Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wireless Communications, 2010

An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks.
Computer Networks, 2010

PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs.
Proceedings of IEEE International Conference on Communications, 2010

A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2010

TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010

Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

An Efficient Searchable Encryption Scheme and Its Application in Network Forensics.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010

Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

2009
Security in service-oriented vehicular networks.
IEEE Wireless Commun., 2009

SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Vehicular Technology, 2009

A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Vehicular Technology, 2009

Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE Journal on Selected Areas in Communications, 2009

SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Location-Release Signature for Vehicular Communications.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wireless Communications, 2008

TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wireless Communications, 2008

An Efficient Message Authentication Scheme for Vehicular Communications.
IEEE Trans. Vehicular Technology, 2008

Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Security and Communication Networks, 2008

New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

A Simple User Authentication Scheme for Grid Computing.
I. J. Network Security, 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Efficient and secure protocol in fair document exchange.
Computer Standards & Interfaces, 2008

Security in vehicular ad hoc networks.
IEEE Communications Magazine, 2008

Designing efficient proxy signature schemes for mobile communication.
Science in China Series F: Information Sciences, 2008

A Location Privacy Preserving Authentication Scheme in Vehicular Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008

BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Improvement of Yang et al.'s threshold proxy signature scheme.
Journal of Systems and Software, 2007

A New ID-Based Deniable Authentication Protocol.
Informatica, Lith. Acad. Sci., 2007

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
I. J. Network Security, 2007

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings.
I. J. Network Security, 2007

Efficient Password-based Authenticated Key Exchange without Public Information.
IACR Cryptology ePrint Archive, 2007

A New Practical Limited Identity-Based Encryption Scheme.
Fundam. Inform., 2007

An enhanced authenticated key agreement protocol for wireless mobile communication.
Computer Standards & Interfaces, 2007

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Computer Standards & Interfaces, 2007

Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405].
Computer Standards & Interfaces, 2007

Simple three-party key exchange protocol.
Computers & Security, 2007

Threshold password authentication against guessing attacks in Ad hoc networks.
Ad Hoc Networks, 2007

A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

Efficient Password-Based Authenticated Key Exchange Without Public Information.
Proceedings of the Computer Security, 2007

2006
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wireless Communications and Mobile Computing, 2006

An improved deniable authentication protocol.
Networks, 2006

A Directed Signature Scheme Based on RSA Assumption.
I. J. Network Security, 2006

Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication.
I. J. Network Security, 2006

Provably secure robust threshold partial blind signature.
Science in China Series F: Information Sciences, 2006

Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
Proceedings of the Wireless Algorithms, 2006

Group Oriented Deniable Authentication Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Efficient ID-Based Multi-proxy Multi-Signature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Remote Authentication with Forward Security.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Pairing-Based Two-Party Authenticated Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2005

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks.
IACR Cryptology ePrint Archive, 2005

Non-interactive deniable authentication protocol based on factoring.
Computer Standards & Interfaces, 2005

Efficient remote user authentication scheme using smart card.
Computer Networks, 2005

Provably secure proxy-protected signature schemes based on factoring.
Applied Mathematics and Computation, 2005

A robust (k, n) + 1 threshold proxy signature scheme based on factoring.
Applied Mathematics and Computation, 2005

Proxy blind multi-signature scheme without a secure channel.
Applied Mathematics and Computation, 2005

Threshold undeniable signature scheme based on conic.
Applied Mathematics and Computation, 2005

Designated verifier proxy signature scheme with message recovery.
Applied Mathematics and Computation, 2005

A new deniable authentication protocol from bilinear pairings.
Applied Mathematics and Computation, 2005

Proxy signature scheme using self-certified public keys.
Applied Mathematics and Computation, 2005

Identity Based Conference Key Distribution Scheme from Parings.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Constructing Secure Warrant-Based Proxy Signcryption Schemes.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...