Shoushan Luo

Orcid: 0000-0002-9900-1518

According to our database1, Shoushan Luo authored at least 40 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023

An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network.
Entropy, 2023

DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023

2022
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks.
IEEE Trans. Cloud Comput., 2022

Chaotic analysis and entropy estimation of the entropy source based on semiconductor superlattice chaos.
Microelectron. J., 2022

2021
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control.
Wirel. Commun. Mob. Comput., 2021

Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021

Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021

2020
TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform.
Comput. Networks, 2020

Using User Behavior to Measure Privacy on Online Social Networks.
IEEE Access, 2020

2019
Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing.
IEEE J. Biomed. Health Informatics, 2019

IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.
KSII Trans. Internet Inf. Syst., 2019

Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks.
IEEE Access, 2019

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework.
IEEE Access, 2019

A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019

BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme.
IEEE Access, 2019

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme.
IEEE Access, 2019

Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography.
IEEE Access, 2019

A Authentication and Access Authorization Mechanism on the PaaS Platform.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Moving Target Defense Against Injection Attacks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks.
J. Sensors, 2018

Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems.
IEEE Access, 2018

2017
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks.
IEEE Access, 2017

Fine-Grained Access Control for Personal Health Records in Cloud Computing.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Secure Multi-party Comparison Protocol and Application.
Proceedings of the Data Science, 2017

2016
A two-level hybrid approach for intrusion detection.
Neurocomputing, 2016

2015
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph.
KSII Trans. Internet Inf. Syst., 2015

A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Towards a multiobjective framework for evaluating network security under exploit attacks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2013
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks.
J. Comput., 2013

Efficient intrusion detection using representative instances.
Comput. Secur., 2013

2012
Efficient entanglement channel construction schemes for a theoretical quantum network model with <i>d</i>-level system.
Quantum Inf. Process., 2012

A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks.
Int. J. Comput. Intell. Syst., 2012

2011
Research on Secure Multi-party Computational Geometry.
Proceedings of the Information Computing and Applications, 2011

A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

2010
An anonymous authentication scheme for mobile communication.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2007
A Study of Secure Multi-party Ranking Problem.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...