Xiong Li

According to our database1, Xiong Li authored at least 133 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020

Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data".
IEEE Trans. Inf. Forensics Secur., 2020

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Systems Journal, 2020

Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services.
J. Medical Syst., 2020

Special issue on "Brain computing for healthcare and wellness applications".
J. Ambient Intell. Humaniz. Comput., 2020

Revised anonymous authentication protocol for adaptive client-server infrastructure.
Int. J. Commun. Syst., 2020

Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis.
HCIS, 2020

Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020

MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost.
Future Gener. Comput. Syst., 2020

A privacy-preserving scheme with identity traceable property for smart grid.
Comput. Commun., 2020

2019
Secure CLS and CL-AS schemes designed for VANETs.
J. Supercomput., 2019

Optimality criteria for fuzzy-valued fractional multi-objective optimization problem.
Soft Comput., 2019

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Systems Journal, 2019

An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Systems Journal, 2019

Pattern Recognition Techniques for Non Verbal Human Behavior (NVHB).
Pattern Recognit. Lett., 2019

Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users.
MONET, 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
MONET, 2019

A provably secure and anonymous message authentication scheme for smart grids.
J. Parallel Distributed Comput., 2019

Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare.
J. Medical Syst., 2019

Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications.
IEEE Internet Things J., 2019

Lightweight IoT-based authentication scheme in cloud computing circumstance.
Future Gener. Comput. Syst., 2019

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019

Pixel-wise depth based intelligent station for inferring fine-grained PM<sub>2.5</sub>.
Future Gener. Comput. Syst., 2019

Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT.
EURASIP J. Wireless Comm. and Networking, 2019

To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs.
IEEE Access, 2019

Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns.
IEEE Access, 2019

Broadcast Based Code Dissemination Scheme for Duty Cycle Based Wireless Sensor Networks.
IEEE Access, 2019

A Collaboration Platform for Effective Task and Data Reporter Selection in Crowdsourcing Network.
IEEE Access, 2019

Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things.
IEEE Access, 2019

Battery-Friendly Relay Selection Scheme for Prolonging the Lifetimes of Sensor Nodes in the Internet of Things.
IEEE Access, 2019

A Queuing Delay Utilization Scheme for On-Path Service Aggregation in Services-Oriented Computing Networks.
IEEE Access, 2019

Deployment Optimization of Data Centers in Vehicular Networks.
IEEE Access, 2019

Adaptive Neural-Network-Based Control for a Class of Nonlinear Systems With Unknown Output Disturbance and Time Delays.
IEEE Access, 2019

2018
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers.
Wirel. Commun. Mob. Comput., 2018

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommunication Systems, 2018

A certificateless aggregate signature scheme for healthcare wireless sensor network.
Sustain. Comput. Informatics Syst., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Security and Communication Networks, 2018

Systematic Comparison of Power Line Classification Methods from ALS and MLS Point Cloud Data.
Remote. Sens., 2018

An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Peer Peer Netw. Appl., 2018

New cubic reference table based image steganography.
Multim. Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018

Using convolution control block for Chinese sentiment analysis.
J. Parallel Distributed Comput., 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Gener. Comput. Syst., 2018

Design and implementation of a multibiometric system based on hand's traits.
Expert Syst. Appl., 2018

Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation.
Comput. Commun., 2018

Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices.
IEEE Consumer Electron. Mag., 2018

A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion.
Comput. Electr. Eng., 2018

Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm.
Comput. Electr. Eng., 2018

Verifiable keyword search over encrypted cloud data in smart city.
Comput. Electr. Eng., 2018

Medical JPEG image steganography based on preserving inter-block dependencies.
Comput. Electr. Eng., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

A Multi-Features Fusion Method Based on Convolutional Neural Network for Vehicle Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Study on IP Protection Techniques for Integrated Circuit in IOT Environment.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

Secure Data Access and Sharing Scheme for Cloud Storage.
Wireless Personal Communications, 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wireless Personal Communications, 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017

A new and secure authentication scheme for wireless sensor networks with formal proof.
Peer Peer Netw. Appl., 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer Peer Netw. Appl., 2017

A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
Multimedia Syst., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

Wireless and Mobile Networks: Security and Privacy Issues.
J. Electr. Comput. Eng., 2017

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
J. Ambient Intell. Humaniz. Comput., 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

Medical image classification based on multi-scale non-negative sparse coding.
Artif. Intell. Medicine, 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wireless Personal Communications, 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Security and Communication Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Security and Communication Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Security and Communication Networks, 2016

Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Security and Communication Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Security and Communication Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Security and Communication Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Security and Communication Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Security and Communication Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Security and Communication Networks, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

A more secure digital rights management authentication scheme based on smart card.
Multim. Tools Appl., 2016

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016

An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016

A User Anonymous Mutual Authentication Protocol.
KSII Trans. Internet Inf. Syst., 2016

Design of a user anonymous password authentication scheme without smart card.
Int. J. Commun. Syst., 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wireless Personal Communications, 2015

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wireless Personal Communications, 2015

A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
Security and Communication Networks, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2015

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks.
Comput. Electr. Eng., 2015

2014
A novel user authentication scheme with anonymity for wireless communications.
Security and Communication Networks, 2014

Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Security and Communication Networks, 2014

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Security and Communication Networks, 2014

A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC.
KSII Trans. Internet Inf. Syst., 2014

Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings.
Int. J. Distributed Sens. Networks, 2014

Robust dynamic ID-based remote user authentication scheme using smart cards.
Int. J. Ad Hoc Ubiquitous Comput., 2014

An improved remote user authentication scheme with key agreement.
Comput. Electr. Eng., 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A secure remote user mutual authentication scheme using smart cards.
Proceedings of the IEEE Computers, 2014

2013
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.
Math. Comput. Model., 2013

Improvement of trace-driven I-Cache timing attack on the RSA algorithm.
J. Syst. Softw., 2013

An enhanced smart card based remote user password authentication scheme.
J. Netw. Comput. Appl., 2013

Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards.
J. Netw. Comput. Appl., 2012

2011
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards.
J. Netw. Comput. Appl., 2011


  Loading...