Xiong Li

According to our database1, Xiong Li authored at least 88 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommunication Systems, 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Security and Communication Networks, 2018

An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Networking and Applications, 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multimedia Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multimedia Tools Appl., 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Network and Computer Applications, 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intelligence and Humanized Computing, 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intelligence and Humanized Computing, 2018

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet of Things Journal, 2018

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Generation Comp. Syst., 2018

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Generation Comp. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Generation Comp. Syst., 2018

A secure chaotic map-based remote authentication scheme for telecare medicine information systems.
Future Generation Comp. Syst., 2018

Design and implementation of a multibiometric system based on hand's traits.
Expert Syst. Appl., 2018

Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation.
Computer Communications, 2018

Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices.
IEEE Consumer Electronics Magazine, 2018

A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion.
Computers & Electrical Engineering, 2018

Verifiable keyword search over encrypted cloud data in smart city.
Computers & Electrical Engineering, 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Computers & Electrical Engineering, 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Computers & Electrical Engineering, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

Secure Data Access and Sharing Scheme for Cloud Storage.
Wireless Personal Communications, 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wireless Personal Communications, 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Personal and Ubiquitous Computing, 2017

A new and secure authentication scheme for wireless sensor networks with formal proof.
Peer-to-Peer Networking and Applications, 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Networking and Applications, 2017

A password based authentication scheme for wireless multimedia systems.
Multimedia Tools Appl., 2017

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
Multimedia Syst., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Network and Computer Applications, 2017

Wireless and Mobile Networks: Security and Privacy Issues.
J. Electrical and Computer Engineering, 2017

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
J. Ambient Intelligence and Humanized Computing, 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
IJSNet, 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Generation Comp. Syst., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Computer Networks, 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Computers & Electrical Engineering, 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Computers & Electrical Engineering, 2017

Medical image classification based on multi-scale non-negative sparse coding.
Artificial Intelligence in Medicine, 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Annales des Télécommunications, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wireless Personal Communications, 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Security and Communication Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Security and Communication Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Security and Communication Networks, 2016

Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Security and Communication Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Security and Communication Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Security and Communication Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Security and Communication Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Security and Communication Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Security and Communication Networks, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multimedia Tools Appl., 2016

A more secure digital rights management authentication scheme based on smart card.
Multimedia Tools Appl., 2016

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Systems, 2016

An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intelligence and Humanized Computing, 2016

A User Anonymous Mutual Authentication Protocol.
TIIS, 2016

Design of a user anonymous password authentication scheme without smart card.
Int. J. Communication Systems, 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Generation Comp. Syst., 2016

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wireless Personal Communications, 2015

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wireless Personal Communications, 2015

A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
Security and Communication Networks, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Systems, 2015

Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Communication Systems, 2015

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks.
Computers & Electrical Engineering, 2015

2014
A novel user authentication scheme with anonymity for wireless communications.
Security and Communication Networks, 2014

Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Security and Communication Networks, 2014

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Security and Communication Networks, 2014

A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC.
TIIS, 2014

Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings.
IJDSN, 2014

Robust dynamic ID-based remote user authentication scheme using smart cards.
IJAHUC, 2014

An improved remote user authentication scheme with key agreement.
Computers & Electrical Engineering, 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A secure remote user mutual authentication scheme using smart cards.
Proceedings of the IEEE Computers, 2014

2013
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.
Mathematical and Computer Modelling, 2013

Improvement of trace-driven I-Cache timing attack on the RSA algorithm.
Journal of Systems and Software, 2013

An enhanced smart card based remote user password authentication scheme.
J. Network and Computer Applications, 2013

Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards.
J. Network and Computer Applications, 2012

2011
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards.
J. Network and Computer Applications, 2011


  Loading...