Search Results - "Li, Fagen"

Refine Results
  1. 1

    A Blockchain-Based Medical Data Sharing and Protection Scheme by Liu, Xiaoguang, Wang, Ziqing, Jin, Chunhua, Li, Fagen, Li, Gaoping

    Published in IEEE access (2019)
    “…Electronic health record (EHR) has recorded the process of occurrence, development, and treatment of diseases. So it has high medical value. Owing to the…”
    Get full text
    Journal Article
  2. 2

    Efficient Certificateless Access Control for Wireless Body Area Networks by Li, Fagen, Hong, Jiaojiao

    Published in IEEE sensors journal (01-07-2016)
    “…Wireless body area networks (WBANs) are expected to act as an important role in monitoring the health information and creating a highly reliable ubiquitous…”
    Get full text
    Journal Article
  3. 3

    Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things by Li, Fagen, Xiong, Pan

    Published in IEEE sensors journal (01-10-2013)
    “…If a wireless sensor network (WSN) is integrated into the Internet as a part of the Internet of things (IoT), there will appear new security challenges, such…”
    Get full text
    Journal Article
  4. 4

    Cost-Effective and Anonymous Access Control for Wireless Body Area Networks by Li, Fagen, Han, Yanan, Jin, Chunhua

    Published in IEEE systems journal (01-03-2018)
    “…Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, and ubiquitous…”
    Get full text
    Journal Article
  5. 5

    An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs by Ali, Ikram, Lawrence, Tandoh, Omala, Anyembe Andrew, Li, Fagen

    Published in IEEE transactions on vehicular technology (01-10-2020)
    “…Vehicular ad hoc networks (VANETs) ensure improvement in road safety and traffic management by allowing the vehicles and infrastructure that are connected to…”
    Get full text
    Journal Article
  6. 6

    Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles by Xie, Zhan, Chen, Yong, Ali, Ikram, Pan, Chengwei, Li, Fagen, He, Wen

    Published in IEEE transactions on vehicular technology (01-05-2023)
    “…The emergence of the vehicular ad-hoc network (VANETs) could meet the need for an efficient and safe transportation. Vehicles wirelessly interact with nearby…”
    Get full text
    Journal Article
  7. 7

    Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage by Zhou, Yuyang, Hu, Zhebin, Li, Fagen

    Published in IEEE transactions on cloud computing (01-01-2023)
    “…In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and…”
    Get full text
    Journal Article
  8. 8

    A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles by Pan, Xiangyu, Jin, Yuqiao, Wang, Ziqing, Li, Fagen

    Published in IEEE internet of things journal (01-10-2022)
    “…During the past few years, as Internet of Things develops rapidly, the applications of unmanned aerial vehicle (UAV) technology have been increasingly widely…”
    Get full text
    Journal Article
  9. 9

    A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things by Ding, Xuyang, Wang, Xiaoxiang, Xie, Ying, Li, Fagen

    Published in IEEE internet of things journal (01-02-2022)
    “…With the rapid development of Internet of Things (IoT) in recent years, the security of IoT becomes more and more prominent. To protect data privacy and device…”
    Get full text
    Journal Article
  10. 10

    IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks by Ramadan, Mohammed, Liao, Yongjian, Li, Fagen, Zhou, Shijie, Abdalla, Hisham

    Published in Mobile networks and applications (01-02-2020)
    “…Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via…”
    Get full text
    Journal Article
  11. 11

    A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing by Li, Haifeng, Lan, Caihui, Fu, Xingbing, Wang, Caifen, Li, Fagen, Guo, He

    Published in Sensors (Basel, Switzerland) (21-08-2020)
    “…With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with…”
    Get full text
    Journal Article
  12. 12

    Certificateless authenticated key agreement for blockchain-based WBANs by Mwitende, Gervais, Ye, Yalan, Ali, Ikram, Li, Fagen

    Published in Journal of systems architecture (01-11-2020)
    “…Authenticated key agreement (AKA) enables communicating parties to mutually establish a session key, in a way that each entity is assured of the authentication…”
    Get full text
    Journal Article
  13. 13

    An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks by Liu, Xiaoguang, Jin, Chunhua, Li, Fagen

    Published in Journal of medical systems (01-08-2018)
    “…Wireless body area networks (WBANs) comprises a number of sensor nodes and the portable mobile device such as smartphone. It is used to monitor the physical…”
    Get full text
    Journal Article
  14. 14

    Efficient Deniably Authenticated Encryption and Its Application to E-Mail by Fagen Li, Di Zhong, Takagi, Tsuyoshi

    “…Confidentiality and authentication are two main security goals in secure electronic mail (e-mail). Pretty good privacy (PGP) and secure/multipurpose internet…”
    Get full text
    Journal Article
  15. 15

    Bell state-based semi-quantum signature scheme with arbitrator by Zhang, Tianyuan, Xin, Xiangjun, Jiang, Bohao, Li, Chaoyang, Li, Fagen

    Published in Optical and quantum electronics (2024)
    “…Semi-quantum signature is an important research topic in quantum cryptography. Based on the Bell states, a semi-quantum signature scheme with arbitrator is…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information by Xin, Xiangjun, Yang, Qinglan, Li, Fagen

    Published in Quantum information processing (01-08-2020)
    “…Based on the quantum asymmetric encryption with trapdoor information, a quantum public-key signature scheme is proposed. In our scheme, the signer signs a…”
    Get full text
    Journal Article
  18. 18

    Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid by Ahene, Emmanuel, Qin, Zhangchi, Adusei, Akua Konadu, Li, Fagen

    Published in IEEE internet of things journal (01-12-2019)
    “…Smart grid utilizes intelligent metering and other monitoring devices that frequently collect and send a customer's usage report of energy consumption to an…”
    Get full text
    Journal Article
  19. 19

    Efficient Signcryption for Heterogeneous Systems by Fagen Li, Hui Zhang, Takagi, Tsuyoshi

    Published in IEEE systems journal (01-09-2013)
    “…Privacy and authentication are the two main security goals in secure communications. To solve the secure communications problem between two heterogeneous…”
    Get full text
    Journal Article
  20. 20

    An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services by Xiong, Ling, Li, Fagen, He, Mingxing, Liu, Zhicai, Peng, Tu

    Published in IEEE transactions on cloud computing (01-10-2022)
    “…In the last few years, mobile cloud computing (MCC) gains a huge development because of the popularity of mobile applications and cloud computing. User…”
    Get full text
    Journal Article