Search Results - "Li, Fagen"
-
1
A Blockchain-Based Medical Data Sharing and Protection Scheme
Published in IEEE access (2019)“…Electronic health record (EHR) has recorded the process of occurrence, development, and treatment of diseases. So it has high medical value. Owing to the…”
Get full text
Journal Article -
2
Efficient Certificateless Access Control for Wireless Body Area Networks
Published in IEEE sensors journal (01-07-2016)“…Wireless body area networks (WBANs) are expected to act as an important role in monitoring the health information and creating a highly reliable ubiquitous…”
Get full text
Journal Article -
3
Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things
Published in IEEE sensors journal (01-10-2013)“…If a wireless sensor network (WSN) is integrated into the Internet as a part of the Internet of things (IoT), there will appear new security challenges, such…”
Get full text
Journal Article -
4
Cost-Effective and Anonymous Access Control for Wireless Body Area Networks
Published in IEEE systems journal (01-03-2018)“…Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, and ubiquitous…”
Get full text
Journal Article -
5
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs
Published in IEEE transactions on vehicular technology (01-10-2020)“…Vehicular ad hoc networks (VANETs) ensure improvement in road safety and traffic management by allowing the vehicles and infrastructure that are connected to…”
Get full text
Journal Article -
6
Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles
Published in IEEE transactions on vehicular technology (01-05-2023)“…The emergence of the vehicular ad-hoc network (VANETs) could meet the need for an efficient and safe transportation. Vehicles wirelessly interact with nearby…”
Get full text
Journal Article -
7
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
Published in IEEE transactions on cloud computing (01-01-2023)“…In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and…”
Get full text
Journal Article -
8
A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles
Published in IEEE internet of things journal (01-10-2022)“…During the past few years, as Internet of Things develops rapidly, the applications of unmanned aerial vehicle (UAV) technology have been increasingly widely…”
Get full text
Journal Article -
9
A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things
Published in IEEE internet of things journal (01-02-2022)“…With the rapid development of Internet of Things (IoT) in recent years, the security of IoT becomes more and more prominent. To protect data privacy and device…”
Get full text
Journal Article -
10
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
Published in Mobile networks and applications (01-02-2020)“…Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via…”
Get full text
Journal Article -
11
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing
Published in Sensors (Basel, Switzerland) (21-08-2020)“…With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with…”
Get full text
Journal Article -
12
Certificateless authenticated key agreement for blockchain-based WBANs
Published in Journal of systems architecture (01-11-2020)“…Authenticated key agreement (AKA) enables communicating parties to mutually establish a session key, in a way that each entity is assured of the authentication…”
Get full text
Journal Article -
13
An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks
Published in Journal of medical systems (01-08-2018)“…Wireless body area networks (WBANs) comprises a number of sensor nodes and the portable mobile device such as smartphone. It is used to monitor the physical…”
Get full text
Journal Article -
14
Efficient Deniably Authenticated Encryption and Its Application to E-Mail
Published in IEEE transactions on information forensics and security (01-11-2016)“…Confidentiality and authentication are two main security goals in secure electronic mail (e-mail). Pretty good privacy (PGP) and secure/multipurpose internet…”
Get full text
Journal Article -
15
Bell state-based semi-quantum signature scheme with arbitrator
Published in Optical and quantum electronics (2024)“…Semi-quantum signature is an important research topic in quantum cryptography. Based on the Bell states, a semi-quantum signature scheme with arbitrator is…”
Get full text
Journal Article -
16
Correction to: Bell state-based semi-quantum signature scheme with arbitrator
Published in Optical and quantum electronics (2024)Get full text
Journal Article -
17
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information
Published in Quantum information processing (01-08-2020)“…Based on the quantum asymmetric encryption with trapdoor information, a quantum public-key signature scheme is proposed. In our scheme, the signer signs a…”
Get full text
Journal Article -
18
Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid
Published in IEEE internet of things journal (01-12-2019)“…Smart grid utilizes intelligent metering and other monitoring devices that frequently collect and send a customer's usage report of energy consumption to an…”
Get full text
Journal Article -
19
Efficient Signcryption for Heterogeneous Systems
Published in IEEE systems journal (01-09-2013)“…Privacy and authentication are the two main security goals in secure communications. To solve the secure communications problem between two heterogeneous…”
Get full text
Journal Article -
20
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services
Published in IEEE transactions on cloud computing (01-10-2022)“…In the last few years, mobile cloud computing (MCC) gains a huge development because of the popularity of mobile applications and cloud computing. User…”
Get full text
Journal Article