Search Results - "Yin, Xinchun"
-
1
ER-CGKA: Efficient and robust continuous group key agreement scheme with post-compromise forward security for IoV
Published in PloS one (29-08-2024)“…The Internet of Vehicles (IoV) counts for much in advancing intelligent transportation by connecting people, vehicles, infrastructures, and cloud servers (CS)…”
Get full text
Journal Article -
2
An improved pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks
Published in PloS one (11-07-2022)“…In healthcare wireless medical sensor networks (HWMSNs), the medical sensor nodes are employed to collect medical data which is transmitted to doctors for…”
Get full text
Journal Article -
3
Blockchain-based group key agreement protocol for vehicular ad hoc networks
Published in Computer communications (01-02-2022)“…Vehicular ad hoc network (VANET) has been attracting widespread attention because of its ability to improve traffic efficiency and safety. Since insecure…”
Get full text
Journal Article -
4
Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud
Published in IEEE transactions on intelligent transportation systems (01-02-2023)“…Vehicular ad hoc network (VANET) is an emerging technology that can significantly improve the efficiency of transportation systems and mitigate traffic…”
Get full text
Journal Article -
5
RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks
Published in IEEE internet of things journal (01-12-2023)“…Vehicular ad hoc network (VANET) enables a more efficient and secure traffic environment by integrating several emerging technologies. The technology of…”
Get full text
Journal Article -
6
An improved pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks
Published in PloS one (01-01-2022)“…In healthcare wireless medical sensor networks (HWMSNs), the medical sensor nodes are employed to collect medical data which is transmitted to doctors for…”
Get full text
Journal Article -
7
A fine‐grained and secure health data sharing scheme based on blockchain
Published in Transactions on emerging telecommunications technologies (01-09-2022)“…Electronic health record (EHR) allows patients to use an open channel (ie, Internet) to control, share and manage their health records among family members,…”
Get full text
Journal Article -
8
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model
Published in IEEE internet of things journal (15-03-2024)“…Due to the advent of healthcare wireless medical sensor networks (HWMSNs) technology, the traditional model of medical treatment has been transformed. In…”
Get full text
Journal Article -
9
A distributed approach inspired by membrane computing for optimizing bijective S-boxes
Published in 2008 27th Chinese Control Conference (01-07-2008)“…S-boxes are the only nonlinear component in most cryptographic algorithms, which determine the security strength of the whole symmetric ciphers algorithm. In…”
Get full text
Conference Proceeding -
10
LORP: A Load-Balancing Based Optimal Routing Protocol for Sensor Networks with Bottlenecks
Published in 2009 IEEE Wireless Communications and Networking Conference (01-04-2009)“…The performance of wireless sensor networks (WSNs) is tightly coupled with the geometric environment in which sensors are deployed. In a practical environment,…”
Get full text
Conference Proceeding -
11
A new forward-secure signature scheme
Published in 2008 27th Chinese Control Conference (01-07-2008)“…Elliptic curve cryptosystem is an efficient public key cryptosystem. Recently the bilinear pairing such as the Weil pairing or the Tate pairing on elliptic…”
Get full text
Conference Proceeding -
12
Fine-Grained Task Access Control System for Mobile Crowdsensing
Published in Security and communication networks (04-02-2021)“…Mobile crowdsensing enables people to collect and process a massive amount of information by using social resources without any cost on sensor deployment or…”
Get full text
Journal Article -
13
Secure Updatable Storage Access Control System for EHRs in the Cloud
Published in IEEE transactions on services computing (01-07-2023)“…With an increasing number of IoT devices being deployed in healthcare, massive amounts of electronic health records (EHRs) are generated and shared in the…”
Get full text
Journal Article -
14
Genetic Algorithm-Based Approaches for Optimizing S-Boxes
Published in Wuhan University journal of natural sciences (2007)“…Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes…”
Get full text
Journal Article -
15
Performance modeling and evaluating workflow of ITS: real-time positioning and route planning
Published in Multimedia tools and applications (01-05-2018)“…Intelligent Traffic Systems (ITS), as integrated systems including control technologies, communication technologies, vehicle sensing and vehicle electronic…”
Get full text
Journal Article -
16
Lightweight authentication scheme with inverse operation on passive RFID tags
Published in Journal of the Chinese Institute of Engineers (02-01-2019)Get full text
Journal Article -
17
A parallel base point choosing algorithm of ECC on binary field
Published in 2012 International Conference on Systems and Informatics (ICSAI2012) (01-05-2012)“…In the elliptic curve cryptosystem, the suitability of base point plays an important role in the security of an elliptic curve selected. This paper firstly…”
Get full text
Conference Proceeding -
18
Lightweight searchable medical data sharing scheme
Published in Tongxin Xuebao (01-05-2022)“…The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the…”
Get full text
Journal Article -
19
Optimized Approach for Computing Multi-base Chains
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01-12-2011)“…As a generalization of double base chains, multi-base number system were very suitable for efficient computation of scalar multiplications of elliptic curves…”
Get full text
Conference Proceeding -
20
A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01-12-2011)“…Security key management is the most basic requirement for wireless sensor networks security. In this paper, we propose a dynamic key management scheme for…”
Get full text
Conference Proceeding