-
1
-
-
84893539927
-
Secure pervasive social networking based on multi-dimensional trust levels
-
Oct.
-
Z. Yan, M. Wang, V. Niemi, and R. Kantola, "Secure pervasive social networking based on multi-dimensional trust levels, " in Proc. IEEE CNS, Oct. 2013, pp. 100-108.
-
(2013)
Proc. IEEE CNS
, pp. 100-108
-
-
Yan, Z.1
Wang, M.2
Niemi, V.3
Kantola, R.4
-
2
-
-
84963972157
-
Stochastic Petri net-based performance evaluation of hybrid Traffic for social networks system
-
Sep.
-
L. Li, W. Zeng, Z. Hong, and L. Zhou, "Stochastic Petri net-based performance evaluation of hybrid Traffic for social networks system, " Neurocom-puting, vol. 204, pp. 3-7, Sep. 2016.
-
(2016)
Neurocom-puting
, vol.204
, pp. 3-7
-
-
Li, L.1
Zeng, W.2
Hong, Z.3
Zhou, L.4
-
3
-
-
84944678235
-
An adaptive sensor data segments selection method for wearable health care services
-
S.-Y. Chen, C.-F. Lai, R.-H. Hwang, Y.-H. Lai, and M.-S. Wang, "An adaptive sensor data segments selection method for wearable health care services, " J. Med. Syst., vol. 39, no. 12, pp. 1-11, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.12
, pp. 1-11
-
-
Chen, S.-Y.1
Lai, C.-F.2
Hwang, R.-H.3
Lai, Y.-H.4
Wang, M.-S.5
-
4
-
-
84954436216
-
Aprivacy preserving threefactor authentication protocol for e-health clouds
-
Oct.
-
Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, "Aprivacy preserving threefactor authentication protocol for e-health clouds, " J. Supercomputing, vol. 72, no. 10, pp. 3826-3849, Oct. 2016.
-
(2016)
J. Supercomputing
, vol.72
, Issue.10
, pp. 3826-3849
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
5
-
-
84976428104
-
Securing SIFT: Privacypreserving outsourcing computation of feature extractions over encrypted image data
-
Jul.
-
S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing SIFT: Privacypreserving outsourcing computation of feature extractions over encrypted image data, " IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, Jul. 2016.
-
(2016)
IEEE Trans. Image Process.
, vol.25
, Issue.7
, pp. 3411-3425
-
-
Hu, S.1
Wang, Q.2
Wang, J.3
Qin, Z.4
Ren, K.5
-
6
-
-
84919877646
-
PerContRep: A practical reputation system for pervasive content services
-
Dec.
-
Z. Yan, Y. Chen, and Y. Shen, "PerContRep: A practical reputation system for pervasive content services, " J. Supercomput., vol. 70, no. 3, pp. 1051-1074, Dec. 2014.
-
(2014)
J. Supercomput.
, vol.70
, Issue.3
, pp. 1051-1074
-
-
Yan, Z.1
Chen, Y.2
Shen, Y.3
-
7
-
-
78651281054
-
Enabling social networking in ad hoc networks of mobile phones
-
Aug.
-
E. Sarigöl, O. Riva, P. Stuedi, and G. Alonso, "Enabling social networking in ad hoc networks of mobile phones, " Proc. VLDB Endowment, vol. 2, no. 2, pp. 1634-1637, Aug. 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.2
, pp. 1634-1637
-
-
Sarigöl, E.1
Riva, O.2
Stuedi, P.3
Alonso, G.4
-
8
-
-
84926443026
-
Performance comparison of typical routing protocols in ad-hoc networks
-
J. Shen, C. Wang, A. Wang, L. Li, Y. Yang, and J. Wang, "Performance comparison of typical routing protocols in ad-hoc networks, " in Proc. Int. Comput. Symp. (ICS), 2015, pp. 463-473.
-
(2015)
Proc. Int. Comput. Symp. (ICS)
, pp. 463-473
-
-
Shen, J.1
Wang, C.2
Wang, A.3
Li, L.4
Yang, Y.5
Wang, J.6
-
9
-
-
0031743760
-
The evolution of trust and cooperation between strangers: A computational model
-
Oct.
-
M. W. Macy and J. Skvoretz, "The evolution of trust and cooperation between strangers: A computational model, " Amer. Sociol. Rev., vol. 63, no. 5, pp. 638-660, Oct. 1998.
-
(1998)
Amer. Sociol. Rev.
, vol.63
, Issue.5
, pp. 638-660
-
-
Macy, M.W.1
Skvoretz, J.2
-
10
-
-
84875211673
-
A practical reputation system for pervasive social chatting
-
Aug.
-
Z. Yan, Y. Chen, and Y. Shen, "A practical reputation system for pervasive social chatting, " J. Comput. Syst. Sci., vol. 79, no. 5, pp. 556-572, Aug. 2013.
-
(2013)
J. Comput. Syst. Sci.
, vol.79
, Issue.5
, pp. 556-572
-
-
Yan, Z.1
Chen, Y.2
Shen, Y.3
-
11
-
-
85018509351
-
Protect pervasive social networking based on twodimensional trust levels
-
to be published
-
Z. Yan and M. Wang, "Protect pervasive social networking based on twodimensional trust levels, " IEEE Syst. J., to be published.
-
IEEE Syst. J.
-
-
Yan, Z.1
Wang, M.2
-
14
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, "A novel routing protocol providing good transmission reliability in underwater sensor networks, " J. Internet Technol., vol. 16, no. 1, pp. 171-178, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.1
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Wang, J.4
Lee, S.5
-
15
-
-
70849109966
-
Solutions to security and privacy issues in mobile social networking
-
Aug.
-
A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking, " in Proc. Int. Conf. Comput. Sci. Eng., Aug. 2009, pp. 1036-1042.
-
(2009)
Proc. Int. Conf. Comput. Sci. Eng.
, pp. 1036-1042
-
-
Beach, A.1
Gartrell, M.2
Han, R.3
-
16
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
Aug.
-
N. Sadeh et al., "Understanding and capturing people's privacy policies in a mobile social networking application, " Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 401-412, Aug. 2009.
-
(2009)
Pers. Ubiquitous Comput.
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
-
17
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application
-
Nov.
-
E. Miluzzo et al., "Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application, " in Proc. ACM Conf. Embedded Netw. Sensor Syst., Nov. 2008, pp. 337-350.
-
(2008)
Proc. ACM Conf. Embedded Netw. Sensor Syst.
, pp. 337-350
-
-
Miluzzo, E.1
-
18
-
-
84973560504
-
An efficient RFID authentication protocol providing strong privacy and security
-
J. Shen, H. Tan, S. Moh, I. Chung, and J. Wang, "An efficient RFID authentication protocol providing strong privacy and security, " J. Internet Technol., vol. 17, no. 3, p. 2, 2016.
-
(2016)
J. Internet Technol.
, vol.17
, Issue.3
, pp. 2
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Wang, J.5
-
19
-
-
84923405290
-
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
-
Oct.
-
X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, "A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, " Secur. Commun. Netw., vol. 9, no. 15, pp. 2643-2655, Oct. 2015.
-
(2015)
Secur. Commun. Netw.
, vol.9
, Issue.15
, pp. 2643-2655
-
-
Li, X.1
Niu, J.2
Kumari, S.3
Liao, J.4
Liang, W.5
Khan, M.K.6
-
20
-
-
84963715652
-
A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security
-
Jul.
-
X. Li et al., "A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security, " Wireless Pers. Commun., vol. 89, no. 2, pp. 569-597, Jul. 2016.
-
(2016)
Wireless Pers. Commun.
, vol.89
, Issue.2
, pp. 569-597
-
-
Li, X.1
-
21
-
-
85008263167
-
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
-
Dec.
-
Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, "An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks, " J. Netw. Comput. Appl., vol. 76, pp. 37-48, Dec. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.76
, pp. 37-48
-
-
Jiang, Q.1
Ma, J.2
Wei, F.3
Tian, Y.4
Shen, J.5
Yang, Y.6
-
22
-
-
84971667845
-
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems
-
Jun.
-
X. Li, K. Wang, J. Shen, S. Kumari, F. Wu, and Y. Hu, "An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems, " J. Ambient Intell. Humanized Comput., vol. 7, no. 3, pp. 427-443, Jun. 2016.
-
(2016)
J. Ambient Intell. Humanized Comput.
, vol.7
, Issue.3
, pp. 427-443
-
-
Li, X.1
Wang, K.2
Shen, J.3
Kumari, S.4
Wu, F.5
Hu, Y.6
-
23
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Mar.
-
Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, and A. Alelaiwi, "Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy, " Nonlinear Dyn., vol. 83, no. 4, pp. 2085-2101, Mar. 2016.
-
(2016)
Nonlinear Dyn.
, vol.83
, Issue.4
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
24
-
-
84963682665
-
One-to-many authentication for access control in mobile pay-TV systems
-
D. He, N. Kumar, H. Shen, and J. Lee, "One-to-many authentication for access control in mobile pay-TV systems, " Sci. China Inf. Sci., vol. 59, no. 5, pp. 1-14, 2016, doi: 10. 1007/s11432-015-5469-5.
-
(2016)
Sci. China Inf. Sci.
, vol.59
, Issue.5
, pp. 1-14
-
-
He, D.1
Kumar, N.2
Shen, H.3
Lee, J.4
-
25
-
-
60649103574
-
Trust management for ubiquitous healthcare
-
Dec.
-
W. Yuan, D. Guan, and S. Lee, "Trust management for ubiquitous healthcare, " in Proc. Int. Symp. Parallel Distrib. Process. Appl. (ISPA), Dec. 2008, pp. 63-70.
-
(2008)
Proc. Int. Symp. Parallel Distrib. Process. Appl. (ISPA)
, pp. 63-70
-
-
Yuan, W.1
Guan, D.2
Lee, S.3
-
26
-
-
84876983088
-
-
New York, NY, USA: Springer
-
Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jensen, Trust Manage-ment II. New York, NY, USA: Springer, 2008.
-
(2008)
Trust Manage-ment II
-
-
Karabulut, Y.1
Mitchell, J.2
Herrmann, P.3
Jensen, C.D.4
-
27
-
-
49149112974
-
MyNet: A platform for secure P2P personal and social networking services
-
Mar.
-
D. N. Kalofonos, Z. Antoniou, F. D. Reynolds, and M. Van-Kleek, "MyNet: A platform for secure P2P personal and social networking services, " in Proc. 6th Annu. IEEE Int. Conf. Pervasive Comput. Commun. (PerCom), Mar. 2008, pp. 135-146.
-
(2008)
Proc. 6th Annu. IEEE Int. Conf. Pervasive Comput. Commun. (PerCom)
, pp. 135-146
-
-
Kalofonos, D.N.1
Antoniou, Z.2
Reynolds, F.D.3
Van-Kleek, M.4
-
29
-
-
84890369044
-
An efficient verifiably encrypted signature from weil pairing an efficient verifiably encrypted signature from weil pairing
-
J. Shen, W. Zheng, J. Wang, Y. Zheng, X. Sun, and S. Lee, "An efficient verifiably encrypted signature from weil pairing an efficient verifiably encrypted signature from weil pairing, " J. Internet Technol., vol. 14, no. 6, pp. 947-952, 2013.
-
(2013)
J. Internet Technol.
, vol.14
, Issue.6
, pp. 947-952
-
-
Shen, J.1
Zheng, W.2
Wang, J.3
Zheng, Y.4
Sun, X.5
Lee, S.6
-
30
-
-
84984791521
-
A provably secure Certificate-based encryption scheme against malicious CA attacks in the standard model
-
Dec.
-
Y. Lu and J. Li, "A provably secure Certificate-based encryption scheme against malicious CA attacks in the standard model, " Inf. Sci., vol. 372, pp. 745-757, Dec. 2016.
-
(2016)
Inf. Sci.
, vol.372
, pp. 745-757
-
-
Lu, Y.1
Li, J.2
-
31
-
-
85018467045
-
A secure identity-based dynamic group data sharing scheme for cloud computing
-
J. Shen, D.-Z. Liu, C.-F. Lai, Y.-J. Ren, and X.-M. Sun, "A secure identity-based dynamic group data sharing scheme for cloud computing, " J. Internet Technol., vol. 99, no. 99, pp. 1-9, 2015.
-
(2015)
J. Internet Technol.
, vol.99
, Issue.99
, pp. 1-9
-
-
Shen, J.1
Liu, D.-Z.2
Lai, C.-F.3
Ren, Y.-J.4
Sun, X.-M.5
-
32
-
-
84893719831
-
Identitybased chameleon hashing and signatures without key exposure
-
May
-
X. Chen, F. Zhang, W. Susilo, H. Tian, J. Li, and K. Kim, "Identitybased chameleon hashing and signatures without key exposure, " Inf. Sci., vol. 265, no. 5, pp. 198-210, May 2014.
-
(2014)
Inf. Sci.
, vol.265
, Issue.5
, pp. 198-210
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Tian, H.4
Li, J.5
Kim, K.6
-
33
-
-
33646516197
-
The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design
-
Aug.
-
O. Lee, S. Yoo, B. Park, and I. Chung, "The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design, " Inf. Sci., vol. 176, no. 15, pp. 2148-2160, Aug. 2006.
-
(2006)
Inf. Sci.
, vol.176
, Issue.15
, pp. 2148-2160
-
-
Lee, O.1
Yoo, S.2
Park, B.3
Chung, I.4
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
35
-
-
84872875967
-
Identity-based key agreement protocol employing a symmetric balanced incomplete block design
-
Dec.
-
J. Shen, S. Moh, and I. Chung, "Identity-based key agreement protocol employing a symmetric balanced incomplete block design, " J. Commun. Netw., vol. 14, no. 6, pp. 682-691, Dec. 2012.
-
(2012)
J. Commun. Netw.
, vol.14
, Issue.6
, pp. 682-691
-
-
Shen, J.1
Moh, S.2
Chung, I.3
-
36
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " SIAM J. Comput., vol. 32, no. 3, pp. 213-229, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
38
-
-
85018526494
-
-
Berlin, Germany: Springer
-
J. Li, H. Teng, X. Huang, Y. Zhang, and J. Zhou, A Forward-Secure Certificate-Based Signature Scheme. Berlin, Germany: Springer, 2015.
-
(2015)
A Forward-Secure Certificate-Based Signature Scheme
-
-
Li, J.1
Teng, H.2
Huang, X.3
Zhang, Y.4
Zhou, J.5
-
39
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
Apr.
-
G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols, " IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 628-639, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
40
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage, " J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
|