default search action
Jian Shen 0001
Person information
- affiliation: Nanjing University of Information Science and Technology, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, China
- affiliation (PhD 2012): Chosun University, South Korea
Other persons with the same name
- Jian Shen — disambiguation page
- Jian Shen 0002 — University of Science and Technology of China, Department of Electronic Engineering and Information Science, Hefei, China (and 1 more)
- Jian Shen 0003 — Shanghai Jiao Tong University, APEX Data and Knowledge Management Lab, China
- Jian Shen 0004 — Lanzhou University, Gansu Provincial Key Laboratory of Wearable Computing, China (and 1 more)
- Jian Shen 0005 — Texas State University, San Marcos, Department of Mathematics, TX, USA
Other persons with a similar name
- Ming-Shen Jian
- Shen Jian
- Bin-jian Shen
- Jian-Kun Shen
- Jian-Ping Shen
- Jian-Xiang Shen
- Jian-Xin Shen
- Jian-jing Shen
- Jian-jun Shen
- Jianshe Yu (aka: Jian-Shen Yu) — Guangzhou University, College of Mathematics and Information Science, Guangzhou, China (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j188]Kui Zhu, Yongjun Ren, Jian Shen, Pandi Vijayakumar, Pradip Kumar Sharma:
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs. Digit. Commun. Networks 10(1): 142-149 (2024) - [j187]Qi Feng, Debiao He, Jian Shen, Min Luo, Kim-Kwang Raymond Choo:
PpNNT: Multiparty Privacy-Preserving Neural Network Training System. IEEE Trans. Artif. Intell. 5(1): 370-383 (2024) - [j186]Tao Zhang, Jian Shen, Huijie Yang, Pandi Vijayakumar, Brij B. Gupta, Varsha Arya:
Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0. IEEE Trans. Consumer Electron. 70(1): 1580-1589 (2024) - [j185]Yi Li, Jian Shen, Pandi Vijayakumar, Chin-Feng Lai, Audithan Sivaraman, Pradip Kumar Sharma:
Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning. IEEE Trans. Consumer Electron. 70(1): 2244-2256 (2024) - [j184]Jianfeng Zong, Chen Wang, Jian Shen, Chunhua Su, Weizheng Wang:
ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 3994-4004 (2024) - [j183]Yi Li, Jian Shen, Sai Ji, Ying-Hsun Lai:
Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud-Edge Computing Environment. IEEE Trans. Engineering Management 71: 12556-12565 (2024) - [j182]Fanliang Hu, Jian Shen, Pandi Vijayakumar:
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder. IEEE Trans. Inf. Forensics Secur. 19: 2051-2065 (2024) - [j181]Chen Li, Jianting Ning, Shengmin Xu, Chao Lin, Jiguo Li, Jian Shen:
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing. IEEE Trans. Inf. Forensics Secur. 19: 7744-7758 (2024) - [j180]Chengzhi Yan, Chen Wang, Jian Shen, Kapal Dev, Mohsen Guizani, Weizheng Wang:
Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs. IEEE Trans. Veh. Technol. 73(1): 1253-1262 (2024) - 2023
- [j179]Chen Wang, Tianqi Zhou, Jian Shen, Weizheng Wang, Xiaokang Zhou:
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems. Future Gener. Comput. Syst. 140: 129-137 (2023) - [j178]Tao Zhang, Jian Shen, Chin-Feng Lai, Sai Ji, Yongjun Ren:
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems. Future Gener. Comput. Syst. 140: 299-310 (2023) - [j177]Ying Tian, Haowen Tan, Jian Shen, Pandi Vijayakumar, Brij B. Gupta, Varsha Arya:
Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management. Inf. Sci. 644: 119255 (2023) - [j176]Qihong Yu, Jiguo Li, Jian Shen:
ID-Based Ring Signature against Continual Side Channel Attack. Symmetry 15(1): 179 (2023) - [j175]Mingwu Zhang, Shijin Chen, Jian Shen, Willy Susilo:
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 18: 5804-5816 (2023) - [j174]Zhiyan Xu, Debiao He, Pandi Vijayakumar, Brij B. Gupta, Jian Shen:
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs. IEEE J. Biomed. Health Informatics 27(5): 2334-2344 (2023) - [j173]Chen Wang, Jian Shen, Pandi Vijayakumar, Brij B. Gupta:
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2608-2617 (2023) - [j172]Zhaozhe Kang, Jiguo Li, Jian Shen, Jinguang Han, Yuting Zuo, Yichen Zhang:
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size. IEEE Trans. Knowl. Data Eng. 35(9): 9514-9530 (2023) - [j171]Jian Shen, Tao Zhang, Yi Jiang, Tianqi Zhou, Tiantian Miao:
A Novel Key Agreement Protocol Applying Latin Square for Cloud Data Sharing. IEEE Trans. Sustain. Comput. 8(4): 639-651 (2023) - [c52]Congcong Wang, Chen Wang, Jian Shen, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan:
Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids. DASC/PiCom/CBDCom/CyberSciTech 2023: 643-650 - [c51]Tianqi Zhou, Jian Shen, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, Sivaraman Audithan:
Anonymous Authentication Scheme for Federated Learning. INFOCOM Workshops 2023: 1-6 - 2022
- [j170]Huijie Yang, Pandi Vijayakumar, Jian Shen, Brij B. Gupta:
A location-based privacy-preserving oblivious sharing scheme for indoor navigation. Future Gener. Comput. Syst. 137: 42-52 (2022) - [j169]Xiaoying Jia, Min Luo, Huaqun Wang, Jian Shen, Debiao He:
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things. IEEE Internet Things J. 9(21): 21838-21850 (2022) - [j168]Muhammad Morshed Alam, Muhammad Yeasir Arafat, Sangman Moh, Jian Shen:
Topology control algorithms in multi-unmanned aerial vehicle networks: An extensive survey. J. Netw. Comput. Appl. 207: 103495 (2022) - [j167]Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito:
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks. IEEE Trans. Big Data 8(1): 48-59 (2022) - [j166]Jian Shen, Ziyuan Gui, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1464-1475 (2022) - [j165]Jian Shen, Huijie Yang, Pandi Vijayakumar, Neeraj Kumar:
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 19(4): 2198-2210 (2022) - [j164]Tianqi Zhou, Jian Shen, Debiao He, Pandi Vijayakumar, Neeraj Kumar:
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare. IEEE Trans. Emerg. Top. Comput. Intell. 6(1): 6-15 (2022) - [j163]Junqing Lu, Jian Shen, Pandi Vijayakumar, Brij B. Gupta:
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(8): 5422-5431 (2022) - [j162]Huijie Yang, Jian Shen, Tianqi Zhou, Sai Ji, Pandi Vijayakumar:
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs. ACM Trans. Internet Techn. 22(2): 44:1-44:19 (2022) - [j161]Jian Shen, Tiantian Miao, Jin-Feng Lai, Xiaofeng Chen, Jin Li, Shui Yu:
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems. IEEE Trans. Serv. Comput. 15(3): 1707-1719 (2022) - [j160]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. IEEE Trans. Serv. Comput. 15(5): 2728-2741 (2022) - [c50]Huijie Yang, Jian Shen, Mahammad Obaidat, Pandi Vijayakumar, Kuei-Fang Hsiao:
A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health. GLOBECOM 2022: 2248-2253 - [e1]Xiaofeng Chen, Jian Shen, Willy Susilo:
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings. Lecture Notes in Computer Science 13547, Springer 2022, ISBN 978-3-031-18066-8 [contents] - 2021
- [j159]Sai Ji, Rui Huang, Jian Shen, Xin Jin, Youngju Cho:
A certificateless signcryption scheme for smart home networks. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j158]Yihui Dong, Jian Shen, Sai Ji, Rongxin Qi, Shuai Liu:
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids. Connect. Sci. 33(4): 1116-1137 (2021) - [j157]Chen Wang, Jian Shen, Pandi Vijayakumar, Qi Liu, Sai Ji:
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs. Comput. Stand. Interfaces 77: 103512 (2021) - [j156]Rongxin Qi, Sai Ji, Jian Shen, Pandi Vijayakumar, Neeraj Kumar:
Security preservation in industrial medical CPS using Chebyshev map: An AI approach. Future Gener. Comput. Syst. 122: 52-62 (2021) - [j155]Xueya Xia, Sai Ji, Pandi Vijayakumar, Jian Shen, Joel J. P. C. Rodrigues:
An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities. Int. J. Distributed Sens. Networks 17(6): 155014772110268 (2021) - [j154]Tianqi Zhou, Jian Shen, Huaqun Wang:
An efficient resource sharing scheme based on the linear feedback shift register. Int. J. Sens. Networks 37(3): 141-147 (2021) - [j153]Chen Wang, Rui Huang, Jian Shen, Jianwei Liu, Pandi Vijayakumar, Neeraj Kumar:
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs. IEEE Internet Things J. 8(18): 14248-14257 (2021) - [j152]Tianqi Zhou, Jian Shen, Yongjun Ren, Sai Ji:
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems. Secur. Commun. Networks 2021: 1864514:1-1864514:8 (2021) - [j151]Huijie Yang, Jian Shen, Junqing Lu, Tianqi Zhou, Xueya Xia, Sai Ji:
A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare. Secur. Commun. Networks 2021: 5781354:1-5781354:12 (2021) - [j150]Qingfeng Zhu, Sai Ji, Jian Shen, Yongjun Ren:
Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs. Sensors 21(11): 3658 (2021) - [j149]Jian Shen, Dengzhi Liu, Qi Liu, Xingming Sun, Yan Zhang:
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure. IEEE Trans. Big Data 7(4): 668-677 (2021) - [j148]Jian Shen, Chen Wang, Anxi Wang, Sai Ji, Yan Zhang:
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data. IEEE Trans. Emerg. Top. Comput. 9(1): 216-225 (2021) - [j147]Qi Jiang, Zhiren Chen, Jianfeng Ma, Xindi Ma, Jian Shen, Dapeng Wu:
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network. IEEE Trans. Emerg. Top. Comput. 9(2): 839-853 (2021) - [j146]Chen Wang, Jian Shen, Jin-Feng Lai, Jianwei Liu:
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs. IEEE Trans. Emerg. Top. Comput. 9(3): 1386-1396 (2021) - [j145]Tiantian Miao, Jian Shen, Chin-Feng Lai, Sai Ji, Huaqun Wang:
Fuzzy-Based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks. IEEE Trans. Fuzzy Syst. 29(1): 137-147 (2021) - [j144]Yalian Qian, Jian Shen, Pandi Vijayakumar, Pradip Kumar Sharma:
Profile Matching for IoMT: A Verifiable Private Set Intersection Scheme. IEEE J. Biomed. Health Informatics 25(10): 3794-3803 (2021) - [j143]Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Ximeng Liu, Jian Shen:
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems. IEEE Trans. Parallel Distributed Syst. 32(3): 561-574 (2021) - [c49]Junqing Lu, Rongxin Qi, Jian Shen:
A Novel Dynamic Group Signature with Membership Privacy. DSC 2021: 1-5 - [c48]Yalian Qian, Xueya Xia, Jian Shen:
A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems. DSC 2021: 1-5 - [c47]Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren, Mingwu Zhang:
Key Exposure Resistant Group Key Agreement Protocol. ProvSec 2021: 83-97 - [c46]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. SERVICES 2021: 11 - 2020
- [j142]Jinbo Xiong, Yuanyuan Zhang, Li Lin, Jian Shen, Xuan Li, Mingwei Lin:
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud. Concurr. Comput. Pract. Exp. 32(3) (2020) - [j141]Anxi Wang, Jian Shen, Chen Wang, Huijie Yang, Dengzhi Liu:
Anonymous data collection scheme for cloud-aided mobile edge networks. Digit. Commun. Networks 6(2): 223-228 (2020) - [j140]Jian Shen, Chen Wang, Anxi Wang, Qi Liu, Yang Xiang:
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems. Future Gener. Comput. Syst. 108: 1129-1139 (2020) - [j139]Tianqi Zhou, Jian Shen, Xiong Li, Chen Wang, Haowen Tan:
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix. Future Gener. Comput. Syst. 108: 1307-1313 (2020) - [j138]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Jian Shen:
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. Future Gener. Comput. Syst. 108: 1338-1349 (2020) - [j137]Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang:
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener. Comput. Syst. 109: 450-456 (2020) - [j136]Huiyao Zheng, Jian Shen, Youngju Cho, Chunhua Su, Sangman Moh:
A Novel Structure-Based Data Sharing Scheme in Cloud Computing. IEICE Trans. Inf. Syst. 103-D(2): 222-229 (2020) - [j135]Jian Shen, Tianqi Zhou, Lina Chen:
Collaborative filtering-based recommendation system for big data. Int. J. Comput. Sci. Eng. 21(2): 219-225 (2020) - [j134]Jian Shen, Tianqi Zhou, Jinfeng Lai, Pan Li, Sangman Moh:
Secure and Efficient Data Sharing in Dynamic Vehicular Networks. IEEE Internet Things J. 7(9): 8208-8217 (2020) - [j133]Si Chen, Anmin Fu, Jian Shen, Shui Yu, Huaqun Wang, Huaijiang Sun:
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection. J. Netw. Comput. Appl. 168: 102736 (2020) - [j132]Wei Kong, Jian Shen, Pandi Vijayakumar, Youngju Cho, Victor Chang:
A practical group blind signature scheme for privacy protection in smart grid. J. Parallel Distributed Comput. 136: 29-39 (2020) - [j131]Dengzhi Liu, Jian Shen, Anxi Wang, Chen Wang:
Secure real-time image protection scheme with near-duplicate detection in cloud computing. J. Real Time Image Process. 17(1): 175-184 (2020) - [j130]Dengzhi Liu, Jian Shen, Pandi Vijayakumar, Anxi Wang, Tianqi Zhou:
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security. Multim. Tools Appl. 79(15-16): 10851-10870 (2020) - [j129]Jian Shen, Dengzhi Liu, Md. Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, Aniello Castiglione:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. IEEE Trans. Emerg. Top. Comput. 8(2): 280-290 (2020) - [j128]Jian Shen, Anxi Wang, Chen Wang, Jiguo Li, Yan Zhang:
Content-Centric Group User Authentication for Secure Social Networks. IEEE Trans. Emerg. Top. Comput. 8(3): 833-844 (2020) - [j127]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [j126]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, Pandi Vijayakumar:
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. IEEE Trans. Veh. Technol. 69(1): 807-817 (2020) - [j125]Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren, Leiming Yan:
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices. Wirel. Commun. Mob. Comput. 2020: 8842885:1-8842885:11 (2020) - [c45]Sabitri Poudel, Sangman Moh, Jian Shen:
Energy Conservation Techniques for Flying Ad Hoc Networks. SMA 2020: 15-21
2010 – 2019
- 2019
- [j124]Hongbo Li, Qiong Huang, Sha Ma, Jian Shen, Willy Susilo:
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access 7: 25409-25421 (2019) - [j123]Bin Li, Zesong Fei, Jian Shen, Xiao Jiang, Xiaoxiong Zhong:
Dynamic Offloading for Energy Harvesting Mobile Edge Computing: Architecture, Case Studies, and Future Directions. IEEE Access 7: 79877-79886 (2019) - [j122]Chen Wang, Lu Xiao, Jian Shen, Rui Huang:
Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j121]Yong Xie, Libing Wu, Jian Shen, Li Li:
Efficient two-party certificateless authenticated key agreement protocol under GDH assumption. Int. J. Ad Hoc Ubiquitous Comput. 30(1): 11-25 (2019) - [j120]Jiguo Li, Qihong Yu, Yichen Zhang, Jian Shen:
Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470: 175-188 (2019) - [j119]Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [j118]Anxi Wang, Jian Shen, Pandi Vijayakumar, Yongxin Zhu, Li Tian:
Secure big data communication for energy efficient intra-cluster in WSNs. Inf. Sci. 505: 586-599 (2019) - [j117]Tong Li, Chongzhi Gao, Liaoliang Jiang, Witold Pedrycz, Jian Shen:
Publicly verifiable privacy-preserving aggregation and its application in IoT. J. Netw. Comput. Appl. 126: 39-44 (2019) - [j116]Jian Shen, Huijie Yang, Anxi Wang, Tianqi Zhou, Chen Wang:
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Netw. Appl. 12(4): 924-933 (2019) - [j115]Jian Shen, Xinzhao Jiang, Youngju Cho, Dengzhi Liu, Tianqi Zhou:
Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management. Sensors 19(1): 129 (2019) - [j114]Mingwu Zhang, Yudi Zhang, Yan Jiang, Jian Shen:
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds. IEEE Syst. J. 13(2): 1478-1486 (2019) - [j113]Yuan Wang, Meixia Miao, Jian Shen, Jianfeng Wang:
Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Comput. 23(6): 2101-2112 (2019) - [j112]Jian Shen, Chen Wang, Anxi Wang:
Intelligent agent-based region division scheme for mobile sensor networks. Soft Comput. 23(13): 4903-4910 (2019) - [j111]Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(6): 996-1010 (2019) - [j110]Jian Shen, Chen Wang, Jin-Feng Lai, Yang Xiang, Pan Li:
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 68(11): 11213-11226 (2019) - [c44]Chen Wang, Jian Shen, Jin-Feng Lai, Jianwei Liu:
A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs. BlockSys 2019: 794-799 - [c43]Micheal Ernest Taylor, David Aboagye-Darko, Jian Shen:
Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques. ICAIS (2) 2019: 561-570 - [c42]Jian Shen, Xinzhao Jiang, Dengzhi Liu, Tianqi Zhou:
Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus. ICNC 2019: 719-723 - 2018
- [j109]Qun Lin, Jin Li, Zhengan Huang, Wenbin Chen, Jian Shen:
A Short Linearly Homomorphic Proxy Signature Scheme. IEEE Access 6: 12966-12972 (2018) - [j108]Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin Chen, Jian Shen, Yi Tang:
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain. IEEE Access 6: 20632-20640 (2018) - [j107]Sai Ji, Ziyuan Gui, Tianqi Zhou, Hongyang Yan, Jian Shen:
An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services. IEEE Access 6: 69603-69611 (2018) - [j106]Fushan Wei, Pandi Vijayakumar, Jian Shen, Ruijie Zhang, Li Li:
A provably secure password-based anonymous authentication scheme for wireless body area networks. Comput. Electr. Eng. 65: 322-331 (2018) - [j105]Shaopeng Guan, Yongyu Wang, Jian Shen:
Fingerprint-based access to personally controlled health records in emergency situations. Sci. China Inf. Sci. 61(5): 059103:1-059103:3 (2018) - [j104]Jian Liu, Jiangtao Li, Lei Zhang, Feifei Dai, Yuanfei Zhang, Xinyu Meng, Jian Shen:
Secure intelligent traffic light control using fog computing. Future Gener. Comput. Syst. 78: 817-824 (2018) - [j103]Hui Huang, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78: 850-858 (2018) - [j102]Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun:
A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. 78: 956-963 (2018) - [j101]Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen:
An over-the-air key establishment protocol using keyless cryptography. Future Gener. Comput. Syst. 79: 284-294 (2018) - [j100]Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 82: 727-737 (2018) - [j99]Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst. 84: 149-159 (2018) - [j98]Zehong Chen, Fangguo Zhang, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen:
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Future Gener. Comput. Syst. 87: 712-724 (2018) - [j97]Dengzhi Liu, Jian Shen, Anxi Wang, Chen Wang:
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks. Int. J. Sens. Networks 27(2): 95-102 (2018) - [j96]Jian Shen, Tianqi Zhou, Fushan Wei, Xingming Sun, Yang Xiang:
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things. IEEE Internet Things J. 5(4): 2526-2536 (2018) - [j95]Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, Zhi-Hui Zhan:
Secure data uploading scheme for a smart home system. Inf. Sci. 453: 186-197 (2018) - [j94]Xu Ma, Fangguo Zhang, Xiaofeng Chen, Jian Shen:
Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf. Sci. 459: 103-116 (2018) - [j93]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j92]Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, Jianfeng Ma:
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Humaniz. Comput. 9(4): 1061-1073 (2018) - [j91]Jian Shen, Ziyuan Gui, Sai Ji, Jun Shen, Haowen Tan, Yi Tang:
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106: 117-123 (2018) - [j90]Jian Shen, Shaohua Chang, Qi Liu, Jun Shen, Yongjun Ren:
Implicit authentication protocol and self-healing key management for WBANs. Multim. Tools Appl. 77(9): 11381-11401 (2018) - [j89]Jian Shen, Tianqi Zhou, Kun Wang, Xin Peng, Li Pan:
Artificial Intelligence Inspired Multi-Dimensional Traffic Control for Heterogeneous Networks. IEEE Netw. 32(6): 84-91 (2018) - [j88]Jian Shen, Chen Wang, Sai Ji, Tianqi Zhou, Huijie Yang:
Secure Emergent Data Protection Scheme for a Space-Terrestrial Integrated Network. IEEE Netw. 33(1): 44-50 (2018) - [j87]Chen Wang, Jian Shen, Qi Liu, Yongjun Ren, Tong Li:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. Secur. Commun. Networks 2018: 3680851:1-3680851:7 (2018) - [j86]Tianqi Zhou, Jian Shen, Xiong Li, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. Secur. Commun. Networks 2018: 8214619:1-8214619:7 (2018) - [j85]Jian Shen, Jun Shen, Chin-Feng Lai, Qi Liu, Tianqi Zhou:
Cloud Based Data Protection in Anonymously Controlled SDN. Secur. Commun. Networks 2018: 9845426:1-9845426:8 (2018) - [j84]Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen:
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 1621-1631 (2018) - [j83]Jiguo Li, Wei Yao, Jinguang Han, Yichen Zhang, Jian Shen:
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage. IEEE Syst. J. 12(2): 1767-1777 (2018) - [j82]Yi Liu, Jie Ling, Zhusong Liu, Jian Shen, Chongzhi Gao:
Finger vein secure biometric template generation based on deep learning. Soft Comput. 22(7): 2257-2265 (2018) - [j81]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au:
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. 22(7): 2267-2274 (2018) - [j80]Qi Ye, Pinhui Ke, Jian Shen:
Linear complexity of a class of pseudorandom sequences over a general finite field. Soft Comput. 22(13): 4335-4346 (2018) - [j79]Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen:
Expressive attribute-based keyword search with constant-size ciphertext. Soft Comput. 22(15): 5163-5177 (2018) - [j78]Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo:
Anonymous and Traceable Group Data Sharing in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(4): 912-925 (2018) - [j77]Jian Shen, Tianqi Zhou, Xingang Liu, Yao-Chung Chang:
A Novel Latin-Square-Based Secret Sharing for M2M Communications. IEEE Trans. Ind. Informatics 14(8): 3659-3668 (2018) - [j76]Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen, Desheng Fu, Jin Wang:
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks. J. Supercomput. 74(3): 1267-1282 (2018) - [j75]Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo:
Rethinking Authentication on Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 7079037:1-7079037:4 (2018) - [c41]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c40]Dengzhi Liu, Jian Shen, Yuling Chen, Chen Wang, Tianqi Zhou, Anxi Wang:
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. Inscrypt 2018: 223-239 - [c39]Jian Shen, Dengzhi Liu, Qi Liu, Zhihua Xia, Tianqi Zhou:
A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing. ICNC 2018: 843-848 - 2017
- [j74]Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, Xiong Li:
Hierarchical Trust Level Evaluation for Pervasive Social Networking. IEEE Access 5: 1178-1187 (2017) - [j73]Jian Shen, Anxi Wang, Chen Wang, Patrick C. K. Hung, Chin-Feng Lai:
An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT. IEEE Access 5: 18469-18479 (2017) - [j72]Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
Efficient designated server identity-based encryption with conjunctive keyword search. Ann. des Télécommunications 72(5-6): 359-370 (2017) - [j71]Ruijie Zhang, Jian Shen, Fushan Wei, Xiong Li, Arun Kumar Sangaiah:
Medical image classification based on multi-scale non-negative sparse coding. Artif. Intell. Medicine 83: 44-51 (2017) - [j70]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Marimuthu Karuppiah, Jian Shen:
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63: 168-181 (2017) - [j69]Qi Jiang, Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen, Shehzad Ashraf Chaudhry:
Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63: 182-195 (2017) - [j68]Yang Lu, Jiguo Li, Jian Shen:
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. Comput. J. 60(12): 1729-1744 (2017) - [j67]Jian Shen, Chen Wang, Anxi Wang, Xingming Sun, Sangman Moh, Patrick C. K. Hung:
Organized topology based routing protocol in incompletely predictable ad-hoc networks. Comput. Commun. 99: 107-118 (2017) - [j66]Liang Xue, Jianbing Ni, Yannan Li, Jian Shen:
Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54: 46-54 (2017) - [j65]Jianfeng Wang, Xiaofeng Chen, Jin Li, Jiaolian Zhao, Jian Shen:
Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener. Comput. Syst. 67: 266-275 (2017) - [j64]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j63]Pinhui Ke, Zhifan Ye, Zhengchun Zhou, Jian Shen:
Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence. Int. J. Found. Comput. Sci. 28(4): 391-410 (2017) - [j62]Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen K. Chilamkurti:
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 27(3) (2017) - [j61]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing. Int. J. Sens. Networks 24(1): 62-73 (2017) - [j60]Dandan Liu, Jian Shen, Zhihua Xia, Xingming Sun:
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing. Inf. 8(3): 96 (2017) - [j59]Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen:
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing. Inf. Technol. Control. 46(3): 345-359 (2017) - [j58]Qi Liu, Weidong Cai, Qiang Liu, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment. KSII Trans. Internet Inf. Syst. 11(2): 670-686 (2017) - [j57]Ling Zhao, Mingwu Zhang, Hua Shen, Yudi Zhang, Jian Shen:
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server. KSII Trans. Internet Inf. Syst. 11(2): 826-845 (2017) - [j56]Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks. KSII Trans. Internet Inf. Syst. 11(7): 3629-3647 (2017) - [j55]Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. J. Inf. Sci. Eng. 33(4): 923-938 (2017) - [j54]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j53]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22761-22783 (2017) - [j52]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22785 (2017) - [j51]Kun Wang, Liqiu Gu, Xiaoming He, Song Guo, Yanfei Sun, Alexey V. Vinel, Jian Shen:
Distributed Energy Management for Vehicle-to-Grid Networks. IEEE Netw. 31(2): 22-28 (2017) - [j50]Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun:
A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput. 41: 219-230 (2017) - [j49]Jinfeng Liu, Jianfeng Wang, Xiaoling Tao, Jian Shen:
Secure similarity-based cloud data deduplication in Ubiquitous city. Pervasive Mob. Comput. 41: 231-242 (2017) - [j48]Wenbo Shi, Zijian Bao, Jiaqi Wang, Ning Lu, Fang Zhu, Jian Shen:
A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers. Ubiquitous Comput. 21(5): 779-789 (2017) - [j47]Xiong Li, Arun Kumar Sangaiah, Saru Kumari, Fan Wu, Jian Shen, Muhammad Khurram Khan:
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers. Ubiquitous Comput. 21(5): 791-805 (2017) - [j46]Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Secur. Commun. Networks 2017: 3596205:1-3596205:11 (2017) - [j45]Qin Zou, Jianfeng Wang, Jun Ye, Jian Shen, Xiaofeng Chen:
Efficient and secure encrypted image search in mobile cloud computing. Soft Comput. 21(11): 2959-2969 (2017) - [j44]Jie Xu, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He:
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput. 21(18): 5265-5279 (2017) - [j43]Jun Ye, Jianfeng Wang, Jiaolian Zhao, Jian Shen, Kuan-Ching Li:
Fine-grained searchable encryption in multi-user setting. Soft Comput. 21(20): 6201-6212 (2017) - [j42]Debiao He, Huaqun Wang, Lina Wang, Jian Shen, Xianzhao Yang:
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput. 21(22): 6801-6810 (2017) - [j41]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao:
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21(24): 7325-7335 (2017) - [j40]Yong Xie, Libing Wu, Jian Shen, Abdulhameed Alelaiwi:
EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. 65(2): 229-240 (2017) - [j39]Hua Shen, Mingwu Zhang, Jian Shen:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. IEEE Trans. Inf. Forensics Secur. 12(6): 1369-1381 (2017) - [j38]Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. IEEE Trans. Inf. Forensics Secur. 12(10): 2402-2415 (2017) - [j37]Yong Xie, Libing Wu, Neeraj Kumar, Jian Shen:
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network. Wirel. Pers. Commun. 93(2): 523-541 (2017) - [j36]Libing Wu, Yubo Zhang, Yong Xie, Abdulhameed Alelaiwi, Jian Shen:
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices. Wirel. Pers. Commun. 94(4): 3371-3387 (2017) - [j35]Han Shen, Jian Shen, Muhammad Khurram Khan, Jong-Hyouk Lee:
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wirel. Pers. Commun. 96(4): 5253-5266 (2017) - [j34]Yi-Ning Liu, Quanyu Zhao, Gao Liu, Liang Chang, Jian Shen:
A Fairness-Enhanced Micropayment Scheme. Wirel. Pers. Commun. 96(4): 5267-5278 (2017) - [j33]Xiong Li, Saru Kumari, Jian Shen, Fan Wu, Cai-Sen Chen, SK Hafizul Islam:
Secure Data Access and Sharing Scheme for Cloud Storage. Wirel. Pers. Commun. 96(4): 5295-5314 (2017) - [j32]Han Shen, Jianhua Chen, Debiao He, Jian Shen:
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme. Wirel. Pers. Commun. 96(4): 5635-5641 (2017) - [j31]Yao Shen, Zhifeng Bao, Xiaolin Qin, Jian Shen:
Adaptive task scheduling strategy in cloud: when energy consumption meets performance guarantee. World Wide Web 20(2): 155-173 (2017) - [j30]Zhifeng Bao, Yi Yu, Jian Shen, Zhangjie Fu:
A query refinement framework for xml keyword search. World Wide Web 20(6): 1469-1505 (2017) - [c38]Ming He, Gongda Qiu, Jian Shen, Yuting Cao, Chamath Dilshan Gunasekara:
An Integrated LSTM Prediction Method Based on Multi-scale Trajectory Space. ACPR 2017: 423-429 - [c37]Tianqi Zhou, Lina Chen, Jian Shen:
Movie Recommendation System Employing the User-Based CF in Cloud Computing. CSE/EUC (2) 2017: 46-50 - [c36]Jian Shen, Jun Shen, Chen Wang, Anxi Wang:
A Fibonacci Based Batch Auditing Protocol for Cloud Data. CSS 2017: 215-222 - [c35]Fawad Khan, Hui Li, Liangxuan Zhang, Jian Shen:
An Expressive Hidden Access Policy CP-ABE. DSC 2017: 178-186 - [c34]Anxi Wang, Shuzhen Pan, Chen Wang, Jian Shen, Dengzhi Liu:
A Novel Clustering Solution for Wireless Sensor Networks. GPC 2017: 313-322 - [c33]Micheal Ernest Taylor, Jian Shen:
Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey. ICCCS (1) 2017: 300-309 - [c32]Zichun Wang, Meng Feng, Tiantian Miao, Wei Jiang, Jian Shen:
Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey. ICCCS (1) 2017: 422-429 - [c31]Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun:
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. ISPEC 2017: 454-467 - [c30]Jian Shen, Tiantian Miao, Qi Liu, Sai Ji, Chen Wang, Dengzhi Liu:
S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks. SpaCCS 2017: 395-408 - 2016
- [j29]Jian Shen, Chen Wang, Chin-Feng Lai, Anxi Wang, Han-Chieh Chao:
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks. IEEE Access 4: 9163-9173 (2016) - [j28]Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62: 85-91 (2016) - [j27]Hongyang Yan, Jin Li, Xuan Li, Gansen Zhao, Sun-Young Lee, Jian Shen:
Secure Access Control of E-Health System with Attribute-Based Encryption. Intell. Autom. Soft Comput. 22(3): 345-352 (2016) - [j26]Han Shen, Jianhua Chen, Hao Hu, Jian Shen:
Insecurity of a Certificateless Aggregate Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(2): 660-662 (2016) - [j25]Bao Peng, Zhi Zhao, Guangjie Han, Jian Shen:
Consensus-based sparse signal reconstruction algorithm for wireless sensor networks. Int. J. Distributed Sens. Networks 12(9) (2016) - [j24]Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen:
Comment on a certificateless one-pass and two-party authenticated key agreement protocol. Inf. Sci. 369: 184-187 (2016) - [j23]Fushan Wei, Jianfeng Ma, Qi Jiang, Jian Shen, Chuangui Ma:
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Inf. Technol. Control. 45(1): 62-70 (2016) - [j22]Yi-Ning Liu, Gao Liu, Chi Cheng, Zhe Xia, Jian Shen:
A Privacy-Preserving Health Data Aggregation Scheme. KSII Trans. Internet Inf. Syst. 10(8): 3852-3864 (2016) - [j21]Xindong You, Guangjie Han, Chuan Zhu, Chi Dong, Jian Shen:
E2GSM: Energy Effective Gear-Shifting Mechanism in Cloud Storage System. KSII Trans. Internet Inf. Syst. 10(10): 4681-4702 (2016) - [j20]Xiong Li, Kaihui Wang, Jian Shen, Saru Kumari, Fan Wu, Yonghua Hu:
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. J. Ambient Intell. Humaniz. Comput. 7(3): 427-443 (2016) - [j19]Libing Wu, Yubo Zhang, Li Li, Jian Shen:
Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks. J. Medical Syst. 40(6): 134:1-134:12 (2016) - [j18]Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76: 37-48 (2016) - [j17]Li Jiang, Hui Tian, Jian Shen, Sabita Maharjan, Yan Zhang:
Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems. Mob. Networks Appl. 21(6): 1032-1042 (2016) - [j16]Yongjun Ren, Jian Shen, Yuhui Zheng, Jin Wang, Han-Chieh Chao:
Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl. 9(5): 854-863 (2016) - [j15]Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang:
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity. Secur. Commun. Networks 9(12): 1737-1747 (2016) - [j14]Han Shen, Jianhua Chen, Jian Shen, Debiao He:
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification. Secur. Commun. Networks 9(13): 2217-2221 (2016) - [j13]Qi Liu, Weidong Cai, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Networks 9(17): 4002-4012 (2016) - [j12]Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen:
Hierarchical attribute-based encryption with continuous auxiliary inputs leakage. Secur. Commun. Networks 9(18): 4852-4862 (2016) - [j11]Qi Liu, Weidong Cai, Dandan Jin, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment. Sensors 16(9): 1386 (2016) - [j10]Qi Liu, Weidong Cai, Jian Shen, Xiaodong Liu, Nigel Linge:
An adaptive approach to better load balancing in a consumer-centric cloud environment. IEEE Trans. Consumer Electron. 62(3): 243-250 (2016) - [j9]Kun Wang, Miao Du, Dejun Yang, Chunsheng Zhu, Jian Shen, Yan Zhang:
Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems. ACM Trans. Embed. Comput. Syst. 16(1): 18:1-18:21 (2016) - [j8]Min Luo, Jingyin Zhang, Debiao He, Jian Shen:
Security analysis of a user registration approach. J. Supercomput. 72(3): 900-903 (2016) - [j7]Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen K. Chilamkurti:
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J. Supercomput. 72(9): 3588-3600 (2016) - [c29]Fushan Wei, Ruijie Zhang, Jian Shen:
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. BWCCA 2016: 849-855 - [c28]Sai Ji, Dengzhi Liu, Jian Shen:
Exploiting Group Signature to Implement User Authentication in Cloud Computing. CSA/CUTE 2016: 323-331 - [c27]Sai Ji, Dengzhi Liu, Jian Shen:
Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey. CSA/CUTE 2016: 342-351 - [c26]Jian Shen, Chen Jin, Dengzhi Liu:
A Survey on the Research of Indoor RFID Positioning System. ICCCS (2) 2016: 264-274 - [c25]Jian Shen, Anxi Wang, Chen Wang, Yongjun Ren, Xingming Sun:
A RFID Based Localization Algorithm for Wireless Sensor Networks. ICCCS (2) 2016: 275-285 - [c24]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. ICCCS (1) 2016: 389-408 - [c23]Qi Liu, Weidong Cai, Jian Shen, Dandan Jin, Nigel Linge:
A load-balancing approach based on modified K-ELM and NSGA-II in a heterogeneous cloud environment. ICCE 2016: 411-412 - [c22]Jian Shen, Shaohua Chang:
Certificateless Authentication Protocol for Wireless Body Area Network. ICGEC 2016: 29-35 - [c21]Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito:
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network. SpaCCS Workshops 2016: 208-217 - 2015
- [j6]Jin Wang, Liwu Zuo, Jian Shen, Bin Li, Sungyoung Lee:
Multiple mobile sink-based routing algorithm for data dissemination in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(10): 2656-2667 (2015) - [j5]Jian Shen, Haowen Tan, Sangman Moh, Ilyong Chung, Qi Liu, Xingming Sun:
Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Networks 17(5): 453-462 (2015) - [c20]Qi Liu, Weidong Cai, Jian Shen, Baowei Wang, Zhangjie Fu, Nigel Linge:
VPCH: A Consistent Hashing Algorithm for Better Load Balancing in a Hadoop Environment. CBD 2015: 69-72 - [c19]Jian Shen, Dengzhi Liu, Yongjun Ren, Sai Ji, Jin Wang, Dongmin Choi:
A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine. CBD 2015: 267-274 - [c18]Qi Liu, Weidong Cai, Zhangjie Fu, Jian Shen, Nigel Linge:
An Optimized Strategy for Speculative Execution in a Heterogeneous Environment. FGCN 2015: 9-12 - [c17]Qi Liu, Weidong Cai, Jian Shen, Baowei Wang, Zhangjie Fu, Nigel Linge:
An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform. ICCCS 2015: 417-423 - [c16]Qi Liu, Jian Shen, Bo Xiao, Baowei Wang, Nigel Linge:
EECD: A Code Dissemination protocol in a WSN-based Home Energy Management System. ICCE 2015: 279-280 - [c15]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Outsourced data tagging via authority and delegable auditing for cloud storage. ICCST 2015: 131-134 - 2014
- [j4]Jian Shen, Sangman Moh, Ilyong Chung, Xingming Sun:
Buffer scheme optimization of epidemic routing in delay tolerant networks. J. Commun. Networks 16(6): 656-666 (2014) - [c14]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. IIH-MSP 2014: 779-782 - [c13]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 795-798 - [c12]Jian Shen, Chen Wang, Anxi Wang, Lei Li, Yu Yang, Jin Wang:
Performance Comparison of Typical Routing Protocols in Ad-hoc Networks. ICS 2014: 463-473 - [c11]Jian Shen, Haowen Tan, Sai Ji, Yongjun Ren, Jin Wang:
A Comparative Survey on RFID Grouping Authentication Protocols. ICS 2014: 982-993 - [c10]Sai Ji, Lu Li, Ping Guo, Jian Shen, Jin Wang, Yajie Sun:
Phased Array and Image Enhancement Method Based Structural Health Monitoring. ICS 2014: 1993-2000 - [c9]Jian Shen, Haowen Tan, Yuhui Zheng, Sai Ji, Jin Wang:
An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection. ICS 2014: 2070-2079 - [c8]Jian Shen, Haowen Tan, Yongjun Ren, Yuhui Zheng, Jin Wang:
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers. ICS 2014: 2162-2171 - 2013
- [c7]Jian Shen, Jin Wang, Jianwei Zhang, Shunfeng Wang:
A Comparative Study on Routing Protocols in Underwater Sensor Networks. EMC/HumanCom 2013: 593-602 - [c6]Jian Shen, Jin Wang, Yuhui Zheng, Jianwei Zhang, Shunfeng Wang:
A Novel Verifiably Encrypted Signature from Weil Pairing. EMC/HumanCom 2013: 603-607 - [c5]Jian Shen, Jin Wang, Jingwei Wang, Jianwei Zhang, Shunfeng Wang:
Location-Aware Routing Protocol for Underwater Sensor Networks. EMC/HumanCom 2013: 609-617 - [c4]Jian Shen, Jin Wang, Yongjun Ren, Jianwei Zhang, Shunfeng Wang:
Efficient Key Management Scheme for SCADA System. EMC/HumanCom 2013: 619-625 - [c3]Qi Liu, Hong Wei Qian, Baowei Wang, Jian Shen, Nigel Linge:
An enhanced routing algorithm for congestion control in a home energy management system. GCCE 2013: 438-439 - [c2]Jin Wang, Zhongqi Zhang, Jian Shen, Feng Xia, Sungyoung Lee:
An Improved Stable Election Based Routing Protocol with Mobile Sink for Wireless Sensor Networks. GreenCom/iThings/CPScom 2013: 945-950 - [c1]Jin Wang, Xiaoqin Yang, Jian Shen, Ping Guo, Feng Xia:
Mobile-Sink Routing Algorithm Based on Energy and Distance for Wireless Sensor Networks. GreenCom/iThings/CPScom 2013: 951-956 - 2012
- [j3]Jian Shen, Sangman Moh, Ilyong Chung:
Identity-based key agreement protocol employing a symmetric balanced incomplete block design. J. Commun. Networks 14(6): 682-691 (2012) - 2010
- [j2]Jian Shen, Sangman Moh, Ilyong Chung:
A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks. IEICE Trans. Inf. Syst. 93-D(10): 2763-2775 (2010) - [j1]Jian Shen, Sangman Moh, Ilyong Chung:
Comment: "Eenhanced novel access control protocol over wireless sensor networks". IEEE Trans. Consumer Electron. 56(3): 2019-2021 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint