An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem Y Lu, L Li, H Peng, Y Yang Journal of medical systems 39, 1-8, 2015 | 143 | 2015 |
Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards Y Lu, L Li, X Yang, Y Yang PLoS One 10 (5), e0126323, 2015 | 86 | 2015 |
A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks G Xu, J Liu, Y Lu, X Zeng, Y Zhang, X Li Journal of Network and Computer Applications 107, 83-92, 2018 | 79 | 2018 |
A biometrics and smart cards‐based authentication scheme for multi‐server environments Y Lu, L Li, H Peng, Y Yang Security and Communication Networks 8 (17), 3219-3228, 2015 | 62 | 2015 |
An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks Y Lu, L Li, H Peng, Y Yang Sensors 16 (6), 837, 2016 | 61 | 2016 |
Anonymous three-factor authenticated key agreement for wireless sensor networks Y Lu, G Xu, L Li, Y Yang Wireless Networks 25, 1461-1475, 2019 | 57 | 2019 |
A secure and efficient mutual authentication scheme for session initiation protocol Y Lu, L Li, H Peng, Y Yang Peer-to-Peer Networking and Applications 9, 449-459, 2016 | 49 | 2016 |
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography Y Lu, L Li, H Peng, Y Yang Multimedia Tools and Applications 76, 1801-1815, 2017 | 43 | 2017 |
Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps Y Lu, L Li, H Peng, D Xie, Y Yang Journal of medical systems 39, 1-10, 2015 | 30 | 2015 |
Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems Y Lu, D Wang, MS Obaidat, P Vijayakumar IEEE Internet of Things Journal 10 (4), 3057-3070, 2022 | 29 | 2022 |
Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks Y Lu, G Xu, L Li, Y Yang IEEE Systems Journal 13 (2), 1454-1465, 2019 | 29 | 2019 |
Robust anonymous two‐factor authenticated key exchange scheme for mobile client‐server environment Y Lu, L Li, H Peng, Y Yang Security and Communication Networks 9 (11), 1331-1339, 2016 | 26 | 2016 |
A lightweight ID based authentication and key agreement protocol for multiserver architecture Y Lu, L Li, H Peng, X Yang, Y Yang International Journal of Distributed Sensor Networks 11 (3), 635890, 2015 | 22 | 2015 |
Robust and efficient authentication scheme for session initiation protocol Y Lu, L Li, Y Yang Mathematical problems in engineering 2015, 2015 | 19 | 2015 |
A secure anonymous authentication scheme for wireless communications using smart cards Y Lu, X Wu, X Yang International Journal of Network Security 17 (3), 237-245, 2015 | 17 | 2015 |
Research on the membrane fouling diagnosis of MBR membrane module based on ECA-CNN Y Shi, Z Wang, X Du, G Ling, W Jia, Y Lu Journal of Environmental Chemical Engineering 10 (3), 107649, 2022 | 14 | 2022 |
An extended chaotic maps-based three-party password-authenticated key agreement with user anonymity Y Lu, L Li, H Zhang, Y Yang Plos One 11 (4), e0153870, 2016 | 14 | 2016 |
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks Y Lu, L Li, H Peng, Y Yang KSII Transactions on Internet and Information Systems (TIIS) 10 (3), 1273-1288, 2016 | 12 | 2016 |
Membrane fouling prediction based on tent-SSA-BP G Ling, Z Wang, Y Shi, J Wang, Y Lu, L Li Membranes 12 (7), 691, 2022 | 11 | 2022 |
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service Y Lu, D Zhao Computer Communications 182, 22-30, 2022 | 11 | 2022 |