Efficient handover authentication with user anonymity and untraceability for mobile cloud computing X Yang, X Huang, JK Liu Future Generation Computer Systems 62, 190-195, 2016 | 106 | 2016 |
A lightweight authentication scheme for vehicular ad hoc networks based on MSR X Yang, X Yi, I Khalil, Y Zeng, X Huang, S Nepal, X Yang, H Cui Vehicular communications 15, 16-27, 2019 | 55 | 2019 |
Blockchain-based secure and lightweight authentication for Internet of Things X Yang, X Yang, X Yi, I Khalil, X Zhou, D He, X Huang, S Nepal IEEE Internet of Things Journal 9 (5), 3321-3332, 2021 | 42 | 2021 |
Efficient and anonymous authentication for healthcare service with cloud based WBANs X Yang, X Yi, S Nepal, I Khalil, X Huang, J Shen IEEE Transactions on Services Computing 15 (5), 2728-2741, 2021 | 25 | 2021 |
Lightweight anonymous authentication for ad hoc group: A ring signature approach X Yang, W Wu, JK Liu, X Chen Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015 | 25 | 2015 |
Improved handover authentication and key pre‐distribution for wireless mesh networks X Yang, X Huang, J Han, C Su Concurrency and Computation: Practice and Experience 28 (10), 2978-2990, 2016 | 20 | 2016 |
A trust and privacy preserving handover authentication protocol for wireless networks X Yang, Y Zhang, JK Liu, Y Zeng 2016 IEEE Trustcom/BigDataSE/ISPA, 138-143, 2016 | 19 | 2016 |
Towards secure and cost-effective fuzzy access control in mobile cloud computing W Wu, S Hu, X Yang, JK Liu, MH Au Soft Computing 21, 2643-2649, 2017 | 15 | 2017 |
Trust enhancement over range search for encrypted data X Yang, TT Lee, JK Liu, X Huang 2016 IEEE Trustcom/BigDataSE/ISPA, 66-73, 2016 | 15 | 2016 |
An efficient privacy-preserving protocol for database-driven cognitive radio networks Y Zeng, L Xu, X Yang, X Yi Ad hoc networks 90, 101739, 2019 | 8 | 2019 |
Secure and lightweight authentication for mobile-edge computing-enabled WBANs X Yang, X Yi, I Khalil, J Luo, E Bertino, S Nepal, X Huang IEEE Internet of Things Journal 9 (14), 12563-12572, 2021 | 7 | 2021 |
A new privacy‐preserving authentication protocol for anonymous web browsing X Yang, X Yi, I Khalil, H Cui, X Yang, S Nepal, X Huang, Y Zeng Concurrency and computation: Practice and experience 31 (21), e4706, 2019 | 5 | 2019 |
An improved lightweight RFID authentication protocol for Internet of Things X Yang, X Yi, Y Zeng, I Khalil, X Huang, S Nepal Web Information Systems Engineering–WISE 2018: 19th International Conference …, 2018 | 5 | 2018 |
Lightweight privacy preservation for secondary users in cognitive radio networks Y Zeng, L Xu, X Yang, X Yi, I Khalil Journal of Network and Computer Applications 162, 102652, 2020 | 4 | 2020 |
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments F Zhu, F Xu, X Yang, X Yi, A Abuadbba Information Processing Letters 173, 106170, 2022 | 3 | 2022 |
Privacy-preserving aggregation for cooperative spectrum sensing Y Zeng, L Xu, X Yang, X Yi, I Khalil Journal of Network and Computer Applications 140, 54-64, 2019 | 3 | 2019 |
A practical privacy preserving protocol in database-driven cognitive radio networks Y Zeng, X Li, X Yang, Q Xu, D Wang Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 3 | 2018 |
Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System X Yang, X Yang, J Luo, X Yi, I Kahlil, S Lai, W Wu, AY Zomaya IEEE Transactions on Sustainable Computing, 2023 | 2 | 2023 |
Verifiable image revision from chameleon hashes J Xu, H Chen, X Yang, W Wu, Y Song Cybersecurity 4, 1-13, 2021 | 2 | 2021 |
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments F Zhu, X Yi, S Abuadbba, I Khalil, X Yang, S Nepal, X Huang Provable and Practical Security: 14th International Conference, ProvSec 2020 …, 2020 | 2 | 2020 |