Jian Shen
Title
Cited by
Cited by
Year
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
2042017
A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment
Q Liu, W Cai, J Shen, Z Fu, X Liu, N Linge
Security and Communication Networks 9 (17), 4002-4012, 2016
1832016
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang
Journal of Network and Computer Applications 106, 117-123, 2018
1622018
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future Generation Computer Systems 78, 956-963, 2018
1592018
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
1472017
An ID-based linearly homomorphic signature scheme and its application in blockchain
Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang
IEEE Access 6, 20632-20640, 2018
1352018
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2017
1042017
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
J Shen, D Liu, J Shen, Q Liu, X Sun
Pervasive and mobile Computing 41, 219-230, 2017
982017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
942017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
892017
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
882017
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
882016
Efficient privacy-aware authentication scheme for mobile cloud computing services
D He, N Kumar, MK Khan, L Wang, J Shen
IEEE Systems Journal 12 (2), 1621-1631, 2016
872016
$$\varvec {\textit {}} $$: a $$ k $$ k-degree anonymity with vertex and edge modification algorithm
T Ma, Y Zhang, J Cao, J Shen, M Tang, Y Tian, A Al-Dhelaan, ...
Computing 97 (12), 1165-1184, 2015
872015
Routing protocols in delay tolerant networks: A comparative survey
J Shen, S Moh, I Chung
The 23rd International Technical Conference on Circuits/Systems, Computers …, 2008
852008
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
832016
Enhanced secure sensor association and key management in wireless body area networks
J Shen, H Tan, S Moh, I Chung, Q Liu, X Sun
Journal of Communications and Networks 17 (5), 453-462, 2015
812015
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT
J Shen, A Wang, C Wang, PCK Hung, CF Lai
Ieee Access 5, 18469-18479, 2017
782017
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen
Future Generation Computer Systems 82, 727-737, 2018
752018
Secure intelligent traffic light control using fog computing
J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen
Future Generation Computer Systems 78, 817-824, 2018
742018
The system can't perform the operation now. Try again later.
Articles 1–20