Improvement of robust smart‐card‐based password authentication scheme Q Jiang, J Ma, G Li, X Li International Journal of Communication Systems 28 (2), 383-393, 2015 | 139 | 2015 |
Practical attribute-based multi-keyword search scheme in mobile crowdsourcing Y Miao, J Ma, X Liu, X Li, Z Liu, H Li IEEE Internet of Things Journal 5 (4), 3008-3018, 2018 | 121 | 2018 |
Attribute-based keyword search over hierarchical data in cloud computing Y Miao, J Ma, X Liu, X Li, Q Jiang, J Zhang IEEE Transactions on Services Computing, 2017 | 116 | 2017 |
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services H Liu, X Li, H Li, J Ma, X Ma IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 97 | 2017 |
Balancing trajectory privacy and data utility using a personalized anonymization model S Gao, J Ma, C Sun, X Li Journal of Network and Computer Applications 38, 125-134, 2014 | 96 | 2014 |
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism X Li, M Miao, H Liu, J Ma, KC Li Soft Computing 21 (14), 3907-3917, 2017 | 57 | 2017 |
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm L Yang, Y Qiao, Z Liu, J Ma, X Li Soft Computing 22 (2), 453-464, 2018 | 53 | 2018 |
FLAP: An efficient WLAN initial access authentication protocol X Li, F Bao, S Li, J Ma IEEE Transactions on Parallel and Distributed Systems 25 (2), 488-497, 2014 | 32 | 2014 |
Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks X Li, J Liu, Q Yao, J Ma IEEE Access 5, 5281-5291, 2017 | 29 | 2017 |
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. J Guo, J Ma, X Li, J Zhang, T Zhang Journal of Information Science & Engineering 33 (4), 2017 | 28 | 2017 |
DALP: A demand‐aware location privacy protection scheme in continuous location‐based services X Li, E Wang, W Yang, J Ma Concurrency and Computation: Practice and Experience 28 (4), 1219-1236, 2016 | 19 | 2016 |
A fair data access control towards rational users in cloud storage H Liu, X Li, M Xu, R Mo, J Ma Information Sciences 418, 258-271, 2017 | 18 | 2017 |
A situational awareness trust evolution model for mobile devices in D2D communication J Guo, J Ma, X Li, T Zhang, Z Liu IEEE Access 6, 4375-4386, 2018 | 16 | 2018 |
A USIM-based uniform access authentication framework in mobile communication X Li, J Ma, YH Park, L Xu EURASIP Journal on Wireless Communications and Networking 2011 (1), 867315, 2011 | 15 | 2011 |
A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks X Li, H Liu, F Wei, J Ma, W Yang 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 12 | 2015 |
Trust-based service composition and selection in service oriented architecture JJ Guo, JF Ma, XX Guo, XH Li, JW Zhang, T Zhang Peer-to-Peer Networking and Applications 11 (5), 862-880, 2018 | 11 | 2018 |
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords F Wei, J Ma, C Ma, X Li International Journal of Embedded Systems 7 (3-4), 257-265, 2015 | 10 | 2015 |
On the security of the canetti-krawczyk model X Li, J Ma, SJ Moon International Conference on Computational and Information Science, 356-363, 2005 | 10 | 2005 |
Authentications and key management in 3G-WLAN interworking X Li, X Lu, J Ma, Z Zhu, L Xu, YH Park Mobile Networks and Applications 16 (3), 394-407, 2011 | 9 | 2011 |
Authentication Method for 802.11 s Infrastructure Mode X Li, W Yang, SJ Moon, J Ma 2006 First International Conference on Communications and Networking in …, 2006 | 8 | 2006 |