Xinghua Li
Xinghua Li
Zweryfikowany adres z mail.xidian.edu.cn
Cytowane przez
Cytowane przez
Improvement of robust smart‐card‐based password authentication scheme
Q Jiang, J Ma, G Li, X Li
International Journal of Communication Systems 28 (2), 383-393, 2015
Practical attribute-based multi-keyword search scheme in mobile crowdsourcing
Y Miao, J Ma, X Liu, X Li, Z Liu, H Li
IEEE Internet of Things Journal 5 (4), 3008-3018, 2018
Attribute-based keyword search over hierarchical data in cloud computing
Y Miao, J Ma, X Liu, X Li, Q Jiang, J Zhang
IEEE Transactions on Services Computing, 2017
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
H Liu, X Li, H Li, J Ma, X Ma
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Balancing trajectory privacy and data utility using a personalized anonymization model
S Gao, J Ma, C Sun, X Li
Journal of Network and Computer Applications 38, 125-134, 2014
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
X Li, M Miao, H Liu, J Ma, KC Li
Soft Computing 21 (14), 3907-3917, 2017
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm
L Yang, Y Qiao, Z Liu, J Ma, X Li
Soft Computing 22 (2), 453-464, 2018
FLAP: An efficient WLAN initial access authentication protocol
X Li, F Bao, S Li, J Ma
IEEE Transactions on Parallel and Distributed Systems 25 (2), 488-497, 2014
Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks
X Li, J Liu, Q Yao, J Ma
IEEE Access 5, 5281-5291, 2017
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J Guo, J Ma, X Li, J Zhang, T Zhang
Journal of Information Science & Engineering 33 (4), 2017
DALP: A demand‐aware location privacy protection scheme in continuous location‐based services
X Li, E Wang, W Yang, J Ma
Concurrency and Computation: Practice and Experience 28 (4), 1219-1236, 2016
A fair data access control towards rational users in cloud storage
H Liu, X Li, M Xu, R Mo, J Ma
Information Sciences 418, 258-271, 2017
A situational awareness trust evolution model for mobile devices in D2D communication
J Guo, J Ma, X Li, T Zhang, Z Liu
IEEE Access 6, 4375-4386, 2018
A USIM-based uniform access authentication framework in mobile communication
X Li, J Ma, YH Park, L Xu
EURASIP Journal on Wireless Communications and Networking 2011 (1), 867315, 2011
A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks
X Li, H Liu, F Wei, J Ma, W Yang
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
Trust-based service composition and selection in service oriented architecture
JJ Guo, JF Ma, XX Guo, XH Li, JW Zhang, T Zhang
Peer-to-Peer Networking and Applications 11 (5), 862-880, 2018
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
F Wei, J Ma, C Ma, X Li
International Journal of Embedded Systems 7 (3-4), 257-265, 2015
On the security of the canetti-krawczyk model
X Li, J Ma, SJ Moon
International Conference on Computational and Information Science, 356-363, 2005
Authentications and key management in 3G-WLAN interworking
X Li, X Lu, J Ma, Z Zhu, L Xu, YH Park
Mobile Networks and Applications 16 (3), 394-407, 2011
Authentication Method for 802.11 s Infrastructure Mode
X Li, W Yang, SJ Moon, J Ma
2006 First International Conference on Communications and Networking in …, 2006
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20