フォロー
Chen Wang(王晨)
Chen Wang(王晨)
確認したメール アドレス: zstu.edu.cn
タイトル
引用先
引用先
Secure data uploading scheme for a smart home system
J Shen, C Wang, T Li, X Chen, X Huang, ZH Zhan
Information Sciences 453, 186-197, 2018
982018
B-TSCA: Blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs
C Wang, J Shen, JF Lai, J Liu
IEEE Transactions on Emerging Topics in Computing 9 (3), 1386-1396, 2020
912020
Quantum cryptography for the future internet and the security analysis
T Zhou, J Shen, X Li, C Wang, J Shen
Security and Communication Networks 2018, 1-7, 2018
802018
A novel security scheme based on instant encrypted transmission for internet of things
C Wang, J Shen, Q Liu, Y Ren, T Li
Security and Communication Networks 2018, 2018
632018
A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs
C Wang, R Huang, J Shen, J Liu, P Vijayakumar, N Kumar
IEEE Internet of Things Journal 8 (18), 14248-14257, 2021
452021
Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix
T Zhou, J Shen, X Li, C Wang, H Tan
Future Generation Computer Systems 108, 1307-1313, 2020
382020
Attribute-based secure data aggregation for isolated IoT-enabled maritime transportation systems
C Wang, J Shen, P Vijayakumar, BB Gupta
IEEE Transactions on Intelligent Transportation Systems 24 (2), 2608-2617, 2021
342021
Neighborhood trustworthiness‐based vehicle‐to‐vehicle authentication scheme for vehicular ad hoc networks
C Wang, L Xiao, J Shen, R Huang
Concurrency and Computation: Practice and Experience 31 (21), e4643, 2019
312019
Organized topology based routing protocol in incompletely predictable ad-hoc networks
J Shen, C Wang, A Wang, X Sun, S Moh, PCK Hung
Computer Communications 99, 107-118, 2017
312017
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
J Shen, H Yang, A Wang, T Zhou, C Wang
Peer-to-Peer Networking and Applications 12, 924-933, 2019
252019
Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks
J Shen, C Wang, A Castiglione, D Liu, C Esposito
IEEE Transactions on Big Data 8 (1), 48-59, 2017
252017
A searchable and verifiable data protection scheme for scholarly big data
J Shen, C Wang, A Wang, S Ji, Y Zhang
IEEE Transactions on Emerging Topics in Computing 9 (1), 216-225, 2018
222018
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
C Wang, T Zhou, J Shen, W Wang, X Zhou
Future Generation Computer Systems 140, 129-137, 2023
202023
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks
D Liu, J Shen, A Wang, C Wang
International Journal of Sensor Networks 27 (2), 95-102, 2018
202018
Direction density-based secure routing protocol for healthcare data in incompletely predictable networks
J Shen, C Wang, CF Lai, A Wang, HC Chao
IEEE Access 4, 9163-9173, 2016
182016
Secure real-time image protection scheme with near-duplicate detection in cloud computing
D Liu, J Shen, A Wang, C Wang
Journal of Real-Time Image Processing 17 (1), 175-184, 2020
172020
Secure emergent data protection scheme for a space-terrestrial integrated network
J Shen, C Wang, S Ji, T Zhou, H Yang
IEEE Network 33 (1), 44-50, 2019
172019
Identity-based fast authentication scheme for smart mobile devices in body area networks
C Wang, W Zheng, S Ji, Q Liu, A Wang
Wireless Communications and Mobile Computing 2018, 2018
172018
Content-centric group user authentication for secure social networks
J Shen, A Wang, C Wang, J Li, Y Zhang
IEEE Transactions on Emerging Topics in Computing 8 (3), 833-844, 2017
142017
Performance comparison of typical and improved LEACH protocols in wireless sensor network
J Shen, A Wang, C Wang, Y Ren, J Wang
2015 first international conference on computational intelligence theory …, 2015
142015
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20