Qi Jiang
Qi Jiang
School of Cyber Engineering, Xidian University
Verified email at xidian.edu.cn - Homepage
Title
Cited by
Cited by
Year
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
Q Jiang, S Zeadally, J Ma, D He
IEEE Access 5 (1), 3376-3392, 2017
1602017
A privacy preserving three-factor authentication protocol for e-Health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72 (10), 3826-3849, 2016
1502016
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian
Peer-to-Peer Networking and Applications 8 (6), 1070-1081, 2015
1432015
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Jiang Qi, Ma Jianfeng, Ma Zhuo, Li Guangsong
Journal of Medical Systems 37 (1), 2013
1322013
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
Q Jiang, J Ma, G Li, L Yang
Wireless personal communications 68 (4), 1477-1491, 2013
1102013
Improvement of robust smart-card-based password authentication scheme
Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li
International Journal of Communication Systems 28 (2), 383-393, 2015
1052015
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
952016
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang , Fushan Wei, Shuai Fu, Jianfeng Ma, Guangsong Li, Abdulhameed Alelaiwi
Nonlinear Dynamics 83 (4), 2085-2101, 2016
872016
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Qi Jiang, Jianfeng Ma, Fushan Wei
IEEE Systems Journal, 2039 - 2042, 2016
822016
Efficient end-to-end authentication protocol for wearable health monitoring systems
Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry
Computers & Electrical Engineering 63, 182-195, 2017
782017
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian
Journal of Medical Systems 38 (2), 12:1-8, 2014
772014
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card
Saru Kumari,Fan Wu,Xiong Li,Mohammad Sabzinejad Farash,Qi Jiang,Muhammad ...
Multimedia Tools and Applications, 2015
722015
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1061-1073, 2018
642018
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang
Wireless Personal Communications 77 (2), 1489-1506, 2014
622014
Attribute-based keyword search over hierarchical data in cloud computing
Y Miao, J Ma, X Liu, X Li, Q Jiang, J Zhang
IEEE Transactions on Services Computing, 2017
562017
Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Qi Jiang, Jianfeng Ma, Youliang Tian
International Journal of Communication Systems 28 (7), 1340-1351, 2015
512015
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
L Yang, J Ma, Q Jiang
IJ Network Security 14 (3), 156-163, 2012
442012
An improved password-based remote user authentication protocol without smart cards
Q Jiang, J Ma, G Li, Z Ma
Information technology And control 42 (2), 113-123, 2013
382013
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
Q Jiang, X Lian, C Yang, J Ma, Y Tian, Y Yang
Journal of medical systems 40 (11), 231, 2016
322016
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
S Kumari, AK Das, X Li, F Wu, MK Khan, Q Jiang, SKH Islam
Multimedia Tools and Applications 77 (2), 2359-2389, 2018
312018
The system can't perform the operation now. Try again later.
Articles 1–20