Jian Shen
TitleCited byYear
A novel routing protocol providing good transmission reliability in underwater sensor networks
J Shen, HW Tan, J Wang, JW Wang, SY Lee
網際網路技術學刊 16 (1), 171-178, 2015
4102015
Mutual verifiable provable data auditing in public cloud storage
YJ Ren, J Shen, J Wang, J Han, SY Lee
網際網路技術學刊 16 (2), 317-323, 2015
3782015
A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment
Q Liu, W Cai, J Shen, Z Fu, X Liu, N Linge
Security and Communication Networks 9 (17), 4002-4012, 2016
1662016
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
1492017
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang
Journal of Network and Computer Applications 106, 117-123, 2018
1092018
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future generation computer systems 78, 956-963, 2018
992018
An ID-based linearly homomorphic signature scheme and its application in blockchain
Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang
IEEE Access 6, 20632-20640, 2018
882018
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
882017
Routing protocols in delay tolerant networks: A comparative survey
J Shen, S Moh, I Chung
The 23rd International Technical Conference on Circuits/Systems, Computers …, 2008
792008
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
J Shen, D Liu, J Shen, Q Liu, X Sun
Pervasive and mobile Computing 41, 219-230, 2017
782017
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2017
702017
Enhanced secure sensor association and key management in wireless body area networks
J Shen, H Tan, S Moh, I Chung, Q Liu, X Sun
Journal of Communications and Networks 17 (5), 453-462, 2015
702015
$$\varvec {\textit {}} $$: a $$ k $$ k-degree anonymity with vertex and edge modification algorithm
T Ma, Y Zhang, J Cao, J Shen, M Tang, Y Tian, A Al-Dhelaan, ...
Computing 97 (12), 1165-1184, 2015
652015
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
602016
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
582017
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
582016
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
562017
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
552017
Secure intelligent traffic light control using fog computing
J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen
Future Generation Computer Systems 78, 817-824, 2018
522018
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1061-1073, 2018
472018
The system can't perform the operation now. Try again later.
Articles 1–20