Xiong Li
Xiong Li
Verified email at hnust.edu.cn - Homepage
TitleCited byYear
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X Li, JW Niu, J Ma, WD Wang, CL Liu
Journal of network and computer applications 34 (1), 73-79, 2011
2342011
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X Li, Y Xiong, J Ma, W Wang
Journal of Network and Computer Applications 35 (2), 763-769, 2012
2152012
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
1932013
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment
X Li, J Ma, W Wang, Y Xiong, J Zhang
Mathematical and Computer Modelling 58 (1-2), 85-95, 2013
1622013
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
982017
An improved remote user authentication scheme with key agreement
S Kumari, MK Khan, X Li
Computers & Electrical Engineering 40 (6), 1997-2012, 2014
852014
A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications, 2018
832018
Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update
X Li, J Niu, J Liao, W Liang
International Journal of Communication Systems 28 (2), 374-382, 2015
752015
An enhancement of a smart card authentication scheme for multi-server architecture
X Li, J Niu, S Kumari, J Liao, W Liang
Wireless Personal Communications 80 (1), 175-192, 2015
732015
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks
F Wu, L Xu, S Kumari, X Li
Computers & Electrical Engineering 45, 274-285, 2015
702015
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan
Future Generation Computer Systems 63, 56-75, 2016
672016
Applying biometrics to design three‐factor remote user authentication scheme with key agreement
X Li, J Niu, Z Wang, C Chen
Security and Communication Networks 7 (10), 1488-1497, 2014
652014
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2018
642018
An improved smart card based authentication scheme for session initiation protocol
S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan
Peer-to-Peer Networking and Applications 10 (1), 92-105, 2017
632017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
582017
Medical JPEG image steganography based on preserving inter-block dependencies
X Liao, J Yin, S Guo, X Li, AK Sangaiah
Computers & Electrical Engineering 67, 320-329, 2018
562018
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
552017
A robust biometrics based three-factor authentication scheme for global mobility networks in smart city
X Li, J Niu, S Kumari, F Wu, KKR Choo
Future Generation Computer Systems 83, 607-618, 2018
532018
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
X Li, J Niu, S Kumari, J Liao, W Liang, MK Khan
Security and Communication Networks 9 (15), 2643-2655, 2016
492016
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
F Wu, L Xu, S Kumari, X Li
Journal of Ambient Intelligence and Humanized Computing 8 (1), 101-116, 2017
432017
The system can't perform the operation now. Try again later.
Articles 1–20