Search filters

List of works by Xiong Li

A Collaboration Platform for Effective Task and Data Reporter Selection in Crowdsourcing Network

scientific article published in 2019

A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT

scientific article published in 2022

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

scholarly article published June 2018

A Traceable and Anonymous Data Aggregation Scheme with Fog Computing Devices for Smart Grid

scientific article published on 22 June 2022

A certificateless aggregate signature scheme for healthcare wireless sensor network

article

A password based authentication scheme for wireless multimedia systems

A provably secure and anonymous message authentication scheme for smart grids

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city

article

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Comments on “A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data”

scientific article published in 2020

Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs

scientific article published on 18 May 2022

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

scientific article published on 05 September 2015

Geographic wormhole detection in wireless sensor networks

scientific article

Heterogeneous Participant Recruitment for Comprehensive Vehicle Sensing.

scientific article published on 25 September 2015

Imitation Learning Based Heavy-Hitter Scheduling Scheme in Software-Defined Industrial Networks

scientific article published in 2022

Medical image classification based on multi-scale non-negative sparse coding

scientific article published on 27 May 2017

On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage

scientific article published on 24 September 2020

Revised anonymous authentication protocol for adaptive client‐server infrastructure

scientific article published on 9 January 2020

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications

scientific article published on 12 October 2016

Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'

scientific article published on 11 August 2015