Bitcoin and blockchain: Security and privacy E Zaghloul, T Li, MW Mutka, J Ren IEEE Internet of Things Journal 7 (10), 10288-10313, 2020 | 213 | 2020 |
The handbook of technology management: Supply chain management, marketing and advertising, and global management JRTL H Bidgoli | 200 | 2010 |
Handbook of information security, information warfare, social, legal, and international issues and security foundations H Bidgoli John Wiley & Sons, 2006 | 195 | 2006 |
Source-location privacy through dynamic routing in wireless sensor networks Y Li, J Ren 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 141 | 2010 |
Survey on anonymous communications in computer networks J Ren, J Wu Computer Communications 33 (4), 420-431, 2010 | 135 | 2010 |
Quantitative measurement and design of source-location privacy schemes for wireless sensor networks Y Li, J Ren, J Wu IEEE Transactions on Parallel and Distributed Systems 23 (7), 1302-1311, 2011 | 130 | 2011 |
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard A Alahmadi, M Abdelhakim, J Ren, T Li IEEE transactions on information forensics and security 9 (5), 772-781, 2014 | 125 | 2014 |
Generalized digital certificate for user authentication and key establishment for secure communications L Harn, J Ren IEEE Transactions on Wireless Communications 10 (7), 2372-2379, 2011 | 125 | 2011 |
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong International Journal of Information Security 14, 307-318, 2015 | 107 | 2015 |
Preserving source-location privacy in wireless sensor networks Y Li, J Ren 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009 | 107 | 2009 |
PassBio: Privacy-preserving user-centric biometric authentication K Zhou, J Ren IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018 | 106 | 2018 |
Cost-aware secure routing (CASER) protocol design for wireless sensor networks D Tang, T Li, J Ren, J Wu IEEE Transactions on Parallel and Distributed Systems 26 (4), 960-973, 2014 | 104 | 2014 |
Distributed detection in mobile access wireless sensor networks under byzantine attacks M Abdelhakim, LE Lightfoot, J Ren, T Li IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013 | 71 | 2013 |
Preserving source-location privacy in wireless sensor network using STaR routing L Lightfoot, Y Li, J Ren 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 66 | 2010 |
Secure wireless monitoring and control systems for smart grid and smart home T Li, J Ren, X Tang IEEE Wireless Communications 19 (3), 66-73, 2012 | 63 | 2012 |
Design of DL-based certificateless digital signatures L Harn, J Ren, C Lin Journal of Systems and Software 82 (5), 789-793, 2009 | 63 | 2009 |
Hop-by-hop message authenticationand source privacy in wirelesssensor networks J Li, Y Li, J Ren, J Wu IEEE transactions on parallel and distributed systems 25 (5), 1223-1232, 2013 | 61 | 2013 |
ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing K Zhou, MH Afifi, J Ren IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017 | 60 | 2017 |
Provable ownership of files in deduplication cloud storage C Yang, J Ren, J Ma Security and Communication Networks 8 (14), 2457-2468, 2015 | 58 | 2015 |
Message-driven frequency hopping: Design and analysis Q Ling, T Li IEEE transactions on wireless communications 8 (4), 1773-1782, 2009 | 56 | 2009 |