Efficient certificateless conditional privacy-preserving authentication for VANETs X Zhou, M Luo, P Vijayakumar, C Peng, D He IEEE Transactions on Vehicular Technology 71 (7), 7863-7875, 2022 | 93 | 2022 |
Efficient and provably secure multi-receiver signcryption scheme for multicast communication in edge computing C Peng, J Chen, MS Obaidat, P Vijayakumar, D He IEEE Internet of Things Journal 7 (7), 6056-6068, 2019 | 58 | 2019 |
An efficient privacy-preserving aggregation scheme for multidimensional data in IoT C Peng, M Luo, H Wang, MK Khan, D He IEEE Internet of Things Journal 9 (1), 589-600, 2021 | 39 | 2021 |
Isogeny-based cryptography: a promising post-quantum technique C Peng, J Chen, S Zeadally, D He IT Professional 21 (6), 27-32, 2019 | 30 | 2019 |
Efficient certificateless online/offline signature scheme for wireless body area networks C Peng, M Luo, L Li, KKR Choo, D He IEEE Internet of Things Journal 8 (18), 14287-14298, 2021 | 26 | 2021 |
A secure certificateless signcryption scheme without pairing for internet of medical things X Chen, D He, MK Khan, M Luo, C Peng IEEE Internet of Things Journal 10 (10), 9136-9147, 2022 | 23 | 2022 |
EPRT: an efficient privacy-preserving medical service recommendation and trust discovery scheme for eHealth system C Peng, D He, J Chen, N Kumar, MK Khan ACM Transactions on Internet Technology (TOIT) 21 (3), 1-24, 2021 | 21 | 2021 |
Multifunctional and multidimensional secure data aggregation scheme in WSNs C Peng, M Luo, P Vijayakumar, D He, O Said, A Tolba IEEE Internet of Things Journal 9 (4), 2657-2668, 2021 | 20 | 2021 |
A group signature scheme with selective linkability and traceability for blockchain-based data sharing systems in e-health services Z Bao, D He, H Wang, M Luo, C Peng IEEE Internet of Things Journal 10 (23), 21115-21128, 2023 | 18 | 2023 |
Efficient certificateless designated verifier proxy signature scheme using UAV network for sustainable smart city Z Xu, M Luo, P Vijayakumar, C Peng, L Wang Sustainable Cities and Society 80, 103771, 2022 | 18 | 2022 |
CsiIBS: a post-quantum identity-based signature scheme based on isogenies C Peng, J Chen, L Zhou, KKR Choo, D He Journal of information Security and Applications 54, 102504, 2020 | 16 | 2020 |
A security-enhanced pairing-free certificateless aggregate signature for vehicular Ad-Hoc networks H Zheng, M Luo, Y Zhang, C Peng, Q Feng IEEE Systems Journal 17 (3), 3822-3833, 2022 | 13 | 2022 |
A Lightweight Blockchain‐based Public‐Key Authenticated Encryption with Multi‐Keyword Search for Cloud Computing H Du, J Chen, F Lin, C Peng, D He Security and Communication Networks 2022 (1), 2309834, 2022 | 13 | 2022 |
A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing H Du, J Chen, M Chen, C Peng, D He Wireless Communications and Mobile Computing 2022 (1), 2336685, 2022 | 10 | 2022 |
BAP: A blockchain-assisted privacy-preserving authentication protocol with user-controlled data linkability for VANETs Z Bao, D He, H Wang, M Luo, C Peng IEEE Transactions on Intelligent Vehicles 9 (2), 4206-4220, 2023 | 9 | 2023 |
Efficient distributed decryption scheme for IoT gateway-based applications C Peng, J Chen, P Vijayakumar, N Kumar, D He ACM Transactions on Internet Technology (TOIT) 21 (1), 1-23, 2021 | 9 | 2021 |
Multi-party privacy-preserving faster r-cnn framework for object detection R Wang, M Luo, Q Feng, C Peng, D He IEEE Transactions on Emerging Topics in Computational Intelligence 8 (1 …, 2023 | 8 | 2023 |
An efficient decentralized identity management system based on range proof for social networks X Zhu, D He, Z Bao, M Luo, C Peng IEEE Open Journal of the Computer Society 4, 84-96, 2023 | 8 | 2023 |
The applications of blockchain in the covert communication B Du, D He, M Luo, C Peng, Q Feng Wireless Communications and Mobile Computing 2022 (1), 4618007, 2022 | 8 | 2022 |
An efficient password authentication scheme using smart card based on elliptic curve cryptography Y Zhang, J Chen, B Huang, C Peng Information Technology And Control 43 (4), 390-401, 2014 | 8 | 2014 |