Chunhua Jin

ORCID: 0000-0002-1667-1410
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • Cloud Data Security Solutions
  • Complexity and Algorithms in Graphs
  • User Authentication and Security Systems
  • Blockchain Technology Applications and Security
  • Wireless Body Area Networks
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Emotion and Mood Recognition
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Face and Expression Recognition
  • IoT and Edge/Fog Computing
  • Digital Rights Management and Security
  • Face recognition and analysis
  • RFID technology advancements
  • Coding theory and cryptography
  • Advanced Data and IoT Technologies
  • Advanced Image and Video Retrieval Techniques
  • Remote Sensing and LiDAR Applications
  • Infrastructure Maintenance and Monitoring
  • Algorithms and Data Compression

Huaiyin Institute of Technology
2017-2025

University of Electronic Science and Technology of China
2013-2018

Electronic health record (EHR) has recorded the process of occurrence, development, and treatment diseases. So it high medical value. Owing to private sensitive nature data for patients, sharing privacy preservation are critical issues in EHR. Blockchain technology may be a promising solution problems above since holds features decentralization tamper resistance. In paper, we propose protection scheme based on hospital's blockchain improve electronic system hospital. Firstly, can satisfy...

10.1109/access.2019.2937685 article EN cc-by IEEE Access 2019-01-01

Wireless sensor network (WSN) plays an important role in military sensing and tracking, target environment monitoring. To query of the to get useful information from anywhere anytime, we need integrate WSN into Internet as part Things (IoT). In this case, it is task design access control scheme that can authorize, authenticate revoke a user WSN. paper, propose heterogeneous signcryption behavior users. We give formal security proof our random oracle model. An characteristic allow...

10.1016/j.comcom.2016.03.007 article EN cc-by-nc-nd Computer Communications 2016-03-15

Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, ubiquitous healthcare system. Only authorized users can access network since collected data by WBANs used diagnosed treated. However, it is still challenging task design cost-effective secure control scheme because of inherent characteristics WBANs, such as open medium channel, limited resources sensor nodes, absence fixed infrastructure. In this...

10.1109/jsyst.2016.2557850 article EN IEEE Systems Journal 2016-05-23

The Internet of Things (IoT) is an emerging network paradigm that aims to obtain the interactions among pervasive things through heterogeneous networks. Security important task in IoT. Luo et al. (Secur Commun Netw 7(10): 1560–1569, 2014) proposed a certificateless online/offline signcryption (COOSC) scheme for IoT (hereafter called LTX). Unfortunately, Shi showed LTX not secure. An adversary can easily private key user by ciphertext. Recently, Li new COOSC LZZ). However, both and LZZ need...

10.1007/s11276-015-1145-3 article EN cc-by Wireless Networks 2015-12-12

10.1016/j.compeleceng.2013.12.003 article EN Computers & Electrical Engineering 2014-01-03

A smart grid, considered the next-generation type of power combines a traditional grid with information and communication technologies to effectively facilitate generation ensure transmission security reliability in real-time. Only authorized consumers should be able access because gathered by meters includes users' private information. However, is still challenge. Motivated this challenge, paper, we propose heterogeneous signcryption (HSC) scheme for secure between utility. We demonstrate...

10.1371/journal.pone.0208311 article EN cc-by PLoS ONE 2018-12-18

An authenticated encryption (AE) scheme simultaneously achieves two security goals: confidentiality and authenticity. AE can be divided into symmetric asymmetrical (public key) AE. In a scheme, deniability is gained automatically. However, public key not gain automatically; on the contrary, it provides non-repudiation. this paper, we address question of Of course, achieve goal by “deniable authentication followed encryption” method. such method has following weaknesses: (1) computational...

10.1007/s11235-015-0099-1 article EN cc-by Telecommunication Systems 2015-10-22
Coming Soon ...