- Cryptography and Data Security
- Advanced Authentication Protocols Security
- Cryptographic Implementations and Security
- Security in Wireless Sensor Networks
- Cloud Data Security Solutions
- Complexity and Algorithms in Graphs
- User Authentication and Security Systems
- Blockchain Technology Applications and Security
- Wireless Body Area Networks
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Emotion and Mood Recognition
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Face and Expression Recognition
- IoT and Edge/Fog Computing
- Digital Rights Management and Security
- Face recognition and analysis
- RFID technology advancements
- Coding theory and cryptography
- Advanced Data and IoT Technologies
- Advanced Image and Video Retrieval Techniques
- Remote Sensing and LiDAR Applications
- Infrastructure Maintenance and Monitoring
- Algorithms and Data Compression
Huaiyin Institute of Technology
2017-2025
University of Electronic Science and Technology of China
2013-2018
Electronic health record (EHR) has recorded the process of occurrence, development, and treatment diseases. So it high medical value. Owing to private sensitive nature data for patients, sharing privacy preservation are critical issues in EHR. Blockchain technology may be a promising solution problems above since holds features decentralization tamper resistance. In paper, we propose protection scheme based on hospital's blockchain improve electronic system hospital. Firstly, can satisfy...
Wireless sensor network (WSN) plays an important role in military sensing and tracking, target environment monitoring. To query of the to get useful information from anywhere anytime, we need integrate WSN into Internet as part Things (IoT). In this case, it is task design access control scheme that can authorize, authenticate revoke a user WSN. paper, propose heterogeneous signcryption behavior users. We give formal security proof our random oracle model. An characteristic allow...
Wireless body area networks (WBANs) are expected to play an important role in monitoring the health information and creating a smart, reliable, ubiquitous healthcare system. Only authorized users can access network since collected data by WBANs used diagnosed treated. However, it is still challenging task design cost-effective secure control scheme because of inherent characteristics WBANs, such as open medium channel, limited resources sensor nodes, absence fixed infrastructure. In this...
The Internet of Things (IoT) is an emerging network paradigm that aims to obtain the interactions among pervasive things through heterogeneous networks. Security important task in IoT. Luo et al. (Secur Commun Netw 7(10): 1560–1569, 2014) proposed a certificateless online/offline signcryption (COOSC) scheme for IoT (hereafter called LTX). Unfortunately, Shi showed LTX not secure. An adversary can easily private key user by ciphertext. Recently, Li new COOSC LZZ). However, both and LZZ need...
A smart grid, considered the next-generation type of power combines a traditional grid with information and communication technologies to effectively facilitate generation ensure transmission security reliability in real-time. Only authorized consumers should be able access because gathered by meters includes users' private information. However, is still challenge. Motivated this challenge, paper, we propose heterogeneous signcryption (HSC) scheme for secure between utility. We demonstrate...
An authenticated encryption (AE) scheme simultaneously achieves two security goals: confidentiality and authenticity. AE can be divided into symmetric asymmetrical (public key) AE. In a scheme, deniability is gained automatically. However, public key not gain automatically; on the contrary, it provides non-repudiation. this paper, we address question of Of course, achieve goal by “deniable authentication followed encryption” method. such method has following weaknesses: (1) computational...