- Cryptography and Data Security
- Advanced Authentication Protocols Security
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Cloud Data Security Solutions
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Residue Arithmetic
- Complexity and Algorithms in Graphs
- Security in Wireless Sensor Networks
- Internet Traffic Analysis and Secure E-voting
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- Coding theory and cryptography
- Biometric Identification and Security
- Security and Verification in Computing
- Smart Grid Security and Resilience
- Advanced Steganography and Watermarking Techniques
- Advanced Malware Detection Techniques
- RFID technology advancements
- Digital Rights Management and Security
- Quantum Computing Algorithms and Architecture
- Network Security and Intrusion Detection
- Wireless Body Area Networks
Wuhan University
2016-2025
Qilu University of Technology
2021-2025
Shandong Academy of Sciences
2021-2025
Hangzhou Normal University
2022-2024
State Key Laboratory of Cryptology
2016-2023
Beihang University
2022-2023
Peng Cheng Laboratory
2019-2022
Shanghai Huali Microelectronics (China)
2022
Guilin University of Electronic Technology
2016-2021
Wuchang University of Technology
2021
By broadcasting messages about traffic status to vehicles wirelessly, a vehicular ad hoc network (VANET) can improve safety and efficiency. To guarantee secure communication in VANETs, security privacy issues must be addressed before their deployment. The conditional privacy-preserving authentication (CPPA) scheme is suitable for solving problems because it supports both mutual protection simultaneously. Many identity-based CPPA schemes VANETs using bilinear pairings have been proposed over...
Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the body area network (WBAN) to become a promising networking paradigm. Over last decade, as an important part of Internet Things, we witnessed WBANs playing increasing role modern medical systems because its capabilities collect real-time biomedical data through intelligent sensors or around patients' send collected remote personnel for clinical diagnostics. not only bring us conveniences...
Despite two decades of intensive research, it remains a challenge to design practical anonymous two-factor authentication scheme, for the designers are confronted with an impressive list security requirements (e.g., resistance smart card loss attack) and desirable attributes local password update). Numerous solutions have been proposed, yet most them shortly found either unable satisfy some critical or short few important features. To overcome this unsatisfactory situation, researchers often...
The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment. To satisfy requirement of practical applications, many schemes using passwords and smart cards have been proposed. However, might be divulged or forgotten, shared, lost, stolen. In contrast, biometric methods, such as fingerprints iris scans, no drawbacks. Therefore, biometrics-based gain wide attention. this paper, we...
A recent trend in both industry and research is the Internet of Drones, which has applications civilian military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security mind, there fundamental privacy issues that need study. Hence, this article, we study architecture its requirements. We also outline potential solutions to address challenging such leakage, data confidentiality protection, flexible accessibility, hope article will provide...
Advances in information and communication technologies have led to the emergence of Internet Things (IoT). In healthcare environment, use IoT brings convenience physicians patients as they can be applied various medical areas (such constant real-time monitoring, patient management, emergency blood health management). The radio-frequency identification (RFID) technology is one core deployments environment. To satisfy security requirements RFID IoT, many authentication schemes been proposed...
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of components Things, and become globally addressable by any entity connected to Internet. Despite great potential this integration, it also brings new threats, such exposure nodes attacks originating from In context, lightweight authentication key agreement protocols must in place enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual protocol for WSNs. However, we...
Data sharing in cloud computing enables multiple participants to freely share the group data, which improves efficiency of work cooperative environments and has widespread potential applications. However, how ensure security data within a efficiently outsourced manner are formidable challenges. Note that key agreement protocols have played very important role secure efficient computing. In this paper, by taking advantage symmetric balanced incomplete block design (SBIBD), we present novel...
Achieving low latency and providing real-time services are two of several key challenges in conventional cloud-based smart grid systems, hence, there has been an increasing trend moving to edge computing. While have a number cryptographic protocols designed facilitate secure communications existing generally do not support conditional anonymity flexible management. Thus, this article, we introduce blockchain-based mutual authentication agreement protocol for edge-computing-based systems....
Wireless body area networks (WBANs) consist of many small low-power sensors, through which users could monitor the real-time parameters patients' physiology remotely. This capability improve medical care and monitoring patients. WBAN devices typically have limited computing, storage, power, communication capabilities. These limitations restrict applications that WBANs can support. To enhance capabilities WBANs, concept cloud-assisted has been introduced recently. By using cloud computing...
With the widespread adoption of Internet Things and cloud computing in different industry sectors, an increasing number individuals or organizations are outsourcing their Industrial (IIoT) data server to achieve cost saving collaboration (e.g., sharing). However, this environment, preserving privacy remains a key challenge inhibiting factor even wider IIoT environment. To mitigate these issues, paper, we design new secure channel-free certificateless searchable public encryption with...
Recent advances in healthcare technologies along with improved medical care have led to a steady increase life expectancy over the past few decades. As result, we been witnessing significant growth number of elderly people around world. Ensuring comfortable living environment for has gained much attention recent years. By leveraging information and communication technologies, AAL system shows great promise satisfying many requirements enables them live safely, securely, healthily,...
If all vehicles are connected together through a wireless communication channel, vehicular ad hoc networks (VANETs) can support wide range of real-time traffic information services, such as intelligent routing, weather monitoring, emergency call, etc. However, the accuracy and credibility transmitted messages among VANETs paramount importance life may depend on it. In this article we introduce novel framework called blockchain-assisted privacy-preserving authentication system (BPAS) that...
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and widely used in consumer Mass Storage Devices (MSDs). While current USB MSDs provide relatively high transmission speed are convenient to carry, the use of has been prohibited many commercial everyday environments primarily due security concerns. Security protocols have previously proposed a recent approach utilize multi-factor authentication. This paper proposes significant...
Industrial Internet of Things (IIoT) integrates various types intelligent terminals, mobile devices, and communication technologies to enable the upgrade traditional industries industries. IIoT relies on powerful data processing capabilities cloud computing reduce cost on-demand services as per requirements users. However, privacy confidentiality outsourced should be protected in this environment because are typically "handled" by a third-party service provider. An encryption technique can...