Efficient certificateless conditional privacy-preserving authentication for VANETs X Zhou, M Luo, P Vijayakumar, C Peng, D He IEEE Transactions on Vehicular Technology 71 (7), 7863-7875, 2022 | 58 | 2022 |
Efficient and provably secure multi-receiver signcryption scheme for multicast communication in edge computing C Peng, J Chen, MS Obaidat, P Vijayakumar, D He IEEE Internet of Things Journal 7 (7), 6056-6068, 2019 | 49 | 2019 |
An efficient privacy-preserving aggregation scheme for multidimensional data in IoT C Peng, M Luo, H Wang, MK Khan, D He IEEE Internet of Things Journal 9 (1), 589-600, 2021 | 27 | 2021 |
Efficient certificateless online/offline signature scheme for wireless body area networks C Peng, M Luo, L Li, KKR Choo, D He IEEE Internet of Things Journal 8 (18), 14287-14298, 2021 | 22 | 2021 |
EPRT: an efficient privacy-preserving medical service recommendation and trust discovery scheme for eHealth system C Peng, D He, J Chen, N Kumar, MK Khan ACM Transactions on Internet Technology (TOIT) 21 (3), 1-24, 2021 | 17 | 2021 |
Isogeny-based cryptography: a promising post-quantum technique C Peng, J Chen, S Zeadally, D He IT Professional 21 (6), 27-32, 2019 | 16 | 2019 |
A secure certificateless signcryption scheme without pairing for internet of medical things X Chen, D He, MK Khan, M Luo, C Peng IEEE Internet of Things Journal 10 (10), 9136-9147, 2022 | 15 | 2022 |
CsiIBS: A post-quantum identity-based signature scheme based on isogenies C Peng, J Chen, L Zhou, KKR Choo, D He Journal of information Security and Applications 54, 102504, 2020 | 14 | 2020 |
Multifunctional and multidimensional secure data aggregation scheme in wsns C Peng, M Luo, P Vijayakumar, D He, O Said, A Tolba IEEE Internet of Things Journal 9 (4), 2657-2668, 2021 | 12 | 2021 |
Efficient certificateless designated verifier proxy signature scheme using UAV network for sustainable smart city Z Xu, M Luo, P Vijayakumar, C Peng, L Wang Sustainable Cities and Society 80, 103771, 2022 | 11 | 2022 |
Efficient distributed decryption scheme for IoT gateway-based applications C Peng, J Chen, P Vijayakumar, N Kumar, D He ACM Transactions on Internet Technology (TOIT) 21 (1), 1-23, 2021 | 9 | 2021 |
A security-enhanced pairing-free certificateless aggregate signature for vehicular Ad-Hoc networks H Zheng, M Luo, Y Zhang, C Peng, Q Feng IEEE Systems Journal, 2022 | 8 | 2022 |
A Lightweight Blockchain‐based Public‐Key Authenticated Encryption with Multi‐Keyword Search for Cloud Computing H Du, J Chen, F Lin, C Peng, D He Security and Communication Networks 2022 (1), 2309834, 2022 | 7 | 2022 |
An efficient password authentication scheme using smart card based on elliptic curve cryptography Y Zhang, J Chen, B Huang, C Peng Information Technology And Control 43 (4), 390-401, 2014 | 7 | 2014 |
A group signature scheme with selective linkability and traceability for blockchain-based data sharing systems in E-health services Z Bao, D He, H Wang, M Luo, C Peng IEEE Internet of Things Journal, 2023 | 6 | 2023 |
An efficient decentralized identity management system based on range proof for social networks X Zhu, D He, Z Bao, M Luo, C Peng IEEE Open Journal of the Computer Society 4, 84-96, 2023 | 6 | 2023 |
A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing H Du, J Chen, M Chen, C Peng, D He Wireless Communications and Mobile Computing 2022 (1), 2336685, 2022 | 6 | 2022 |
Isoga: an isogeny-based quantum-resist searchable encryption scheme against keyword guessing attacks Q Fan, D He, J Chen, C Peng, L Wang IEEE Systems Journal, 2022 | 5 | 2022 |
The applications of blockchain in the covert communication B Du, D He, M Luo, C Peng, Q Feng Wireless Communications and Mobile Computing 2022 (1), 4618007, 2022 | 4 | 2022 |
Sanitizable signature scheme with privacy protection for electronic medical data sharing Z Xu, M Luo, C Peng, Q Feng Cyber Security and Applications 1, 100018, 2023 | 3 | 2023 |