Xiaohui Liang
Smart community: an internet of things application
X Li, R Lu, X Liang, X Shen, J Chen, X Lin
IEEE Communications magazine 49 (11), 68-75, 2011
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
R Lu, X Liang, X Li, X Lin, X Shen
IEEE Transactions on Parallel and Distributed Systems 23 (9), 1621-1631, 2012
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
R Lu, X Lin, TH Luan, X Liang, X Shen
IEEE transactions on vehicular technology 61 (1), 86-96, 2011
Security and privacy in smart city applications: Challenges and solutions
K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen
IEEE Communications Magazine 55 (1), 122-129, 2017
Secure provenance: the essential of bread and butter of data forensics in cloud computing
R Lu, X Lin, X Liang, XS Shen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
Securing smart grid: cyber attacks, countermeasures, and challenges
X Li, X Liang, R Lu, X Shen, X Lin, H Zhu
IEEE Communications Magazine 50 (8), 38-45, 2012
GRS: The green, reliability, and security of emerging machine to machine communications
R Lu, X Li, X Liang, X Shen, X Lin
IEEE communications magazine 49 (4), 28-35, 2011
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Progress in Cryptology-INDOCRYPT 2008, 426-436, 2008
Sybil attacks and their defenses in the internet of things
K Zhang, X Liang, R Lu, X Shen
IEEE Internet of Things Journal 1 (5), 372-383, 2014
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
H Li, X Lin, H Yang, X Liang, R Lu, X Shen
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053-2064, 2013
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
H Li, Y Yang, TH Luan, X Liang, L Zhou, XS Shen
IEEE Transactions on Dependable and Secure Computing 13 (3), 312-325, 2015
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs
R Lu, X Lin, X Liang, X Shen
Intelligent Transportation Systems, IEEE Transactions on 13 (1), 127-139, 2012
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
R Lu, X Lin, H Zhu, X Liang, XS Shen
Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
X Liang, X Li, R Lu, X Lin, X Shen
IEEE Transactions on smart grid 4 (1), 141-150, 2013
A secure handshake scheme with symptoms-matching for mhealthcare social network
R Lu, X Lin, X Liang, X Shen
Mobile Networks and Applications 16 (6), 683-694, 2011
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, X Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
Provably secure and efficient bounded ciphertext policy attribute based encryption
X Liang, Z Cao, H Lin, D Xing
Proceedings of the 4th international symposium on information, computer, and …, 2009
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
M Barua, X Liang, R Lu, X Shen
International Journal of Security and Networks 6 (2-3), 67-76, 2011
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20