default search action
Fagen Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j177]Quan Peng, Xingbing Fu, Fei Lin, Xiatian Zhu, Jianting Ning, Fagen Li:
Multi-Scale Convolutional Neural Networks optimized by elite strategy dung beetle optimization algorithm for encrypted traffic classification. Expert Syst. Appl. 264: 125729 (2025) - [j176]Nabeil Eltayieb, Rashad Elhabob, Abdeldime M. S. Abdelgader, Yongjian Liao, Fagen Li, Shijie Zhou:
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing. Future Gener. Comput. Syst. 162: 107478 (2025) - [j175]Ling Xiong, Qiang Li, Lele Tang, Fagen Li, Xingchun Yang:
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks. Future Gener. Comput. Syst. 163: 107530 (2025) - 2024
- [j174]Jayaprakash Kar, Xiaoguang Liu, Fagen Li:
LA-IMDCN: A Lightweight Authentication Scheme With Smart Contract in Implantable Medical Device Communication Networks. IEEE Access 12: 99694-99703 (2024) - [j173]Junpeng He, Lingfeng Yao, Xiong Li, Muhammad Khurram Khan, Weina Niu, Xiaosong Zhang, Fagen Li:
Model-agnostic generation-enhanced technology for few-shot intrusion detection. Appl. Intell. 54(4): 3181-3204 (2024) - [j172]Hayelom Gebrye, Yong Wang, Fagen Li:
Computer vision based distributed denial of service attack detection for resource-limited devices. Comput. Electr. Eng. 120: 109716 (2024) - [j171]Xingbing Fu, Chaofan Jiang, Chaorong Li, Jiangtao Li, Xiatian Zhu, Fagen Li:
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks. Expert Syst. Appl. 249: 123675 (2024) - [j170]Ying Xie, Ke Huang, Sheng Yuan, Xiong Li, Fagen Li:
Versatile Remote Data Checking Scheme for Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(7): 12346-12361 (2024) - [j169]Yin Zhang, Ling Xiong, Fagen Li, Yukai Hao, Zhicai Liu:
Blockchain-Based Privacy-Preserving Authentication With Hierarchical Access Control Using Polynomial Commitment for Mobile Cloud Computing. IEEE Internet Things J. 11(10): 18266-18280 (2024) - [j168]Ying Xie, Xian Huang, Feng Qin, Fagen Li, Xuyang Ding:
A majority affiliation based under-sampling method for class imbalance problem. Inf. Sci. 662: 120263 (2024) - [j167]Nabeil Eltayieb, Rashad Elhabob, Yongjian Liao, Fagen Li, Shijie Zhou:
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. J. Inf. Secur. Appl. 83: 103763 (2024) - [j166]Xinyan Wu, Jin Li, Huanwei Wang, Xiaoguang Liu, Weifeng Wu, Fagen Li:
A randomized encryption deduplication method against frequency attack. J. Inf. Secur. Appl. 83: 103774 (2024) - [j165]Lieyu Lv, Ling Xiong, Fagen Li:
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption. J. Inf. Secur. Appl. 84: 103805 (2024) - [j164]Qiming Hu, Huan Ye, Fagen Li, Chaosheng Feng:
An efficient secure interval test protocol for small integers. J. Inf. Secur. Appl. 87: 103894 (2024) - [j163]Axin Wu, Fagen Li, Xiangjun Xin, Yinghui Zhang, Jianhao Zhu:
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage. J. Syst. Archit. 149: 103104 (2024) - [j162]Tianyuan Zhang, Xiangjun Xin, Lei Sun, Chaoyang Li, Fagen Li:
Secure quantum signature scheme without entangled state. Quantum Inf. Process. 23(2): 49 (2024) - [j161]Fan He, Xiangjun Xin, Chaoyang Li, Fagen Li:
Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement. Quantum Inf. Process. 23(2): 51 (2024) - [j160]Jingting Xue, Shuqin Luo, Fagen Li, Wenzheng Zhang, Liang Liu, Yu Zhou, Xiaojun Zhang:
Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts. IEEE Trans. Cloud Comput. 12(4): 1232-1247 (2024) - [j159]Mohammed Raouf Senouci, Abdelkader Senouci, Fagen Li:
A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees. Telecommun. Syst. 85(3): 443-460 (2024) - [j158]Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li:
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability. Telecommun. Syst. 86(1): 213-227 (2024) - [j157]Ziqing Wang, Jin Li, Xiaoguang Liu, Xinyan Wu, Fagen Li:
A new construction of public key authenticated encryption with keyword search based on LWE. Telecommun. Syst. 86(2): 229-240 (2024) - [j156]Huan Ye, Fagen Li:
An anonymous broadcasting system with accountability based on group signatures. Telecommun. Syst. 87(2): 455-464 (2024) - [c31]Junpeng He, Hanyue Kong, Shihe Zhang, Xiong Li, Weina Niu, Xiaosong Zhang, Fagen Li:
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection. ICC 2024: 2047-2052 - 2023
- [j155]Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li:
Mitigation of a poisoning attack in federated learning by using historical distance detection. Ann. des Télécommunications 78(3-4): 135-147 (2023) - [j154]Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li:
A group key agreement protocol based on ECDH and short signature. J. Inf. Secur. Appl. 72: 103388 (2023) - [j153]Xiangyu Pan, Yuqiao Jin, Fagen Li:
An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles. J. Syst. Archit. 136: 102821 (2023) - [j152]Xinyan Wu, Huanwei Wang, Yangkai Yuan, Fagen Li:
A lightweight encrypted deduplication scheme supporting backup. J. Syst. Archit. 138: 102858 (2023) - [j151]Yin Zhang, Ling Xiong, Fagen Li, Xianhua Niu, Hanzhou Wu:
A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing. J. Syst. Archit. 142: 102949 (2023) - [j150]Fagen Li, Emmanuel Ahene, Mingwu Zhang, Fuchun Guo:
Guest editorial: Special issue on frontiers in cyber security. J. Syst. Archit. 145: 103027 (2023) - [j149]Xiaojuan Liao, Hui Zhang, Miyuki Koshimura, Rong Huang, Fagen Li:
Solving Restricted Preemptive Scheduling on Parallel Machines with SAT and PMS. J. Univers. Comput. Sci. 29(8): 911-937 (2023) - [j148]Hayelom Gebrye, Yong Wang, Fagen Li:
Traffic data extraction and labeling for machine learning based attack detection in IoT networks. Int. J. Mach. Learn. Cybern. 14(7): 2317-2332 (2023) - [j147]Egide Nkurunziza, Fagen Li:
HAP-SG: Heterogeneous authentication protocol for smart grid. Peer Peer Netw. Appl. 16(3): 1365-1379 (2023) - [j146]Jingting Xue, Lingjie Shi, Liang Liu, Xiaojun Zhang, Fagen Li:
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation. Peer Peer Netw. Appl. 16(6): 2761-2774 (2023) - [j145]Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Fagen Li:
ECAAP-SG: Efficient certificateless anonymous authentication protocol for SG. Secur. Priv. 6(1) (2023) - [j144]Ling Xiong, Tu Peng, Fagen Li, Shengke Zeng, Hanzhou Wu:
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT. IEEE Syst. J. 17(1): 38-49 (2023) - [j143]Yuyang Zhou, Zhebin Hu, Fagen Li:
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage. IEEE Trans. Cloud Comput. 11(1): 383-396 (2023) - [j142]Zhaosen Shi, Zeyu Yang, Alzubair Hassan, Fagen Li, Xuyang Ding:
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing. Telecommun. Syst. 82(3): 419-433 (2023) - [j141]Zhan Xie, Yong Chen, Ikram Ali, Chengwei Pan, Fagen Li, Wen He:
Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles. IEEE Trans. Veh. Technol. 72(5): 5642-5653 (2023) - [c30]Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma:
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections. ProvSec 2023: 44-63 - 2022
- [j140]Alzubair Hassan, Rafik Hamza, Fagen Li, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif:
A Secure User Authentication Protocol for Heterogeneous Mobile Environments. IEEE Access 10: 69757-69770 (2022) - [j139]Xingbing Fu, Yong Ding, Haifeng Li, Jianting Ning, Ting Wu, Fagen Li:
A survey of lattice based expressive attribute based encryption. Comput. Sci. Rev. 43: 100438 (2022) - [j138]Xuyang Ding, Xiaoxiang Wang, Ying Xie, Fagen Li:
A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things. IEEE Internet Things J. 9(3): 1818-1829 (2022) - [j137]Xiangyu Pan, Yuqiao Jin, Ziqing Wang, Fagen Li:
A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles. IEEE Internet Things J. 9(19): 19426-19437 (2022) - [j136]Yuyang Zhou, Liang Zhao, Yuqiao Jin, Fagen Li:
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf. Sci. 604: 80-96 (2022) - [j135]Xingbing Fu, Yinglun Wang, Lin You, Jianting Ning, Ziquan Hu, Fagen Li:
Offline/Online lattice-based ciphertext policy attribute-based encryption. J. Syst. Archit. 130: 102684 (2022) - [j134]Ziqing Wang, Zeyu Yang, Fagen Li:
A two rounds dynamic authenticated group key agreement protocol based on LWE. J. Syst. Archit. 133: 102756 (2022) - [j133]Xiangjun Xin, Li Ding, Chaoyang Li, Yongxuan Sang, Qinglan Yang, Fagen Li:
Quantum public-key designated verifier signature. Quantum Inf. Process. 21(1): 33 (2022) - [j132]Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu, Tu Peng:
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. IEEE Trans. Cloud Comput. 10(4): 2309-2323 (2022) - [j131]Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher:
A computationally efficient HMAC-based authentication scheme for network coding. Telecommun. Syst. 79(1): 47-69 (2022) - [j130]Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li:
A provably secure free-pairing certificateless searchable encryption scheme. Telecommun. Syst. 80(3): 383-395 (2022) - [e3]Emmanuel Ahene, Fagen Li:
Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings. Communications in Computer and Information Science 1726, Springer 2022, ISBN 978-981-19-8444-0 [contents] - 2021
- [j129]Xuyang Ding, Shuai Zhang, Mengkai Song, Xiaocong Ding, Fagen Li:
Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things. IEEE Internet Things J. 8(2): 802-812 (2021) - [j128]Jayaprakash Kar, Xiaoguang Liu, Fagen Li:
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. J. Inf. Secur. Appl. 61: 102905 (2021) - [j127]Haifeng Li, Yuxin Wang, Xingbing Fu, Caihui Lan, Caifen Wang, Fagen Li, He Guo:
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage. J. Inf. Secur. Appl. 61: 102927 (2021) - [j126]Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li:
Secure mobile health system supporting search function and decryption verification. J. Ambient Intell. Humaniz. Comput. 12(2): 2221-2231 (2021) - [j125]Yaqing Song, Chunxiang Xu, Yuan Zhang, Fagen Li:
Comments on an identity-based signature scheme for VANETs. J. Syst. Archit. 112: 101851 (2021) - [j124]Xiangyu Pan, Fagen Li:
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. J. Syst. Archit. 115: 102075 (2021) - [j123]Mengdi Ouyang, Ziqing Wang, Fagen Li:
Digital signature with cryptographic reverse firewalls. J. Syst. Archit. 116: 102029 (2021) - [j122]Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher:
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. J. Syst. Archit. 116: 102051 (2021) - [j121]Ziqing Wang, Dianhua Tang, Haomiao Yang, Fagen Li:
A public key encryption scheme based on a new variant of LWE with small cipher size. J. Syst. Archit. 117: 102165 (2021) - [j120]Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li:
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks. J. Syst. Archit. 119: 102271 (2021) - [c29]Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li:
Mitigation of poisoning attack in federated learning by using historical distance detection. CSNet 2021: 10-17 - [c28]Egide Nkurunziza, Mwitende Gervais, Lawrence Tandoh, Fagen Li:
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid. FCS 2021: 134-151 - [c27]Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh:
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. FCS 2021: 181-196 - 2020
- [j119]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j118]Xiaoguang Liu, Ziqing Wang, Yalan Ye, Fagen Li:
An efficient and practical certificateless signcryption scheme for wireless body area networks. Comput. Commun. 162: 169-178 (2020) - [j117]Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu:
Attribute Based Encryption with Efficient Revocation from Lattices. Int. J. Netw. Secur. 22(1): 161-170 (2020) - [j116]Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li:
A bandwidth efficient HMAC-based authentication scheme for network coding. J. Inf. Secur. Appl. 55: 102658 (2020) - [j115]Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li:
A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Archit. 102 (2020) - [j114]Xiaoyu Zheng, Yuyang Zhou, Yalan Ye, Fagen Li:
A cloud data deduplication scheme based on certificateless proxy re-encryption. J. Syst. Archit. 102 (2020) - [j113]Ikram Ali, Tandoh Lawrence, Fagen Li:
An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. J. Syst. Archit. 103: 101692 (2020) - [j112]Yuyang Zhou, Jing Guo, Fagen Li:
Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Archit. 109: 101754 (2020) - [j111]Abdelrhman Hassan, Yong Wang, Rashad Elhabob, Nabeil Eltayieb, Fagen Li:
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. J. Syst. Archit. 109: 101776 (2020) - [j110]Mwitende Gervais, Yalan Ye, Ikram Ali, Fagen Li:
Certificateless authenticated key agreement for blockchain-based WBANs. J. Syst. Archit. 110: 101777 (2020) - [j109]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020) - [j108]Xiangjun Xin, Zhuo Wang, Qinglan Yang, Fagen Li:
Quantum designated verifier signature based on Bell states. Quantum Inf. Process. 19(3): 79 (2020) - [j107]Xiangjun Xin, Qinglan Yang, Fagen Li:
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information. Quantum Inf. Process. 19(8): 233 (2020) - [j106]Haifeng Li, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, He Guo:
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing. Sensors 20(17): 4720 (2020) - [j105]Mwitende Gervais, Ikram Ali, Nabeil Eltayieb, Baocang Wang, Fagen Li:
Authenticated key agreement for blockchain-based WBAN. Telecommun. Syst. 74(3): 347-365 (2020) - [j104]Ikram Ali, Tandoh Lawrence, Anyembe Andrew Omala, Fagen Li:
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs. IEEE Trans. Veh. Technol. 69(10): 11266-11280 (2020) - [j103]Ikram Ali, Fagen Li:
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Veh. Commun. 22: 100228 (2020) - [j102]Fagen Li, Jiye Wang, Yuyang Zhou, Chunhua Jin, SK Hafizul Islam:
A heterogeneous user authentication and key establishment for mobile client-server environment. Wirel. Networks 26(2): 913-924 (2020) - [i9]Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li:
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT. IACR Cryptol. ePrint Arch. 2020: 143 (2020)
2010 – 2019
- 2019
- [j101]Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li:
A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments. IEEE Access 7: 109597-109611 (2019) - [j100]Yu Fan, Yongjian Liao, Fagen Li, Shijie Zhou, Ganglin Zhang:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - [j99]Xiaoguang Liu, Ziqing Wang, Chunhua Jin, Fagen Li, Gaoping Li:
A Blockchain-Based Medical Data Sharing and Protection Scheme. IEEE Access 7: 118943-118953 (2019) - [j98]Ling Xiong, Fagen Li, Shengke Zeng, Tu Peng, Zhicai Liu:
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures. IEEE Access 7: 125840-125853 (2019) - [j97]Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li:
Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Ann. des Télécommunications 74(7-8): 435-449 (2019) - [j96]Emmanuel Ahene, Zhangchi Qin, Akua Konadu Adusei, Fagen Li:
Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid. IEEE Internet Things J. 6(6): 9722-9737 (2019) - [j95]Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li:
An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Archit. 98: 165-172 (2019) - [j94]Ikram Ali, Mwitende Gervais, Emmanuel Ahene, Fagen Li:
A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J. Syst. Archit. 99 (2019) - [j93]Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li:
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity. Mob. Networks Appl. 24(3): 890-902 (2019) - [j92]Nabeil Eltayieb, Ping Wang, Alzubair Hassan, Rashad Elhabob, Fagen Li:
ASDS: Attribute-based secure data sharing scheme for reliable cloud environment. Secur. Priv. 2(2) (2019) - [j91]Emmanuel Ahene, Chunhua Jin, Fagen Li:
Certificateless deniably authenticated encryption and its application to e-voting system. Telecommun. Syst. 70(3): 417-434 (2019) - [j90]Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li:
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommun. Syst. 70(4): 491-510 (2019) - [j89]Ikram Ali, Alzubair Hassan, Fagen Li:
Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun. 16: 45-61 (2019) - [j88]Jiaojiao Hong, Bo Liu, Qianyuan Sun, Fagen Li:
A combined public-key scheme in the case of attribute-based for wireless body area networks. Wirel. Networks 25(2): 845-859 (2019) - [j87]Mutaz Elradi S. Saeed, Qun-Ying Liu, GuiYun Tian, Bin Gao, Fagen Li:
AKAIoTs: authenticated key agreement for Internet of Things. Wirel. Networks 25(6): 3081-3101 (2019) - [c26]Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
Cryptographic Reverse Firewalls for Identity-Based Encryption. FCS 2019: 36-52 - [c25]Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment. FCS 2019: 67-83 - [c24]Mwitende Gervais, Liang Sun, Ke Wang, Fagen Li:
Certificateless Authenticated Key Agreement for Decentralized WBANs. FCS 2019: 268-290 - [c23]Nabeil Eltayieb, Liang Sun, Ke Wang, Fagen Li:
A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain. FCS 2019: 293-307 - [c22]Alzubair Hassan, Rafik Hamza, Vittor Gift Mawutor, Akash Suresh Patil, Fagen Li:
A Lightweight Certificateless User Authentication Scheme for Mobile Environment. ML4CS 2019: 112-122 - [c21]Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
A Blockchain-Based Access Control Scheme for Smart Grids. NaNA 2019: 368-373 - [e2]Peeyush Chandra, Debasis Giri, Fagen Li, Samarjit Kar, Dipak Kumar Jana:
Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30 - November 1, 2017. Advances in Intelligent Systems and Computing 699, Springer 2019, ISBN 978-981-10-7589-6 [contents] - [i8]Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
A Blockchain-Based Access Control Scheme for Smart Grids. IACR Cryptol. ePrint Arch. 2019: 880 (2019) - 2018
- [j86]Yongjian Liao, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j85]Yongjian Liao, Yichuan He, Fagen Li, Shijie Zhou:
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces 56: 101-106 (2018) - [j84]SK Hafizul Islam, Mohammad S. Obaidat, Pandi Vijayakumar, Enas W. Abdulhay, Fagen Li, M. Krishna Chaitanya Reddy:
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Gener. Comput. Syst. 84: 216-227 (2018) - [j83]Chen Guo, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, Ting Wu:
Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing. Inf. 9(10): 242 (2018) - [j82]Mutaz Elradi S. Saeed, Qingyin Liu, Gui Yun Tian, Bin Gao, Fagen Li:
Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things. IEEE Internet Things J. 5(6): 4926-4944 (2018) - [j81]Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li:
An efficient certificateless user authentication and key exchange protocol for client-server environment. J. Ambient Intell. Humaniz. Comput. 9(6): 1713-1727 (2018) - [j80]Anyembe Andrew Omala, Angolo Shem Mbandu, Kamenyi Domenic Mutiria, Chunhua Jin, Fagen Li:
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. J. Medical Syst. 42(6): 108 (2018) - [j79]Xiaoguang Liu, Chunhua Jin, Fagen Li:
An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks. J. Medical Syst. 42(8): 143:1-143:14 (2018) - [j78]Xingbing Fu, Xuyun Nie, Ting Wu, Fagen Li:
Large universe attribute based access control with efficient decryption in cloud storage system. J. Syst. Softw. 135: 157-164 (2018) - [j77]Anyembe Andrew Omala, Ikram Ali, Fagen Li:
Heterogeneous signcryption with keyword search for wireless body area network. Secur. Priv. 1(5) (2018) - [j76]Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - [j75]Fagen Li, Yanan Han, Chunhua Jin:
Cost-Effective and Anonymous Access Control for Wireless Body Area Networks. IEEE Syst. J. 12(1): 747-758 (2018) - [j74]Qihua Wang, Fagen Li, Huaqun Wang:
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption. Wirel. Commun. Mob. Comput. 2018: 5702068:1-5702068:10 (2018) - [j73]Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala:
Practical deniable authentication for pervasive computing environments. Wirel. Networks 24(1): 139-149 (2018) - [j72]Mutaz Elradi S. Saeed, Qingyin Liu, GuiYun Tian, Bin Gao, Fagen Li:
HOOSC: heterogeneous online/offline signcryption for the Internet of Things. Wirel. Networks 24(8): 3141-3160 (2018) - [c20]Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li:
Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test. ICA3PP (4) 2018: 220-233 - [e1]Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0 [contents] - 2017
- [j71]Fagen Li, Bo Liu, Jiaojiao Hong:
An efficient signcryption for data access control in cloud computing. Computing 99(5): 465-479 (2017) - [j70]Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala:
Efficient certificateless access control for industrial Internet of Things. Future Gener. Comput. Syst. 76: 285-292 (2017) - [j69]Xingbing Fu, Xunyun Nie, Fagen Li:
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map. Int. J. Netw. Secur. 19(2): 313-322 (2017) - [j68]Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong:
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. Int. J. Netw. Secur. 19(4): 623-630 (2017) - [j67]Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris, Chunxiang Xu:
Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol. Int. J. Netw. Secur. 19(5): 776-784 (2017) - [j66]Anyembe Andrew Omala, Kittur P. Kibiwott, Fagen Li:
An Efficient Remote Authentication Scheme for Wireless Body Area Network. J. Medical Syst. 41(2): 25:1-25:9 (2017) - [j65]Fagen Li, Yanan Han, Chunhua Jin:
Certificateless online/offline signcryption for the Internet of Things. Wirel. Networks 23(1): 145-158 (2017) - [c19]Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li:
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment. EIDWT 2017: 592-602 - [c18]Yuyang Zhou, Zhaoqi Li, Fei Hu, Fagen Li:
Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption. ICITAM 2017: 3-22 - 2016
- [j64]Fagen Li, Yanan Han, Chunhua Jin:
Practical access control for sensor networks in the context of the Internet of Things. Comput. Commun. 89-90: 154-164 (2016) - [j63]Mohammed Ramadan, Fagen Li, Chunxiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla Ali:
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System. Int. J. Netw. Secur. 18(4): 769-781 (2016) - [j62]Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu:
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT. Int. J. Netw. Secur. 18(5): 888-899 (2016) - [j61]Abubaker Wahaballa, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin:
Secure mobile agent-based English auction protocol using identity-based signature scheme. Int. J. Secur. Networks 11(4): 175-187 (2016) - [j60]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety. J. Medical Syst. 40(1): 12:1-12:6 (2016) - [j59]Anyembe Andrew Omala, Niyifasha Robert, Fagen Li:
A Provably-Secure Transmission Scheme for Wireless Body Area Networks. J. Medical Syst. 40(11): 247:1-247:14 (2016) - [j58]Qihua Wang, Chang Wu Yu, Fagen Li, Huaqun Wang, Lijie Cao:
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks. Secur. Commun. Networks 9(17): 4138-4150 (2016) - [j57]Mohammed Ramadan, Guo-hong Du, Fagen Li, Chunxiang Xu:
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems. Symmetry 8(9): 85 (2016) - [j56]Fagen Li, Zhaohui Zheng, Chunhua Jin:
Secure and efficient data transmission in the Internet of Things. Telecommun. Syst. 62(1): 111-122 (2016) - [j55]Fagen Li, Zhaohui Zheng, Chunhua Jin:
Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst. 62(4): 625-639 (2016) - [j54]Fagen Li, Di Zhong, Tsuyoshi Takagi:
Efficient Deniably Authenticated Encryption and Its Application to E-Mail. IEEE Trans. Inf. Forensics Secur. 11(11): 2477-2486 (2016) - [j53]Fagen Li, Yanan Han, Chunhua Jin:
Practical Signcryption for Secure Communication of Wireless Sensor Networks. Wirel. Pers. Commun. 89(4): 1391-1412 (2016) - 2015
- [j52]Jizhong Deng, Huasheng Huang, Xiaoli Yu, Ji Jin, Weisen Lin, Fagen Li, Zhijiao Song, Mei Li, Siming Gan:
DiSNPindel: improved intra-individual SNP and InDel detection in direct amplicon sequencing of a diploid. BMC Bioinform. 16: 343:1-343:8 (2015) - [j51]SK Hafizul Islam, Fagen Li:
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. Comput. J. 58(10): 2636-2648 (2015) - [j50]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
An efficient certificateless deniable authentication protocol without pairings. Int. J. Electron. Secur. Digit. Forensics 7(2): 179-196 (2015) - [j49]Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li:
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 17(2): 129-134 (2015) - [j48]Xingbing Fu, Shengke Zeng, Fagen Li:
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data. Int. J. Netw. Secur. 17(6): 661-671 (2015) - [j47]Xingbing Fu, Xuyun Nie, Fagen Li:
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme. Inf. 6(3): 481-493 (2015) - [j46]Weifeng Wu, Fagen Li:
An Efficient Identity-Based Deniable Authenticated Encryption Scheme. KSII Trans. Internet Inf. Syst. 9(5): 1904-1919 (2015) - [j45]Hu Xiong, Songyang Wu, Fagen Li, Zhiguang Qin:
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes. Wirel. Pers. Commun. 80(4): 1671-1685 (2015) - [c17]Chunhua Jin, Chunxiang Xu, Linzhi Jiang, Fagen Li:
ID-Based Deniable Threshold Ring Authentication. HPCC/CSS/ICESS 2015: 1779-1784 - 2014
- [j44]Fagen Li, Pan Xiong, Chunhua Jin:
Identity-based deniable authentication for ad hoc networks. Computing 96(9): 843-853 (2014) - [j43]Baocang Wang, Fagen Li, Yupu Hu:
Improvement on a Knapsack-Based Probabilistic Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 421-424 (2014) - [j42]Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann, Fagen Li:
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(9): 1952-1961 (2014) - [j41]Zhiguang Qin, Hu Xiong, Fagen Li:
A Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 16(4): 278-285 (2014) - [c16]Mohamed Ali, Hamza Ali, Ting Zhong, Fagen Li, Zhiguan Qin, Ahmed Abdelrahaman A. A.:
Broadcast Searchable Keyword Encryption. CSE 2014: 1010-1016 - 2013
- [j40]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j39]Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi:
Lattice-based signcryption. Concurr. Comput. Pract. Exp. 25(14): 2112-2122 (2013) - [j38]Jining Zhao, Chunxiang Xu, Fagen Li, Wenzheng Zhang:
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2709-2716 (2013) - [j37]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j36]Hu Xiong, Fagen Li, Zhiguang Qin:
Certificateless threshold signature secure in the standard model. Inf. Sci. 237: 73-81 (2013) - [j35]Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2): 927-932 (2013) - [j34]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless hybrid signcryption. Math. Comput. Model. 57(3-4): 324-343 (2013) - [j33]Fagen Li, Tsuyoshi Takagi:
Secure identity-based signcryption in the standard model. Math. Comput. Model. 57(11-12): 2685-2694 (2013) - [j32]Fagen Li, Mingwu Zhang, Tsuyoshi Takagi:
Identity-based partially blind signature in the standard model for electronic cash. Math. Comput. Model. 58(1-2): 196-203 (2013) - [j31]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li:
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model. Secur. Commun. Networks 6(1): 69-77 (2013) - [j30]Fagen Li, Hui Zhang, Tsuyoshi Takagi:
Efficient Signcryption for Heterogeneous Systems. IEEE Syst. J. 7(3): 420-429 (2013) - [j29]Fagen Li, Tsuyoshi Takagi:
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol. Wirel. Pers. Commun. 69(4): 1391-1398 (2013) - [i7]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li:
A novel certificateless deniable authentication protocol. IACR Cryptol. ePrint Arch. 2013: 414 (2013) - 2012
- [j28]Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi:
Further improvement of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 38(2): 413-421 (2012) - [j27]Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3): 573-581 (2012) - [j26]Fagen Li, Mingwu Zhang, Tsuyoshi Takagi:
Efficient signcryption in the standard model. Concurr. Comput. Pract. Exp. 24(17): 1977-1989 (2012) - [j25]Hu Xiong, Zhong Chen, Fagen Li:
Bidder-anonymous English auction protocol based on revocable ring signature. Expert Syst. Appl. 39(8): 7062-7066 (2012) - [j24]Fagen Li, Muhammad Khurram Khan:
A biometric identity-based signcryption scheme. Future Gener. Comput. Syst. 28(1): 306-310 (2012) - [j23]Hu Xiong, Xiaofeng Wang, Fagen Li:
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 256-258 (2012) - [j22]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li:
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 259-262 (2012) - [j21]Mingwu Zhang, Fagen Li, Tsuyoshi Takagi:
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks. IEICE Trans. Inf. Syst. 95-D(2): 686-689 (2012) - [j20]Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1): 340-347 (2012) - [j19]Hu Xiong, Zhong Chen, Fagen Li:
Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3-4): 1213-1221 (2012) - [j18]Hu Xiong, Zhong Chen, Fagen Li:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. Secur. Commun. Networks 5(12): 1441-1451 (2012) - [j17]Fagen Li, Di Zhong, Tsuyoshi Takagi:
Practical Identity-Based Signature for Wireless Sensor Networks. IEEE Wirel. Commun. Lett. 1(6): 637-640 (2012) - 2011
- [j16]Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li:
On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2): 129-135 (2011) - [j15]Hu Xiong, Zhiguang Qin, Fagen Li:
Cryptanalysis of an Identity Based Signcryption without Random Oracles. Fundam. Informaticae 107(1): 105-109 (2011) - [j14]Fagen Li, Yongjian Liao, Zhiguang Qin:
Analysis of an Identity-Based Signcryption Scheme in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 268-269 (2011) - [j13]Fagen Li, Jiang Deng, Tsuyoshi Takagi:
An Improved Authenticated Encryption Scheme. IEICE Trans. Inf. Syst. 94-D(11): 2171-2172 (2011) - [j12]Hu Xiong, Zhiguang Qin, Fagen Li:
A Certificateless Proxy Ring Signature Scheme with Provable Security. Int. J. Netw. Secur. 12(2): 92-106 (2011) - [c15]Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi:
Efficient Identity-Based Signcryption in the Standard Model. ProvSec 2011: 120-137 - 2010
- [j11]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Cryptanalysis of efficient proxy signature schemes for mobile communication. Sci. China Inf. Sci. 53(10): 2016-2021 (2010) - [j10]Hu Xiong, Zhiguang Qin, Fagen Li:
Identity-based Threshold Signature Secure in the Standard Model. Int. J. Netw. Secur. 10(1): 75-80 (2010) - [j9]Hu Xiong, Fagen Li, Zhiguang Qin:
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography. Informatica 21(2): 277-294 (2010)
2000 – 2009
- 2009
- [j8]Hu Xiong, Zhiguang Qin, Fagen Li:
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature. Int. J. Netw. Secur. 8(3): 235-242 (2009) - [c14]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Identity-Based Hybrid Signcryption. ARES 2009: 534-539 - [c13]Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu:
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. IAS 2009: 281-284 - [c12]Chengyu Fan, Shijie Zhou, Fagen Li:
An Identity-Based Restricted Deniable Authentication Protocol. ISPA 2009: 474-478 - [c11]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless Hybrid Signcryption. ISPEC 2009: 112-123 - [i6]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless Hybrid Signcryption. IACR Cryptol. ePrint Arch. 2009: 162 (2009) - [i5]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Identity-Based Hybrid Signcryption. IACR Cryptol. ePrint Arch. 2009: 455 (2009) - 2008
- [j7]Fagen Li, Xiangjun Xin, Yupu Hu:
Indentity-based broadcast signcryption. Comput. Stand. Interfaces 30(1-2): 89-94 (2008) - [j6]Hu Xiong, Zhiguang Qin, Fagen Li:
An Improved Certificateless Signature Scheme Secure in the Standard Model. Fundam. Informaticae 88(1-2): 193-206 (2008) - [j5]Fagen Li, Shijie Zhou, Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1820-1823 (2008) - [j4]Fagen Li, Xiangjun Xin, Yupu Hu:
ID-based threshold proxy signcryption scheme from bilinear pairings. Int. J. Secur. Networks 3(3): 206-215 (2008) - [c10]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. CANS 2008: 108-119 - [c9]Hu Xiong, Zhiguang Qin, Fagen Li:
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles. CIS (2) 2008: 308-313 - [c8]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Signcryption Key Encapsulation without Random Oracles. Inscrypt 2008: 47-59 - [c7]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Inscrypt 2008: 289-304 - [c6]Chengyu Fan, Shijie Zhou, Fagen Li:
Deniable Proxy-Anonymous Signatures. ICYCS 2008: 2131-2136 - [c5]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. NPC 2008: 116-126 - [i4]Fagen Li, Yong Yu:
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 187 (2008) - [i3]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Analysis and Improvement of Authenticatable Ring Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 373 (2008) - [i2]Xu An Wang, Xiaoyuan Yang, Fagen Li:
On the Role of PKG for Proxy Re-encryption in Identity Based Setting. IACR Cryptol. ePrint Arch. 2008: 410 (2008) - 2007
- [j3]Fagen Li, Yupu Hu:
Security Analysis of the Pomykala-Barabasz Scheme. Fundam. Informaticae 80(4): 453-459 (2007) - [j2]Fagen Li, Xiangjun Xin, Yupu Hu:
Key management in ad hoc networks using self-certified public key system. Int. J. Mob. Commun. 5(1): 94-106 (2007) - [c4]Fagen Li, Yupu Hu, Chuanrong Zhang:
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. ACNS 2007: 373-384 - [c3]Bo Yang, Yong Yu, Fagen Li, Ying Sun:
Provably Secure Identity-Based Threshold Unsigncryption Scheme. ATC 2007: 114-122 - 2006
- [j1]Fagen Li, Xiangjun Xin, Yupu Hu:
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption. Int. J. Netw. Secur. 3(2): 155-159 (2006) - [c2]Fagen Li, Yupu Hu, Shuanggen Liu:
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. CIS 2006: 406-416 - [i1]Fagen Li, Yupu Hu, Shuanggen Liu:
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2006: 338 (2006) - 2005
- [c1]Fagen Li, Juntao Gao, Yupu Hu:
ID-Based Threshold Unsigncryption Scheme from Pairings. CISC 2005: 242-253
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-10 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint