Xiong Li
Citado por
Citado por
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2018
A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications, 2018
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X Li, JW Niu, J Ma, WD Wang, CL Liu
Journal of network and computer applications 34 (1), 73-79, 2011
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X Li, Y Xiong, J Ma, W Wang
Journal of Network and Computer Applications 35 (2), 763-769, 2012
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah
Future Generation Computer Systems 81, 557-565, 2018
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar
The Journal of Supercomputing 74 (12), 6428-6453, 2018
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment
X Li, J Ma, W Wang, Y Xiong, J Zhang
Mathematical and Computer Modelling 58 (1-2), 85-95, 2013
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen
Future Generation Computer Systems 82, 727-737, 2018
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo
IEEE Internet of Things Journal 5 (3), 1606-1615, 2018
Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications
X Li, S Liu, F Wu, S Kumari, JJPC Rodrigues
IEEE Internet of Things Journal, 2019
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
Lightweight IoT-based authentication scheme in cloud computing circumstance
L Zhou, X Li, KH Yeh, C Su, W Chiu
Future generation computer systems 91, 244-251, 2019
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services
S Zhang, X Li, Z Tan, T Peng, G Wang
Future Generation Computer Systems 94, 40-50, 2019
A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems
X Li, J Peng, MS Obaidat, F Wu, MK Khan, C Chen
IEEE Systems Journal 14 (1), 39-50, 2019
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan
Future Generation Computer Systems 63, 56-75, 2016
Medical JPEG image steganography based on preserving inter-block dependencies
X Liao, J Yin, S Guo, X Li, AK Sangaiah
Computers & Electrical Engineering 67, 320-329, 2018
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
F Wu, L Xu, S Kumari, X Li
Journal of Ambient Intelligence and Humanized Computing 8, 101-116, 2017
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20