Paper
22 |
2022.05.31
SCI(E) / KSII Transactions on Internet and Information Systems
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
Vol: 16
/
No: 5 /
pp.: 1687-1707
ISSN: 1976-7277 Impact Factor: 1.2 DOI: 10.3837/tiis.2022.05.015 |
21 |
2021.12.16
SCI(E) / Wireless Communications and Mobile Computing
Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing
Vol: 2021
/
pp.: 1-16
ISSN: 1530-8669 Impact Factor: 2.146 DOI: 10.1155/2021/1567019 |
20 |
2021.11.26
SCI(E) / High-Confidence Computing
Secure Verifiable Aggregation for Blockchain-based Federated Averaging
Vol: 2
/
No: 1 /
pp.: 1-8
ISSN: 2667-2952 Impact Factor: 3.2 DOI: 10.1016/j.hcc.2021.100046 |
19 |
2021.11.01
SCI(E) / IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments
Vol: E104.D
/
No: 11 /
pp.: 1869-1879
ISSN: 0916-8532 Impact Factor: 0.6 DOI: 10.1587/transinf.2021NGP0012 |
18 |
2021.09.30
SCI(E) / Wireless Communications and Mobile Computing
Deep Learning-based Service Scheduling Mechanism for Green RSUs in IoVs
Vol: 2021
/
pp.: 1-15
ISSN: 1530-8669 Impact Factor: 2.146 DOI: 10.1155/2021/7018486 |
17 |
2021.09.29
SCI(E) / Tsinghua Science and Technology
Link-privacy preserving graph embedding data publication with adversarial learning
Vol: 27
/
No: 2 /
pp.: 244-256
ISSN: 1007-0214 Impact Factor: 5.2 DOI: 10.26599/TST.2021.9010015 |
16 |
2021.06.15
SCI(E) / Wireless Communications and Mobile Computing
Group Delegated ID-based Proxy Re-encryption for Enterprise Cloud Storage Environment
Vol: 2021
/
pp.: 1-12
ISSN: 1530-8669 Impact Factor: 2.146 DOI: 10.1155/2021/7641389 |
15 |
2021.06.12
SCI(E) / Security and Communication Networks
Data Distribution for Multiple Receiver in Connected Car Environment using 5G Communication
Vol: 2021
/
pp.: 1-14
ISSN: 1939-0122 Impact Factor: 1.968 DOI: 10.1155/2021/5599996 |
14 |
2021.05.17
SCI(E) / Sensors
A Secure Encapsulation schemes based on Key Recovery System in IoMT Environment
Vol: 21
/
No: 10 /
pp.: 1-23
ISSN: 1424-8220 Impact Factor: 3.4 DOI: 10.3390/s21103474 |
13 |
2021.05.04
SCI(E) / High-Confidence Computing
An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System’s Log Files Analysis
Vol: 1
/
No: 2 /
pp.: 1-6
ISSN: 2667-2952 Impact Factor: 3.2 DOI: 10.1016/j.hcc.2021.100030 |