Seguir
Xiaohui Liang
Título
Citado por
Citado por
Año
Smart community: an internet of things application
X Li, R Lu, X Liang, X Shen, J Chen, X Lin
IEEE Communications magazine 49 (11), 68-75, 2011
9842011
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
R Lu, X Liang, X Li, X Lin, X Shen
IEEE Transactions on Parallel and Distributed Systems 23 (9), 1621-1631, 2012
8942012
Security and privacy in smart city applications: Challenges and solutions
K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen
IEEE communications magazine 55 (1), 122-129, 2017
6582017
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
R Lu, X Lin, TH Luan, X Liang, X Shen
IEEE transactions on vehicular technology 61 (1), 86-96, 2011
5732011
Secure provenance: the essential of bread and butter of data forensics in cloud computing
R Lu, X Lin, X Liang, XS Shen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
4912010
Securing smart grid: cyber attacks, countermeasures, and challenges
X Li, X Liang, R Lu, X Shen, X Lin, H Zhu
IEEE Communications Magazine 50 (8), 38-45, 2012
4692012
Sybil attacks and their defenses in the internet of things
K Zhang, X Liang, R Lu, X Shen
IEEE Internet of Things Journal 1 (5), 372-383, 2014
4062014
GRS: The green, reliability, and security of emerging machine to machine communications
R Lu, X Li, X Liang, X Shen, X Lin
IEEE communications magazine 49 (4), 28-35, 2011
3742011
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Progress in Cryptology-INDOCRYPT 2008, 426-436, 2008
3662008
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
H Li, X Lin, H Yang, X Liang, R Lu, X Shen
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053-2064, 2013
3622013
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th international symposium on information, computer, and …, 2009
3542009
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
H Li, Y Yang, TH Luan, X Liang, L Zhou, XS Shen
IEEE Transactions on Dependable and Secure Computing 13 (3), 312-325, 2015
3182015
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs
R Lu, X Lin, X Liang, X Shen
Intelligent Transportation Systems, IEEE Transactions on 13 (1), 127-139, 2012
2562012
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
2172010
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, X Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
2132016
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2122016
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
X Liang, X Li, R Lu, X Lin, X Shen
IEEE Transactions on smart grid 4 (1), 141-150, 2013
2062013
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
R Lu, X Lin, H Zhu, X Liang, XS Shen
Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010
2032010
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
M Barua, X Liang, R Lu, X Shen
International Journal of Security and Networks 6 (2-3), 67-76, 2011
1892011
Provably secure and efficient bounded ciphertext policy attribute based encryption
X Liang, Z Cao, H Lin, D Xing
Proceedings of the 4th international symposium on information, computer, and …, 2009
1892009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20