Follow
Jian Shen
Title
Cited by
Cited by
Year
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
4122017
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE transactions on dependable and secure computing 16 (6), 996-1010, 2017
3322017
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang
Journal of Network and Computer Applications 106, 117-123, 2018
2842018
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future generation computer systems 78, 956-963, 2018
2842018
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
2822017
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT
J Shen, A Wang, C Wang, PCK Hung, CF Lai
Ieee Access 5, 18469-18479, 2017
2652017
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
2622017
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen
Future Generation Computer Systems 82, 727-737, 2018
2582018
An ID-based linearly homomorphic signature scheme and its application in blockchain
Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang
IEEE Access 6, 20632-20640, 2018
2372018
A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment
Q Liu, W Cai, J Shen, Z Fu, X Liu, N Linge
Security and Communication Networks 9 (17), 4002-4012, 2016
2222016
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
2092016
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
1952017
Secure intelligent traffic light control using fog computing
J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen
Future Generation Computer Systems 78, 817-824, 2018
1942018
Long noncoding RNA GAS5 suppresses the migration and invasion of hepatocellular carcinoma cells via miR-21
L Hu, H Ye, G Huang, F Luo, Y Liu, Y Liu, X Yang, J Shen, Q Liu, J Zhang
Tumor Biology 37, 2691-2702, 2016
1912016
Efficient privacy-aware authentication scheme for mobile cloud computing services
D He, N Kumar, MK Khan, L Wang, J Shen
IEEE Systems Journal 12 (2), 1621-1631, 2016
1902016
Effects of root exudates on denitrifier gene abundance, community structure and activity in a micro-polluted constructed wetland
H Wu, X Wang, X He, S Zhang, R Liang, J Shen
Science of the total environment 598, 697-703, 2017
1892017
Anaerobic digestion of livestock manure in cold regions: Technological advancements and global impacts
Y Yao, G Huang, C An, X Chen, P Zhang, X Xin, J Shen, J Agnew
Renewable and Sustainable Energy Reviews 119, 109494, 2020
1752020
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
1672017
Efficient end-to-end authentication protocol for wearable health monitoring systems
Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry
Computers & Electrical Engineering 63, 182-195, 2017
1612017
Efficient privacy-preserving cube-data aggregation scheme for smart grids
H Shen, M Zhang, J Shen
IEEE Transactions on Information Forensics and Security 12 (6), 1369-1381, 2017
1492017
The system can't perform the operation now. Try again later.
Articles 1–20