Xiong Li (李雄)
Title
Cited by
Cited by
Year
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X Li, JW Niu, J Ma, WD Wang, CL Liu
Journal of network and computer applications 34 (1), 73-79, 2011
2732011
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
X Li, Y Xiong, J Ma, W Wang
Journal of Network and Computer Applications 35 (2), 763-769, 2012
2552012
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
2392013
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment
X Li, J Ma, W Wang, Y Xiong, J Zhang
Mathematical and Computer Modelling 58 (1-2), 85-95, 2013
2042013
A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications, 2018
1752018
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
1672017
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2018
1562018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah
Future Generation Computer Systems 81, 557-565, 2018
1112018
An improved remote user authentication scheme with key agreement
S Kumari, MK Khan, X Li
Computers & Electrical Engineering 40 (6), 1997-2012, 2014
1102014
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan
Future Generation Computer Systems 63, 56-75, 2016
1062016
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
1042017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
1042017
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo
IEEE Internet of Things Journal 5 (3), 1606-1615, 2018
992018
Medical JPEG image steganography based on preserving inter-block dependencies
X Liao, J Yin, S Guo, X Li, AK Sangaiah
Computers & Electrical Engineering 67, 320-329, 2018
972018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar
The Journal of Supercomputing 74 (12), 6428-6453, 2018
952018
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks
F Wu, L Xu, S Kumari, X Li
Computers & Electrical Engineering 45, 274-285, 2015
952015
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen
Future Generation Computer Systems 82, 727-737, 2018
872018
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
F Wu, L Xu, S Kumari, X Li
Journal of Ambient Intelligence and Humanized Computing 8 (1), 101-116, 2017
862017
Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update
X Li, J Niu, J Liao, W Liang
International Journal of Communication Systems 28 (2), 374-382, 2015
852015
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
X Li, J Niu, S Kumari, J Liao, W Liang, MK Khan
Security and Communication Networks 9 (15), 2643-2655, 2016
832016
The system can't perform the operation now. Try again later.
Articles 1–20