Follow
Jian Shen
Title
Cited by
Cited by
Year
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
3952017
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017
2902017
A lightweight multi-layer authentication protocol for wireless body area networks
J Shen, S Chang, J Shen, Q Liu, X Sun
Future generation computer systems 78, 956-963, 2018
2742018
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang
Journal of Network and Computer Applications 106, 117-123, 2018
2722018
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
2722017
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
2402017
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT
J Shen, A Wang, C Wang, PCK Hung, CF Lai
Ieee Access 5, 18469-18479, 2017
2392017
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen
Future Generation Computer Systems 82, 727-737, 2018
2322018
An ID-based linearly homomorphic signature scheme and its application in blockchain
Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang
IEEE Access 6, 20632-20640, 2018
2262018
A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment
Q Liu, W Cai, J Shen, Z Fu, X Liu, N Linge
Security and Communication Networks 9 (17), 4002-4012, 2016
2182016
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
1902016
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
1872017
Secure intelligent traffic light control using fog computing
J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen
Future Generation Computer Systems 78, 817-824, 2018
1802018
Long noncoding RNA GAS5 suppresses the migration and invasion of hepatocellular carcinoma cells via miR-21
L Hu, H Ye, G Huang, F Luo, Y Liu, Y Liu, X Yang, J Shen, Q Liu, J Zhang
Tumor Biology 37, 2691-2702, 2016
1762016
Efficient privacy-aware authentication scheme for mobile cloud computing services
D He, N Kumar, MK Khan, L Wang, J Shen
IEEE Systems Journal 12 (2), 1621-1631, 2016
1742016
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
1612017
Effects of root exudates on denitrifier gene abundance, community structure and activity in a micro-polluted constructed wetland
H Wu, X Wang, X He, S Zhang, R Liang, J Shen
Science of the total environment 598, 697-703, 2017
1542017
Anaerobic digestion of livestock manure in cold regions: Technological advancements and global impacts
Y Yao, G Huang, C An, X Chen, P Zhang, X Xin, J Shen, J Agnew
Renewable and Sustainable Energy Reviews 119, 109494, 2020
1472020
Efficient end-to-end authentication protocol for wearable health monitoring systems
Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry
Computers & Electrical Engineering 63, 182-195, 2017
1432017
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
1402016
The system can't perform the operation now. Try again later.
Articles 1–20