An efficient public auditing protocol with novel dynamic structure for cloud data J Shen, J Shen, X Chen, X Huang, W Susilo IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017 | 398 | 2017 |
Block design-based key agreement for group data sharing in cloud computing J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017 | 299 | 2017 |
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang Journal of Network and Computer Applications 106, 117-123, 2018 | 275 | 2018 |
Anonymous and traceable group data sharing in cloud computing J Shen, T Zhou, X Chen, J Li, W Susilo IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017 | 275 | 2017 |
A lightweight multi-layer authentication protocol for wireless body area networks J Shen, S Chang, J Shen, Q Liu, X Sun Future generation computer systems 78, 956-963, 2018 | 274 | 2018 |
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage J Li, W Yao, J Han, Y Zhang, J Shen IEEE Systems Journal 12 (2), 1767-1777, 2017 | 246 | 2017 |
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT J Shen, A Wang, C Wang, PCK Hung, CF Lai Ieee Access 5, 18469-18479, 2017 | 242 | 2017 |
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen Future Generation Computer Systems 82, 727-737, 2018 | 240 | 2018 |
An ID-based linearly homomorphic signature scheme and its application in blockchain Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang IEEE Access 6, 20632-20640, 2018 | 228 | 2018 |
A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment Q Liu, W Cai, J Shen, Z Fu, X Liu, N Linge Security and Communication Networks 9 (17), 4002-4012, 2016 | 217 | 2016 |
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang Journal of Network and Computer Applications 76, 37-48, 2016 | 195 | 2016 |
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das Journal of Network and Computer Applications 89, 72-85, 2017 | 189 | 2017 |
Secure intelligent traffic light control using fog computing J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen Future Generation Computer Systems 78, 817-824, 2018 | 184 | 2018 |
Long noncoding RNA GAS5 suppresses the migration and invasion of hepatocellular carcinoma cells via miR-21 L Hu, H Ye, G Huang, F Luo, Y Liu, Y Liu, X Yang, J Shen, Q Liu, J Zhang Tumor Biology 37, 2691-2702, 2016 | 181 | 2016 |
Efficient privacy-aware authentication scheme for mobile cloud computing services D He, N Kumar, MK Khan, L Wang, J Shen IEEE Systems Journal 12 (2), 1621-1631, 2016 | 177 | 2016 |
Effects of root exudates on denitrifier gene abundance, community structure and activity in a micro-polluted constructed wetland H Wu, X Wang, X He, S Zhang, R Liang, J Shen Science of the total environment 598, 697-703, 2017 | 164 | 2017 |
Design of a provably secure biometrics-based multi-cloud-server authentication scheme S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen Future Generation Computer Systems 68, 320-330, 2017 | 163 | 2017 |
Anaerobic digestion of livestock manure in cold regions: Technological advancements and global impacts Y Yao, G Huang, C An, X Chen, P Zhang, X Xin, J Shen, J Agnew Renewable and Sustainable Energy Reviews 119, 109494, 2020 | 154 | 2020 |
Efficient end-to-end authentication protocol for wearable health monitoring systems Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry Computers & Electrical Engineering 63, 182-195, 2017 | 148 | 2017 |
Cloud data integrity checking with an identity-based auditing mechanism from RSA Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen Future Generation Computer Systems 62, 85-91, 2016 | 142 | 2016 |