A Blockchain Based Secure IoT System Using Device Identity Management
- Sabrina, Fariza, Li, Nan, Sohail, Shaleeza
A new construction for linkable secret handshake
- Tian, Yangguang, Li, Yingjiu, Deng, Robert H., Li, Nan, Yang, Guomin, Yang, Zheng
A new encoding framework for predicate encryption with non-linear structures in prime order groups
- Kim, Jongkil, Susilo, Willy, Guo, Fuchun, Baek, Joonsang, Li, Nan
A new framework for privacy-preserving biometric-based remote user authentication
- Tian, Yangguang, Li, Yingjiu, Deng, Robert H., Li, Nan, Wu, Pengfei, Liu, Anyi
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks
- Wei, Jiannan, Wang, Xiaojie, Li, Nan, Yang, Guomin, Mu, Yi
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion
- Tian, Yangguang, Li, Yingjiu, Sengupta, Binanda, Li, Nan, Yu, Yong
Context-aware trust management system for IoT applications with multiple domains
- Li, Nan, Varadharajan, Vijay, Nepal, Surya
DSH: Deniable secret handshake framework
- Tian, Yangguang, Li, Yingjiu, Zhang, Yinghui, Li, Nan, Yang, Guomin, Yu, Yong
Leakage-resilient biometric-based remote user authentication with fuzzy extractors
- Tian, Yangguang, Li, Yingjiu, Sengupta, Binanda, Li, Nan, Su, Chunhua
Novel non-cyclooxygenase inhibitory derivatives of naproxen for colorectal cancer chemoprevention
- Aboul-Fadl, Tarek, Al-Hamad, Suliman S., Lee, Kevin, Li, Nan, Gary, Bernard D., Keeton, Adam B., Piazza, Gary A., Abdel-Hamid, Mohammed K.
Policy-based chameleon hash for blockchain rewriting with black-box accountability
- Tian, Yangguang, Li, Nan, Li, Yingjiu, Szalachowski, Pawel, Zhou, Jianying
Privacy-preserving and undeniable authentication for mobile RFID tags
Privacy-preserving biometric-based remote user authentication with leakage resilience
- Tian, Yangguang, Li, Yingjiu, Chen, Rongmao, Li, Nan, Liu, Ximeng, Chang, Bing, Yu, Xingjie
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
- Wang, Jing-Yu, Ouyang, Ting, Li, Nan, Ma, Tianyi, Liu, Zhao-Qing
Targeted Context-Based Attacks on Trust Management Systems in IoT
- Lewis, Cody, Li, Nan, Varadharajan, Vijay
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
Are you sure you would like to clear your session, including search history and login status?