• Publications
  • Influence
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks
TLDR
We introduce an efficient batch signature verification scheme for communications between vehicles and RSUs (or termed vehicle- to-Infrastructure (V2I) communications), in which an RSU can verify multiple received signatures at the same time such that the total verification time can be dramatically reduced. Expand
  • 513
  • 49
  • PDF
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications
TLDR
We introduce an efficient conditional privacy preservation (ECPP) protocol in vehicular ad hoc networks (VANETs) to address the issue on anonymous authentication for safety messages with authority traceability. Expand
  • 601
  • 44
  • PDF
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
TLDR
In this paper, we propose an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications. Expand
  • 534
  • 38
  • PDF
A Lightweight Message Authentication Scheme for Smart Grid Communications
TLDR
We propose a lightweight message authentication scheme tailored for the requirements of SG communications based on Diffie-Hellman key establishment protocol and hash-based authentication code. Expand
  • 349
  • 31
  • PDF
An Efficient Message Authentication Scheme for Vehicular Communications
TLDR
We introduce a novel roadside unit-aided message authentication scheme named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. Expand
  • 248
  • 29
  • PDF
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
TLDR
We propose a secure multilayer credit-based incentive scheme to stimulate bundle forwarding cooperation among DTN nodes, which is called opportunistic data forwarding. Expand
  • 284
  • 28
  • PDF
Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption
TLDR
We investigate the tradeoff between power consumption and transmission delay in the fog-cloud computing system and show that by sacrificing modest computation resources to save communication bandwidth and reduce transmission latency, fog computing can significantly improve the performance of cloud computing. Expand
  • 407
  • 26
  • PDF
Simple three-party key exchange protocol
TLDR
Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by which two clients, each shares a human-memorable password with a trusted server, can agree a secure session key. Expand
  • 169
  • 25
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks
TLDR
In this paper, a novel RSU-aided message authentication scheme, called RAISE, was proposed. Expand
  • 247
  • 20
  • PDF
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs
TLDR
We present an effective pseudonym changing at social spots (PCS) strategy for location privacy in VANETs. Expand
  • 400
  • 19
  • PDF