• Publications
  • Influence
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
TLDR
In this paper, we propose an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications. Expand
  • 534
  • 38
  • PDF
Attribute based proxy re-encryption with delegating capabilities
TLDR
Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional proxy reencryption (public key or identity based cryptosystem) to the attribute based counterpart, and thus empower users with delegating capability in the access control environment. Expand
  • 204
  • 21
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs
TLDR
We present an effective pseudonym changing at social spots (PCS) strategy for location privacy in VANETs. Expand
  • 400
  • 19
  • PDF
Sybil Attacks and Their Defenses in the Internet of Things
TLDR
We survey Sybil attacks and defense schemes in IoT and present some Sybil defense schemes with the comprehensive comparisons. Expand
  • 217
  • 15
  • PDF
GRS: The green, reliability, and security of emerging machine to machine communications
TLDR
In this article, we explore the emerging M2M communications in terms of the potential GRS issues, and aim to promote an energy-efficient, reliable, and secure M 2M communications environment. Expand
  • 254
  • 14
  • PDF
Secure provenance: the essential of bread and butter of data forensics in cloud computing
TLDR
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue today. Expand
  • 405
  • 14
  • PDF
Smart community: an internet of things application
TLDR
In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class of cyber-physical systems with cooperating objects (i.e., networked smart homes). Expand
  • 433
  • 13
  • PDF
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
TLDR
We propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in wireless sensor networks. Expand
  • 168
  • 13
  • PDF
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service
TLDR
We propose a conditional privacy-preserving authentication with access linkability (CPAL) for roaming service, to provide universal secure roaming service and multilevel privacy preservation. Expand
  • 59
  • 10
  • PDF
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
TLDR
We present WindTalker, a novel and practical keystroke inference framework that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi-based side-channel information. Expand
  • 99
  • 9
  • PDF