Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo Multimedia Systems 21, 49-60, 2015 | 359 | 2015 |
A more secure authentication scheme for telecare medicine information systems H Debiao, C Jianhua, Z Rui Journal of medical systems 36, 1989-1995, 2012 | 306 | 2012 |
Certificateless searchable public key encryption scheme for industrial internet of things M Ma, D He, N Kumar, KKR Choo, J Chen IEEE Transactions on Industrial Informatics 14 (2), 759-767, 2017 | 249 | 2017 |
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security H Debiao, C Jianhua, H Jin Information Fusion 13 (3), 223-230, 2012 | 240 | 2012 |
An efficient and provably‐secure certificateless signature scheme without bilinear pairings D He, J Chen, R Zhang International Journal of Communication Systems 25 (11), 1432-1442, 2012 | 173 | 2012 |
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol D He, Y Chen, J Chen Nonlinear Dynamics 69, 1149-1157, 2012 | 130 | 2012 |
A pairing‐free certificateless authenticated key agreement protocol D He, J Chen, J Hu International Journal of Communication Systems 25 (2), 221-230, 2012 | 122 | 2012 |
An ID-based proxy signature schemes without bilinear pairings H Debiao, C Jianhua, H Jin Annals of telecommunications-annales des télécommunications 66, 657-662, 2011 | 121 | 2011 |
Insecurity of an efficient certificateless aggregate signature with constant pairing computations D He, M Tian, J Chen Information sciences 268, 458-462, 2014 | 106 | 2014 |
Certificateless searchable public key encryption scheme for mobile healthcare system M Ma, D He, MK Khan, J Chen Computers & Electrical Engineering 65, 413-424, 2018 | 102 | 2018 |
Complete Solution of the Diophantine EquationX2+ 1= dY4and a Related Family of Quartic Thue Equations CJ Hua, P Voutier journal of number theory 62 (1), 71-99, 1997 | 96 | 1997 |
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography D He, J Chen, Y Chen Security and Communication Networks 5 (12), 1423-1429, 2012 | 91 | 2012 |
An efficient certificateless two-party authenticated key agreement protocol D He, S Padhye, J Chen Computers & Mathematics with Applications 64 (6), 1914-1926, 2012 | 91 | 2012 |
A new two-round certificateless authenticated key agreement protocol without bilinear pairings D He, Y Chen, J Chen, R Zhang, W Han Mathematical and Computer Modelling 54 (11-12), 3143-3152, 2011 | 80 | 2011 |
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks D He, Y Zhang, J Chen Wireless personal communications 74, 229-243, 2014 | 70 | 2014 |
An efficient identity-based blind signature scheme without bilinear pairings D He, J Chen, R Zhang Computers & Electrical Engineering 37 (4), 444-450, 2011 | 70 | 2011 |
New certificateless short signature scheme D He, B Huang, J Chen IET Information Security 7 (2), 113-117, 2013 | 67 | 2013 |
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain Q Fan, J Chen, LJ Deborah, M Luo Journal of Systems Architecture 117, 102112, 2021 | 63 | 2021 |
A secure authentication with key agreement scheme using ECC for satellite communication systems M Qi, J Chen, Y Chen International journal of satellite communications and networking 37 (3), 234-244, 2019 | 58 | 2019 |
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC M Qi, J Chen, Y Chen Computer methods and programs in biomedicine 164, 101-109, 2018 | 55 | 2018 |