Author image not provided
 Hui Li

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article3.48
Citation Count167
Publication count48
Publication years2003-2016
Available for download3
Average downloads per article703.00
Downloads (cumulative)2,109
Downloads (12 Months)407
Downloads (6 Weeks)68
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


54 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 54
Result page: 1 2 3

Sort by:

1 published by ACM
May 2017 ACM TUR-C '17: Proceedings of the ACM Turing 50th Celebration Conference - China
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 25,   Downloads (12 Months): 32,   Downloads (Overall): 32

Full text available: PDFPDF
With the increasing popularity of the fintech, the e-commerce market has grown rapidly in last decade, and now the mobile devices are unprecedented popular and playing an ever-increasing role in the e-commerce field, especially the mobile payment. However, it is hard for online authentication technology based on traditional mode to ...
Keywords: U2F, mobile payment, privacy, security, mutual authentication

2 published by ACM
January 2017 ACSW '17: Proceedings of the Australasian Computer Science Week Multiconference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17,   Downloads (12 Months): 73,   Downloads (Overall): 73

Full text available: PDFPDF
Smartphones are becoming increasingly popular in daily routines around the world. However, malware in smartphones is getting more prevalent, and will introduce potential risks to smartphone users. In this paper, we propose a new system, called Target , for detecting malware in the Android operating system, featuring both static and ...
Keywords: application category, static and dynamic analysis, android malware, risk values

3
November 2016 Security and Communication Networks: Volume 9 Issue 16, November 2016
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

As one of the core techniques in 5G, the Internet of Things is more interested than ever. Furthermore, radio frequency identification RFID plays a crucial role in Internet of Things development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of potential security ...
Keywords: authentication, efficiency, ultralightweight, RFID, lightweight, IoT

4
November 2016 Security and Communication Networks: Volume 9 Issue 16, November 2016
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

In order to realize attribute-based data sharing in cloud computing, multi-authority attribute-based encryption MA-ABE is extremely attractive. However, most of the existing MA-ABE schemes cannot support a fully large attribute universe and are not suitable for resource-constrained mobile data owners in that the computation cost in secret key generation and ...
Keywords: online/offline encryption, multi-authority, data sharing, online/offline key, attribute-based encryption, unbounded universe

5
September 2016 Security and Communication Networks: Volume 9 Issue 14, September 2016
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

As a public key cryptographic primitive, attribute-based encryption ABE is promising in implementing fine-grained access control in cloud computing. However, before ABE comes into practical applications, two challenging issues have to be addressed, that is, users' attribute privacy protection and access policy update. In this paper, we tackle the aforementioned ...
Keywords: attribute-based proxy re-encryption, cloud computing, access control, access policy update, anonymity

6
August 2016 Wireless Communications & Mobile Computing: Volume 16 Issue 12, August 2016
Publisher: John Wiley and Sons Ltd.
Bibliometrics:
Citation Count: 0

With a great variety of potential applications, machine-type communications MTC is gaining a tremendous interest from mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project 3GPP, which has been regarded as the promising solution facilitating machine-to-machine communications. In the latest standard, 3GPP proposes a ...
Keywords: security, LTE, authentication and key agreement AKA, M2M, MTC, proxy signature

7
August 2016 Information Processing Letters: Volume 116 Issue 8, August 2016
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

Concurrent signature is a novel paradigm, which can achieve fair exchange of signatures between users. Since its appearance, the topic has been widely concerned, while the study of concurrent signature in multi-user setting suffers from some criticism. Almost all known multi-user concurrent signature schemes rely on the hardness assumptions that ...
Keywords: Cryptography, Multi-party, SIS, Concurrent signature, Lattice

8
June 2016 Pervasive and Mobile Computing: Volume 28 Issue C, June 2016
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

Ciphertext-policy attribute-based encryption (CP-ABE) is extremely suitable for cloud computing environment in that it enables data owners to make and enforce access policies themselves. However, most of existing CP-ABE schemes suffer severe efficiency drawbacks due to large ciphertext size and computation cost, and hence are not suitable for mobile clouds, ...
Keywords: Constant cost, Attribute-based encryption, Data sharing, Mobile clouds

9
April 2016 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 99 Issue C, April 2016
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of ...
Keywords: Group authentication and key agreement, Machine-type communications (MTC), The 3rd generation partnership project (3GPP), Lightweight, Machine to machine (M2M), Security

10
November 2015 Security and Communication Networks: Volume 8 Issue 17, November 2015
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 1

Machine-type communication MTC, as one of the most important communication approaches in the future mobile communication, has drawn more and more attention. To meet the requirements of low power consumption of devices and mass device transmission is the key issue to achieve MTC applications security in the long-term evolution LTE ...
Keywords: TLA+ and TLC, access authentication, LTE, MTC, aggregate signature

11
October 2015 Security and Communication Networks: Volume 8 Issue 15, October 2015
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 1

Privacy-preserving aggregation for smart grid communications, which precisely meets the requirement of periodically collecting users' electricity consumption while preserving privacy of each individual user, has been extensively studied in recent years. However, most of existing privacy-preserving aggregation schemes are only focused on the summation aggregation. In this paper, based on ...
Keywords: privacy-preserving aggregation, smart grid, dual-functional aggregation

12
August 2015 TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

As one of the core techniques in 5G, the Internet of Things (IoT) is more interested than ever. Furthermore, Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. ...
Keywords: RFID, Authentication, Revocation, Security, Performance, 5G

13
August 2015 TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

As one of the core techniques in 5G, the Internet of Things (IoT) is more interested than ever. Furthermore, Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. ...
Keywords: RFID, Authentication, Revocation, Security, Performance, 5G

14
August 2015 Future Generation Computer Systems: Volume 49 Issue C, August 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user's location privacy, many research solutions have been proposed. In this paper, we focus ...
Keywords: Internet of things, Mobile computing, Wireless communications, Location-based services, Location privacy

15
December 2014 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 75 Issue PA, December 2014
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 1

As a promising application scenario of wireless technologies, roaming communication initiates the demand for secure and efficient handoff authentication schemes. However, it seems that no existing scheme can simultaneously provide provable security and enjoy desirable efficiency. In this paper, we first utilize the double-trapdoor chameleon hash family to develop a ...
Keywords: Double-trapdoor chameleon hashing, Handover authentication, Perfect backward secrecy, Handoff authentication, Provable security, Wireless network

16
December 2014 Frontiers of Computer Science: Selected Publications from Chinese Universities: Volume 8 Issue 6, December 2014
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) suggested using a digital signature directly over each bundle. However, when bundle fragment services are needed, this mechanism suffers from heavy computational costs, ...
Keywords: bundle authentication, space-based delay tolerant networks, information security

17
November 2014 Security and Communication Networks: Volume 7 Issue 11, November 2014
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

Consider a signed file that cannot be verified because of some fraction loss or noise, which might not affect the business of users. It would be desirable for the verifier to locate the damaged fractions so that the authenticity of other components of the file can be ensured. Thereafter, the ...
Keywords: digital signature, authentication, loss tolerance

18
November 2014 Security and Communication Networks: Volume 7 Issue 11, November 2014
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

The low prices on cloud data storage and sharing services incentive users to outsource their data to the cloud. Because data stored in the cloud may be lost or corrupted, users are suggested to verify data integrity before the utilization of cloud data. A series of schemes have been proposed ...
Keywords: identity privacy, public verification, data integrity, cloud computing, multi-owner data

19
September 2014 CIT '14: Proceedings of the 2014 IEEE International Conference on Computer and Information Technology
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

As one of the core techniques in the Internet of Things (IoT), Radio Frequency Identification (RFID) plays a crucial role in IoT development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of potential security risks, privacy problems and efficiency due to its ...
Keywords: authentication, efficiency, RFID, security

20
August 2014 Wireless Personal Communications: An International Journal: Volume 77 Issue 3, August 2014
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 7

Security and privacy issues in RFID technology gain tremendous popularity recently. However, existing work on RFID authentication problems always make assumptions such as (1) hash function can be fully employed in designing RFID protocols; (2) channels between readers and server are always secure. The first assumption is not suitable for ...
Keywords: Ultralightweight, Mobile RFID systems, Privacy-preserving, Authentication



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us