Qi Jiang
Qi Jiang
School of Cyber Engineering, Xidian University
Verified email at - Homepage
Cited by
Cited by
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
Q Jiang, S Zeadally, J Ma, D He
IEEE Access 5 (1), 3376-3392, 2017
A privacy preserving three-factor authentication protocol for e-Health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72 (10), 3826-3849, 2016
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian
Peer-to-Peer Networking and Applications 8 (6), 1070-1081, 2015
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Q Jiang, N Zhang, J Ni, J Ma, X Ma, KKR Choo
IEEE Transactions on Vehicular Technology 69 (9), 9390-9401, 2020
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Qi Jiang, Jianfeng Ma, Fushan Wei
IEEE Systems Journal, 2039 - 2042, 2016
Efficient end-to-end authentication protocol for wearable health monitoring systems
Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry
Computers & Electrical Engineering 63, 182-195, 2017
Attribute-based keyword search over hierarchical data in cloud computing
Y Miao, J Ma, X Liu, X Li, Q Jiang, J Zhang
IEEE Transactions on Services Computing 13 (6), 985-998, 2017
Improvement of robust smart-card-based password authentication scheme
Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li
International Journal of Communication Systems 28 (2), 383-393, 2015
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Jiang Qi, Ma Jianfeng, Ma Zhuo, Li Guangsong
Journal of Medical Systems 37 (1), 2013
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
Q Jiang, J Ma, G Li, L Yang
Wireless personal communications 68, 1477-1491, 2013
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang , Fushan Wei, Shuai Fu, Jianfeng Ma, Guangsong Li, Abdulhameed Alelaiwi
Nonlinear Dynamics 83 (4), 2085-2101, 2016
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma
Journal of Ambient Intelligence and Humanized Computing 9, 1061-1073, 2018
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian
Journal of Medical Systems 38 (2), 12:1-8, 2014
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card
Saru Kumari,Fan Wu,Xiong Li,Mohammad Sabzinejad Farash,Qi Jiang,Muhammad ...
Multimedia Tools and Applications, 2015
Three-factor authentication protocol using physical unclonable function for IoV
Q Jiang, X Zhang, N Zhang, Y Tian, X Ma, J Ma
Computer Communications 173, 45-55, 2021
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang
Wireless Personal Communications 77 (2), 1489-1506, 2014
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks
X Ma, J Ma, H Li, Q Jiang, S Gao
Future Generation Computer Systems 79, 82-94, 2018
Integrated authentication and key agreement framework for vehicular cloud computing
Q Jiang, J Ni, J Ma, L Yang, X Shen
IEEE Network 32 (3), 28-35, 2018
PDLM: Privacy-preserving deep learning model on cloud with multiple keys
X Ma, J Ma, H Li, Q Jiang, S Gao
IEEE Transactions on Services Computing 14 (4), 1251-1263, 2018
The system can't perform the operation now. Try again later.
Articles 1–20