Chen Wang(王晨)
Chen Wang(王晨)
Verified email at
Cited by
Cited by
Secure data uploading scheme for a smart home system
J Shen, C Wang, T Li, X Chen, X Huang, ZH Zhan
Information Sciences 453, 186-197, 2018
B-TSCA: Blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs
C Wang, J Shen, JF Lai, J Liu
IEEE Transactions on Emerging Topics in Computing 9 (3), 1386-1396, 2020
Quantum cryptography for the future internet and the security analysis
T Zhou, J Shen, X Li, C Wang, J Shen
Security and Communication Networks 2018 (1), 8214619, 2018
A novel security scheme based on instant encrypted transmission for internet of things
C Wang, J Shen, Q Liu, Y Ren, T Li
Security and Communication Networks 2018 (1), 3680851, 2018
A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs
C Wang, R Huang, J Shen, J Liu, P Vijayakumar, N Kumar
IEEE Internet of Things Journal 8 (18), 14248-14257, 2021
Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix
T Zhou, J Shen, X Li, C Wang, H Tan
Future Generation Computer Systems 108, 1307-1313, 2020
Attribute-based secure data aggregation for isolated IoT-enabled maritime transportation systems
C Wang, J Shen, P Vijayakumar, BB Gupta
IEEE Transactions on Intelligent Transportation Systems 24 (2), 2608-2617, 2021
Neighborhood trustworthiness‐based vehicle‐to‐vehicle authentication scheme for vehicular ad hoc networks
C Wang, L Xiao, J Shen, R Huang
Concurrency and Computation: Practice and Experience 31 (21), e4643, 2019
Organized topology based routing protocol in incompletely predictable ad-hoc networks
J Shen, C Wang, A Wang, X Sun, S Moh, PCK Hung
Computer Communications 99, 107-118, 2017
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
J Shen, H Yang, A Wang, T Zhou, C Wang
Peer-to-Peer Networking and Applications 12, 924-933, 2019
Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks
J Shen, C Wang, A Castiglione, D Liu, C Esposito
IEEE Transactions on Big Data 8 (1), 48-59, 2017
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
C Wang, T Zhou, J Shen, W Wang, X Zhou
Future Generation Computer Systems 140, 129-137, 2023
A searchable and verifiable data protection scheme for scholarly big data
J Shen, C Wang, A Wang, S Ji, Y Zhang
IEEE Transactions on Emerging Topics in Computing 9 (1), 216-225, 2018
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks
D Liu, J Shen, A Wang, C Wang
International Journal of Sensor Networks 27 (2), 95-102, 2018
Secure real-time image protection scheme with near-duplicate detection in cloud computing
D Liu, J Shen, A Wang, C Wang
Journal of Real-Time Image Processing 17 (1), 175-184, 2020
Direction density-based secure routing protocol for healthcare data in incompletely predictable networks
J Shen, C Wang, CF Lai, A Wang, HC Chao
IEEE Access 4, 9163-9173, 2016
Secure emergent data protection scheme for a space-terrestrial integrated network
J Shen, C Wang, S Ji, T Zhou, H Yang
IEEE Network 33 (1), 44-50, 2019
Identity‐based fast authentication scheme for smart mobile devices in body area networks
C Wang, W Zheng, S Ji, Q Liu, A Wang
Wireless Communications and Mobile Computing 2018 (1), 4028196, 2018
ReLAC: Revocable and lightweight access control with blockchain for smart consumer electronics
J Zong, C Wang, J Shen, C Su, W Wang
IEEE Transactions on Consumer Electronics, 2023
Cate: Cloud-aided trustworthiness evaluation scheme for incompletely predictable vehicular ad hoc networks
J Shen, C Wang, JF Lai, Y Xiang, P Li
IEEE Transactions on Vehicular Technology 68 (11), 11213-11226, 2019
The system can't perform the operation now. Try again later.
Articles 1–20