Follow
Jianhua Chen
Title
Cited by
Cited by
Year
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21, 49-60, 2015
3482015
A more secure authentication scheme for telecare medicine information systems
H Debiao, C Jianhua, Z Rui
Journal of medical systems 36, 1989-1995, 2012
3012012
Certificateless searchable public key encryption scheme for industrial internet of things
M Ma, D He, N Kumar, KKR Choo, J Chen
IEEE Transactions on Industrial Informatics 14 (2), 759-767, 2017
2412017
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
H Debiao, C Jianhua, H Jin
Information Fusion 13 (3), 223-230, 2012
2392012
An efficient and provably‐secure certificateless signature scheme without bilinear pairings
D He, J Chen, R Zhang
International Journal of Communication Systems 25 (11), 1432-1442, 2012
1672012
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
D He, Y Chen, J Chen
Nonlinear Dynamics 69, 1149-1157, 2012
1282012
A pairing‐free certificateless authenticated key agreement protocol
D He, J Chen, J Hu
International Journal of Communication Systems 25 (2), 221-230, 2012
1222012
An ID-based proxy signature schemes without bilinear pairings
H Debiao, C Jianhua, H Jin
Annals of telecommunications-annales des télécommunications 66, 657-662, 2011
1202011
Insecurity of an efficient certificateless aggregate signature with constant pairing computations
D He, M Tian, J Chen
Information sciences 268, 458-462, 2014
1022014
Certificateless searchable public key encryption scheme for mobile healthcare system
M Ma, D He, MK Khan, J Chen
Computers & Electrical Engineering 65, 413-424, 2018
1012018
Complete Solution of the Diophantine EquationX2+ 1= dY4and a Related Family of Quartic Thue Equations
CJ Hua, P Voutier
journal of number theory 62 (1), 71-99, 1997
951997
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
D He, J Chen, Y Chen
Security and Communication Networks 5 (12), 1423-1429, 2012
922012
An efficient certificateless two-party authenticated key agreement protocol
D He, S Padhye, J Chen
Computers & Mathematics with Applications 64 (6), 1914-1926, 2012
902012
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
D He, Y Chen, J Chen, R Zhang, W Han
Mathematical and Computer Modelling 54 (11-12), 3143-3152, 2011
802011
An efficient identity-based blind signature scheme without bilinear pairings
D He, J Chen, R Zhang
Computers & Electrical Engineering 37 (4), 444-450, 2011
692011
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
D He, Y Zhang, J Chen
Wireless personal communications 74, 229-243, 2014
672014
New certificateless short signature scheme
D He, B Huang, J Chen
IET Information Security 7 (2), 113-117, 2013
662013
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain
Q Fan, J Chen, LJ Deborah, M Luo
Journal of systems architecture 117, 102112, 2021
522021
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
M Qi, J Chen, Y Chen
Computer methods and programs in biomedicine 164, 101-109, 2018
522018
A secure authentication with key agreement scheme using ECC for satellite communication systems
M Qi, J Chen, Y Chen
International journal of satellite communications and networking 37 (3), 234-244, 2019
502019
The system can't perform the operation now. Try again later.
Articles 1–20