default search action
Jianhua Chen 0002
Person information
- affiliation: Wuhan University, School of Mathematics and Statistics, China
Other persons with the same name
- Jianhua Chen (aka: Jian-Hua Chen) — disambiguation page
- Jianhua Chen 0001 — Yunnan University, School of Information, Kunming, China
- Jianhua Chen 0003 — Louisiana State University, Baton Rouge, LA, USA
- Jianhua Chen 0004 — Shanghai Ocean University, Shanghai, China
- Jianhua Chen 0005 — Nanchang University, Nanchang, Jiangxi, China (and 1 more)
- Jianhua Chen 0006 — Chengdu University of Technology, College of Geophysics, China
- Jianhua Chen 0008 — Central South University of Forestry and Technology, Changsha, China
- Jianhua Chen 0009 — Tsinghua University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j74]Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang:
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks. IEEE Syst. J. 17(2): 2101-2112 (2023) - 2022
- [j73]Qing Fan, Jianhua Chen, Feng Xu, Li Li, Min Luo:
A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j72]Yulei Chen, Jianhua Chen:
CPP-CLAS: Efficient and Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETs. IEEE Internet Things J. 9(12): 10354-10365 (2022) - [j71]Yulei Chen, Jianhua Chen:
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system. Peer-to-Peer Netw. Appl. 15(1): 516-528 (2022) - [j70]Qing Fan, Jianhua Chen, Mohammad Shojafar, Saru Kumari, Debiao He:
SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(9): 6424-6434 (2022) - [j69]Mingping Qi, Jianhua Chen:
Authentication and key establishment protocol from supersingular isogeny for mobile environments. J. Supercomput. 78(5): 6371-6385 (2022) - [j68]Mingping Qi, Jianhua Chen:
Provably secure post-quantum authenticated key exchange from supersingular isogenies. J. Supercomput. 78(10): 12815-12833 (2022) - 2021
- [j67]Yulei Chen, Jianhua Chen:
An enhanced dynamic authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 39(3): 250-262 (2021) - [j66]Qing Fan, Jianhua Chen, Lazarus Jegatha Deborah, Min Luo:
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain. J. Syst. Archit. 117: 102112 (2021) - [j65]Yulei Chen, Jianhua Chen:
Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks. Multim. Tools Appl. 80(10): 15291-15313 (2021) - [j64]Mingping Qi, Jianhua Chen:
An Efficient One-Way Authenticated Key Exchange Protocol for Anonymity Networks. IEEE Syst. J. 15(1): 377-382 (2021) - [j63]Mingping Qi, Jianhua Chen:
Two-Pass Privacy Preserving Authenticated Key Agreement Scheme for Smart Grid. IEEE Syst. J. 15(3): 3201-3207 (2021) - [j62]Yulei Chen, Jianhua Chen:
A secure three-factor-based authentication with key agreement protocol for e-Health clouds. J. Supercomput. 77(4): 3359-3380 (2021) - [j61]Yulei Chen, Jianhua Chen:
An efficient mutual authentication and key agreement scheme without password for wireless sensor networks. J. Supercomput. 77(12): 13653-13675 (2021) - [j60]Mingping Qi, Jianhua Chen:
Secure authenticated key exchange for WSNs in IoT applications. J. Supercomput. 77(12): 13897-13910 (2021) - [j59]Cong Peng, Jianhua Chen, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. ACM Trans. Internet Techn. 21(1): 19:1-19:23 (2021) - [j58]Cong Peng, Debiao He, Jianhua Chen, Neeraj Kumar, Muhammad Khurram Khan:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. ACM Trans. Internet Techn. 21(3): 61:1-61:24 (2021) - 2020
- [j57]Mingping Qi, Jianhua Chen:
A privacy-preserving biometrics based authenticated key agreement scheme using ECC. Int. J. Commun. Syst. 33(11) (2020) - [j56]Yulei Chen, Jianhua Chen:
Robust three-factor authentication protocol for satellite communication systems. Int. J. Commun. Syst. 33(15) (2020) - [j55]Shuishuai Xu, Xindong Liu, Mimi Ma, Jianhua Chen:
An improved mutual authentication protocol based on perfect forward secrecy for satellite communications. Int. J. Satell. Commun. Netw. 38(1): 62-73 (2020) - [j54]Cong Peng, Jianhua Chen, Mohammad S. Obaidat, Pandi Vijayakumar, Debiao He:
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing. IEEE Internet Things J. 7(7): 6056-6068 (2020) - [j53]Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He:
CsiIBS: A post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 54: 102504 (2020)
2010 – 2019
- 2019
- [j52]Mingping Qi, Jianhua Chen, Yitao Chen:
A secure authentication with key agreement scheme using ECC for satellite communication systems. Int. J. Satell. Commun. Netw. 37(3): 234-244 (2019) - [j51]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j50]Dongqing Xu, Jianhua Chen, Qin Liu:
Provably secure anonymous three-factor authentication scheme for multi-server environments. J. Ambient Intell. Humaniz. Comput. 10(2): 611-627 (2019) - [j49]Songwei Wang, Jianhua Chen:
基于智能卡的扩展混沌映射异步认证密钥协商协议 (Chaotic Mapping Asynchronous Authentication Key Agreement Scheme with Smart-cards). 计算机科学 46(1): 175-181 (2019) - [j48]Haorui Du, Jianhua Chen, Mingping Qi, Cong Peng, Qing Fan:
一个前向安全的基于RSA的多服务器的认证协议 (Forward-secure RSA-based Multi-server Authentication Protocol). 计算机科学 46(11A): 409-413 (2019) - [j47]Mingping Qi, Jianhua Chen:
Anonymous biconf/www/WuJZJLHW19 conf/ccis/WuWFZHLDJ18 ometrics-based authentication with key agreement scheme for multi-server environment using ECC. Multim. Tools Appl. 78(19): 27553-27568 (2019) - 2018
- [j46]Mimi Ma, Debiao He, Muhammad Khurram Khan, Jianhua Chen:
Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65: 413-424 (2018) - [j45]Mingping Qi, Jianhua Chen, Yitao Chen:
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Comput. Methods Programs Biomed. 164: 101-109 (2018) - [j44]Mingping Qi, Jianhua Chen:
An enhanced authentication with key agreement scheme for satellite communication systems. Int. J. Satell. Commun. Netw. 36(3): 296-304 (2018) - [j43]Dongqing Xu, Jianhua Chen, Shu Zhang, Qin Liu:
Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 42(11): 219 (2018) - [j42]Qiushi Yin, Jianhua Chen:
多服务器环境下基于椭圆曲线密码的改进的身份认证协议 (Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment). 计算机科学 45(6): 111-116 (2018) - [j41]Mingping Qi, Jianhua Chen:
New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multim. Tools Appl. 77(18): 23335-23351 (2018) - [j40]Dongqing Xu, Shu Zhang, Jianhua Chen, Mimi Ma:
A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC. Peer-to-Peer Netw. Appl. 11(5): 837-847 (2018) - [j39]Mimi Ma, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Jianhua Chen:
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(2): 759-767 (2018) - 2017
- [j38]Mingping Qi, Jianhua Chen:
An efficient two-party authentication key exchange protocol for mobile environment. Int. J. Commun. Syst. 30(16) (2017) - [j37]Haoran Chen, Jianhua Chen, Han Shen:
An improved authenticated key agreement with anonymity for session initiation protocol. Int. J. Electron. Secur. Digit. Forensics 9(2): 132-149 (2017) - [j36]Min Wu, Jianhua Chen, Ruibing Wang:
An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof. Int. J. Netw. Secur. 19(5): 785-793 (2017) - [j35]Han Shen, Jianhua Chen, Debiao He, Jian Shen:
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme. Wirel. Pers. Commun. 96(4): 5635-5641 (2017) - [i11]Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen:
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error. IACR Cryptol. ePrint Arch. 2017: 360 (2017) - 2016
- [j34]Han Shen, Jianhua Chen, Hao Hu, Jian Shen:
Insecurity of a Certificateless Aggregate Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(2): 660-662 (2016) - [j33]Min Wu, Jianhua Chen, Wenxia Zhu, Zhenyang Yuan:
Security analysis and enhancements of a multi-factor biometric authentication scheme. Int. J. Electron. Secur. Digit. Forensics 8(4): 352-365 (2016) - [j32]Han Shen, Jianhua Chen, Jian Shen, Debiao He:
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification. Secur. Commun. Networks 9(13): 2217-2221 (2016) - [j31]Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues:
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Secur. Commun. Networks 9(17): 3944-3951 (2016) - 2015
- [j30]Debiao He, Yuanyuan Zhang, Jianhua Chen:
Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 25(3-4): 309-321 (2015) - [j29]Wenxia Zhu, Jianhua Chen, Debiao He:
Enhanced authentication protocol for session initiation protocol using smart card. Int. J. Electron. Secur. Digit. Forensics 7(4): 330-342 (2015) - [j28]Yuanyuan Zhang, Jianhua Chen, Baojun Huang:
An improved authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 33(2): 135-146 (2015) - [j27]Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeo:
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim. Syst. 21(1): 49-60 (2015) - [j26]Huibo Yang, Jianhua Chen, Yuanyuan Zhang:
An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment. Wirel. Pers. Commun. 85(3): 1399-1409 (2015) - 2014
- [j25]Yuanyuan Zhang, Jianhua Chen, Baojun Huang:
Security analysis of an authentication and key agreement protocol for satellite communications. Int. J. Commun. Syst. 27(12): 4300-4306 (2014) - [j24]Debiao He, Yuanyuan Zhang, Jianhua Chen:
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol. Int. J. Netw. Secur. 16(5): 393-396 (2014) - [j23]Debiao He, Miaomiao Tian, Jianhua Chen:
Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268: 458-462 (2014) - [j22]Hang Tu, Han Shen, Debiao He, Jianhua Chen:
Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol. Inf. Technol. Control. 43(1): 57-63 (2014) - [j21]Yuanyuan Zhang, Jianhua Chen, Baojun Huang, Cong Peng:
An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography. Inf. Technol. Control. 43(4): 390-401 (2014) - [j20]Debiao He, Yuanyuan Zhang, Jianhua Chen:
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks. Wirel. Pers. Commun. 74(2): 229-243 (2014) - 2013
- [j19]Debiao He, Jianhua Chen:
An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4): 389-396 (2013) - [j18]Debiao He, Baojun Huang, Jianhua Chen:
New certificateless short signature scheme. IET Inf. Secur. 7(2) (2013) - [j17]Debiao He, Jianhua Chen, Wenbo Shi, Muhammad Khurram Khan:
On the security of an authentication scheme for multi-server architecture. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 288-296 (2013) - [j16]Debiao He, Yitao Chen, Jianhua Chen:
An efficient certificateless proxy signature scheme without pairing. Math. Comput. Model. 57(9-10): 2510-2518 (2013) - 2012
- [j15]Debiao He, Sahadeo Padhye, Jianhua Chen:
An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6): 1914-1926 (2012) - [j14]Debiao He, Jianhua Chen, Jin Hu:
A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2): 221-230 (2012) - [j13]Debiao He, Jianhua Chen, Rui Zhang:
An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11): 1432-1442 (2012) - [j12]Debiao He, Jianhua Chen:
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing. Int. J. Electron. Secur. Digit. Forensics 4(4): 244-251 (2012) - [j11]Debiao He, Jianhua Chen, Jin Hu:
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3): 223-230 (2012) - [j10]Debiao He, Jianhua Chen, Rui Zhang:
A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(3): 1989-1995 (2012) - [j9]Debiao He, Shuhua Wu, Jianhua Chen:
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'. Math. Comput. Model. 55(3-4): 1661-1664 (2012) - [j8]Debiao He, Jianhua Chen, Yitao Chen:
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Networks 5(12): 1423-1429 (2012) - 2011
- [j7]Debiao He, Jianhua Chen, Jin Hu:
An ID-based proxy signature schemes without bilinear pairings. Ann. des Télécommunications 66(11-12): 657-662 (2011) - [j6]Debiao He, Jianhua Chen, Rui Zhang:
An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng. 37(4): 444-450 (2011) - [j5]Debiao He, Jianhua Chen, Jin Hu:
An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves. Int. J. Comput. Commun. Control 6(2): 258-265 (2011) - [j4]Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a Remote User Password Authentication Scheme Using Smart Card. Int. J. Netw. Secur. 13(1): 58-60 (2011) - [j3]Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang, Weiwei Han:
A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11-12): 3143-3152 (2011) - [i10]Debiao He, Jianhua Chen, Jin Hu:
Identity-based Digital Signature Scheme Without Bilinear Pairings. IACR Cryptol. ePrint Arch. 2011: 79 (2011) - 2010
- [j2]Debiao He, Jianhua Chen, Rui Zhang:
Weaknesses of a dynamic ID-based remote user authentication scheme. Int. J. Electron. Secur. Digit. Forensics 3(4): 355-362 (2010) - [j1]Debiao He, Jianhua Chen, Jin Hu:
Cryptanalysis of a Simple Three-party Key Exchange Protocol. Informatica (Slovenia) 34(3): 337-339 (2010) - [i9]Debiao He, Jianhua Chen, Jin Hu:
Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. CoRR abs/1001.2945 (2010) - [i8]Debiao He, Jianhua Chen, Jin Hu:
A Random Number Generator Based on Isogenies Operations. IACR Cryptol. ePrint Arch. 2010: 94 (2010) - [i7]Debiao He, Jianhua Chen, Jin Hu:
Cryptanalysis of a DoS-resistant ID-based password authentication. IACR Cryptol. ePrint Arch. 2010: 181 (2010) - [i6]Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a dynamic ID-based remote user authentication scheme. IACR Cryptol. ePrint Arch. 2010: 240 (2010) - [i5]Debiao He, Jianhua Chen, Jin Hu:
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card. IACR Cryptol. ePrint Arch. 2010: 291 (2010) - [i4]Debiao He, Jianhua Chen, Jin Hu:
On security of a remote user authentication scheme without using smart cards. IACR Cryptol. ePrint Arch. 2010: 306 (2010) - [i3]Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a dynamic ID-based remote user authentication scheme. IACR Cryptol. ePrint Arch. 2010: 314 (2010) - [i2]Debiao He, Jianhua Chen, Jin Hu:
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices. IACR Cryptol. ePrint Arch. 2010: 606 (2010) - [i1]Debiao He, Jianhua Chen, Rui Zhang:
Efficient and provably-secure certificateless signature scheme without bilinear pairings. IACR Cryptol. ePrint Arch. 2010: 632 (2010)
2000 – 2009
- 2009
- [c1]Debiao He, Jianhua Chen, Zhjin Hu:
Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods. ISCID (1) 2009: 166-169
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint