Qi Jiang
Qi Jiang
School of Cyber Engineering, Xidian University
Verified email at xidian.edu.cn - Homepage
Title
Cited by
Cited by
Year
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
Q Jiang, S Zeadally, J Ma, D He
IEEE Access 5 (1), 3376-3392, 2017
1852017
A privacy preserving three-factor authentication protocol for e-Health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72 (10), 3826-3849, 2016
1682016
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian
Peer-to-Peer Networking and Applications 8 (6), 1070-1081, 2015
1532015
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Jiang Qi, Ma Jianfeng, Ma Zhuo, Li Guangsong
Journal of Medical Systems 37 (1), 2013
1392013
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang
Journal of Network and Computer Applications 76, 37-48, 2016
1142016
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
Q Jiang, J Ma, G Li, L Yang
Wireless Personal Communications 68 (4), 1477-1491, 2013
1142013
Improvement of robust smart-card-based password authentication scheme
Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li
International Journal of Communication Systems 28 (2), 383-393, 2015
1082015
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Qi Jiang, Jianfeng Ma, Fushan Wei
IEEE Systems Journal, 2039 - 2042, 2016
942016
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang , Fushan Wei, Shuai Fu, Jianfeng Ma, Guangsong Li, Abdulhameed Alelaiwi
Nonlinear Dynamics 83 (4), 2085-2101, 2016
892016
Efficient end-to-end authentication protocol for wearable health monitoring systems
Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry
Computers & Electrical Engineering 63, 182-195, 2017
882017
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian
Journal of Medical Systems 38 (2), 12:1-8, 2014
82*2014
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card
Saru Kumari,Fan Wu,Xiong Li,Mohammad Sabzinejad Farash,Qi Jiang,Muhammad ...
Multimedia Tools and Applications, 2015
722015
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1061-1073, 2018
702018
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang
Wireless Personal Communications 77 (2), 1489-1506, 2014
672014
Attribute-based keyword search over hierarchical data in cloud computing
Y Miao, J Ma, X Liu, X Li, Q Jiang, J Zhang
IEEE Transactions on Services Computing, 2017
652017
Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Qi Jiang, Jianfeng Ma, Youliang Tian
International Journal of Communication Systems 28 (7), 1340-1351, 2015
532015
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
L Yang, J Ma, Q Jiang
IJ Network Security 14 (3), 156-163, 2012
442012
An improved password-based remote user authentication protocol without smart cards
Q Jiang, J Ma, G Li, Z Ma
Information technology And control 42 (2), 113-123, 2013
372013
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Q Jiang, N Zhang, J Ni, J Ma, X Ma, KKR Choo
IEEE Transactions on Vehicular Technology 69 (9), 9390-9401, 2020
362020
User centric three‐factor authentication protocol for cloud‐assisted wearable devices
Q Jiang, Y Qian, J Ma, X Ma, Q Cheng, F Wei
International Journal of Communication Systems 32 (6), e3900, 2019
352019
The system can't perform the operation now. Try again later.
Articles 1–20