scispace - formally typeset
H

Hong Liu

Researcher at East China Normal University

Publications -  55
Citations -  3402

Hong Liu is an academic researcher from East China Normal University. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 20, co-authored 48 publications receiving 2545 citations. Previous affiliations of Hong Liu include Beihang University.

Papers
More filters
Journal ArticleDOI

Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health

TL;DR: A cooperative privacy preservation scheme is designed for wearable devices with identity authentication and data access control considerations in the space-aware and time-aware contexts for smart health with communication overhead and computation cost.
Journal ArticleDOI

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

TL;DR: This paper proposes a grouping-proofs-based authentication protocol (GUPA) to address the security issue for multiple readers and tags simultaneous identification in distributed RFID systems and shows that GUPA has lower communication overhead and computation load.
Journal ArticleDOI

The yoking-proof-based authentication protocol for cloud-assisted wearable devices

TL;DR: In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices and Rubin logic-based security formal analysis is performed to prove that the YPAP has theoretical design correctness.
Journal ArticleDOI

A review of the smart world

TL;DR: This work systematically overviews related works in the field of the smart world, and explains prospects in emerging areas of enabling technologies including ubiquitous intelligence, web intelligence, brain informatics, social computing, big data, and security and privacy.
Journal ArticleDOI

An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing

TL;DR: The performance analyses and comparison with the existing public key schemes and attribute based encryption solutions show that the proposed AC-PKC scheme can work flexibly at a relatively low cost.