Q
Qi Jiang
Researcher at Xidian University
Publications - 80
Citations - 2948
Qi Jiang is an academic researcher from Xidian University. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 26, co-authored 68 publications receiving 2168 citations. Previous affiliations of Qi Jiang include Anhui University & Nanjing University of Information Science and Technology.
Papers
More filters
Journal ArticleDOI
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Journal ArticleDOI
A privacy preserving three-factor authentication protocol for e-Health clouds
TL;DR: A robust three-factor authentication protocol is put forward, which not only guards various known attacks, but also provides more desired security properties, and it is demonstrated that the scheme provides mutual authentication using the Burrows–Abadi–Needham logic.
Journal ArticleDOI
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
TL;DR: The proposed enhanced authentication scheme with unlinkability not only remedies its security flaws but also improves its performance and is more suitable for practical applications of WSNs than Xue et al.
Journal ArticleDOI
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles
TL;DR: A cloud-centric three-factor authentication and key agreement protocol integrating passwords, biometrics and smart cards to ensure secure access to both cloud and AVs is proposed, whose findings demonstrate that the protocol achieves high security strength with reasonable computation and communication costs.
Journal ArticleDOI
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
TL;DR: An untraceable two-factor authentication scheme based on elliptic curve cryptography (ECC) for WSNs that makes up for the missing security features necessary for real-life applications while maintaining the desired features of the original scheme.