scispace - formally typeset
Q

Qi Jiang

Researcher at Xidian University

Publications -  80
Citations -  2948

Qi Jiang is an academic researcher from Xidian University. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 26, co-authored 68 publications receiving 2168 citations. Previous affiliations of Qi Jiang include Anhui University & Nanjing University of Information Science and Technology.

Papers
More filters
Journal ArticleDOI

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks

TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Journal ArticleDOI

A privacy preserving three-factor authentication protocol for e-Health clouds

TL;DR: A robust three-factor authentication protocol is put forward, which not only guards various known attacks, but also provides more desired security properties, and it is demonstrated that the scheme provides mutual authentication using the Burrows–Abadi–Needham logic.
Journal ArticleDOI

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

TL;DR: The proposed enhanced authentication scheme with unlinkability not only remedies its security flaws but also improves its performance and is more suitable for practical applications of WSNs than Xue et al.
Journal ArticleDOI

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

TL;DR: A cloud-centric three-factor authentication and key agreement protocol integrating passwords, biometrics and smart cards to ensure secure access to both cloud and AVs is proposed, whose findings demonstrate that the protocol achieves high security strength with reasonable computation and communication costs.
Journal ArticleDOI

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

TL;DR: An untraceable two-factor authentication scheme based on elliptic curve cryptography (ECC) for WSNs that makes up for the missing security features necessary for real-life applications while maintaining the desired features of the original scheme.