scispace - formally typeset
X

Xiaodong Lin

Researcher at University of Guelph

Publications -  337
Citations -  18654

Xiaodong Lin is an academic researcher from University of Guelph. The author has contributed to research in topics: Information privacy & Authentication. The author has an hindex of 61, co-authored 315 publications receiving 15199 citations. Previous affiliations of Xiaodong Lin include University of Ontario Institute of Technology & University of Waterloo.

Papers
More filters
Proceedings ArticleDOI

Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid

TL;DR: This paper proposes a security-enhanced data aggregation scheme for smart grid communications based on homomorphic cryptosystem, trapdoor hash functions and homomorphic authenticators that can achieve data confidentiality and integrity against the malicious aggregator (e.g. gateway).
Proceedings ArticleDOI

Effective epidemic control and source tracing through mobile social sensing over WBANs

TL;DR: This paper designs a mobile phone capability driven hierarchical social interaction detection framework integrated with WBANs and proposes a set of epidemic source tracing and control algorithms including genetic algorithm based search and dominating set identification algorithms to effectively identify epidemic sources and inhibit epidemic spread.
Journal ArticleDOI

Towards collusion-attack-resilient group key management using one-way function tree

TL;DR: The proposed ROFT and NOFT schemes effectively solve the security problem of the OFT scheme at the cost of a minimal increase in computational cost and storage overhead.
Journal ArticleDOI

Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View

TL;DR: A CVCC architecture is presented, several security issues in vehicular cloud computing are studied, a CVCC network is model by a two-phase heterogeneous public good game, and the influence of different incentive mechanisms and the structure of a complex network describing the cars' connectivity on the vehicles' investment rate is investigated.
Proceedings ArticleDOI

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network

TL;DR: An efficient algorithm is proposed, called AICN, to logically identify the compromised nodes in a wireless sensor network in an efficient and effective way based on the network reliability estimation (NRE), and its enhanced version to further improve the efficiency.