X
Xindi Ma
Researcher at Xidian University
Publications - 40
Citations - 849
Xindi Ma is an academic researcher from Xidian University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 11, co-authored 26 publications receiving 430 citations.
Papers
More filters
Journal ArticleDOI
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles
TL;DR: A cloud-centric three-factor authentication and key agreement protocol integrating passwords, biometrics and smart cards to ensure secure access to both cloud and AVs is proposed, whose findings demonstrate that the protocol achieves high security strength with reasonable computation and communication costs.
Journal ArticleDOI
Efficient end-to-end authentication protocol for wearable health monitoring systems☆
TL;DR: Comprehensive security analysis is conducted to show that the proposed protocol fixes these flaws of Amin et al.
Proceedings ArticleDOI
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
TL;DR: This paper filters out the dummies that can be identified by taking into account of the spatiotemporal correlation from three aspects, namely time reachability, direction similarity and in-degree/out-degree, so that the rest dummies can satisfy the user's personalized privacy protection requirement.
Journal ArticleDOI
TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain
TL;DR: This paper proposes a new trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain, named TrustAccess, to achieve trustworthy access while guaranteeing the privacy of policy and attribute.
Journal ArticleDOI
Three-factor authentication protocol using physical unclonable function for IoV
TL;DR: Physical unclonable function (PUF) is introduced in the AKE protocol to ensure that the system is secure even if the user devices or sensors are compromised, and the performance evaluation indicates the efficiency of the protocol.