Follow
Jian Ren
Jian Ren
Professor of ECE, Michigan State University
Verified email at msu.edu - Homepage
Title
Cited by
Cited by
Year
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
H Bidgoli
John Wiley & Sons, 2006
1862006
The handbook of technology management: Supply chain management, marketing and advertising, and global management
JRTL H Bidgoli
1622010
Source-location privacy through dynamic routing in wireless sensor networks
Y Li, J Ren
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1352010
Survey on anonymous communications in computer networks
J Ren, J Wu
Computer Communications 33 (4), 420-431, 2010
1272010
Quantitative measurement and design of source-location privacy schemes for wireless sensor networks
Y Li, J Ren, J Wu
IEEE Transactions on Parallel and Distributed Systems 23 (7), 1302-1311, 2011
1122011
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard
A Alahmadi, M Abdelhakim, J Ren, T Li
IEEE transactions on information forensics and security 9 (5), 772-781, 2014
1102014
Preserving source-location privacy in wireless sensor networks
Y Li, J Ren
2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009
1012009
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong
International Journal of Information Security 14 (4), 307-318, 2015
922015
Cost-aware secure routing (CASER) protocol design for wireless sensor networks
D Tang, T Li, J Ren, J Wu
IEEE Transactions on Parallel and Distributed Systems 26 (4), 960-973, 2014
922014
Generalized digital certificate for user authentication and key establishment for secure communications
L Harn, J Ren
IEEE Transactions on Wireless Communications 10 (7), 2372-2379, 2011
892011
Bitcoin and blockchain: Security and privacy
E Zaghloul, T Li, MW Mutka, J Ren
IEEE Internet of Things Journal 7 (10), 10288-10313, 2020
642020
PassBio: Privacy-preserving user-centric biometric authentication
K Zhou, J Ren
IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018
592018
Design of DL-based certificateless digital signatures
L Harn, J Ren, C Lin
Journal of Systems and Software 82 (5), 789-793, 2009
592009
Handbook of information security, information warfare, social, legal, and international issues and security foundations
H Bidgoli
John Wiley & Sons, 2006
562006
Provable ownership of files in deduplication cloud storage
C Yang, J Ren, J Ma
Security and Communication Networks 8 (14), 2457-2468, 2015
532015
Preserving source-location privacy in wireless sensor network using STaR routing
L Lightfoot, Y Li, J Ren
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
532010
Efficient identity-based RSA multisignatures
L Harn, J Ren
computers & security 27 (1-2), 12-15, 2008
532008
Secure wireless monitoring and control systems for smart grid and smart home
T Li, J Ren, X Tang
IEEE Wireless Communications 19 (3), 66-73, 2012
522012
Hop-by-hop message authenticationand source privacy in wirelesssensor networks
J Li, Y Li, J Ren, J Wu
IEEE transactions on parallel and distributed systems 25 (5), 1223-1232, 2013
502013
Distributed detection in mobile access wireless sensor networks under byzantine attacks
M Abdelhakim, LE Lightfoot, J Ren, T Li
IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013
492013
The system can't perform the operation now. Try again later.
Articles 1–20