Follow
Jian Ren
Jian Ren
Professor of ECE, Michigan State University
Verified email at msu.edu - Homepage
Title
Cited by
Cited by
Year
Handbook of information security, information warfare, social, legal, and international issues and security foundations
H Bidgoli
John Wiley & Sons, 2006
4012006
The handbook of technology management: Supply chain management, marketing and advertising, and global management
JRTL H Bidgoli
1872010
Bitcoin and blockchain: Security and privacy
E Zaghloul, T Li, MW Mutka, J Ren
IEEE Internet of Things Journal 7 (10), 10288-10313, 2020
1632020
Source-location privacy through dynamic routing in wireless sensor networks
Y Li, J Ren
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1412010
Survey on anonymous communications in computer networks
J Ren, J Wu
Computer Communications 33 (4), 420-431, 2010
1322010
Quantitative measurement and design of source-location privacy schemes for wireless sensor networks
Y Li, J Ren, J Wu
IEEE Transactions on Parallel and Distributed Systems 23 (7), 1302-1311, 2011
1272011
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard
A Alahmadi, M Abdelhakim, J Ren, T Li
IEEE transactions on information forensics and security 9 (5), 772-781, 2014
1202014
Generalized digital certificate for user authentication and key establishment for secure communications
L Harn, J Ren
IEEE Transactions on Wireless Communications 10 (7), 2372-2379, 2011
1172011
Preserving source-location privacy in wireless sensor networks
Y Li, J Ren
2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009
1042009
Cost-aware secure routing (CASER) protocol design for wireless sensor networks
D Tang, T Li, J Ren, J Wu
IEEE Transactions on Parallel and Distributed Systems 26 (4), 960-973, 2014
1022014
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong
International Journal of Information Security 14, 307-318, 2015
972015
PassBio: Privacy-preserving user-centric biometric authentication
K Zhou, J Ren
IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018
962018
Secure wireless monitoring and control systems for smart grid and smart home
T Li, J Ren, X Tang
IEEE Wireless Communications 19 (3), 66-73, 2012
652012
Design of DL-based certificateless digital signatures
L Harn, J Ren, C Lin
Journal of Systems and Software 82 (5), 789-793, 2009
622009
Distributed detection in mobile access wireless sensor networks under byzantine attacks
M Abdelhakim, LE Lightfoot, J Ren, T Li
IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013
612013
Preserving source-location privacy in wireless sensor network using STaR routing
L Lightfoot, Y Li, J Ren
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
612010
ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
K Zhou, MH Afifi, J Ren
IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017
582017
Provable ownership of files in deduplication cloud storage
C Yang, J Ren, J Ma
Security and Communication Networks 8 (14), 2457-2468, 2015
582015
Hop-by-hop message authenticationand source privacy in wirelesssensor networks
J Li, Y Li, J Ren, J Wu
IEEE transactions on parallel and distributed systems 25 (5), 1223-1232, 2013
572013
Efficient identity-based RSA multisignatures
L Harn, J Ren
computers & security 27 (1-2), 12-15, 2008
552008
The system can't perform the operation now. Try again later.
Articles 1–20