Login / Signup
Junguo Liao
ORCID
Publication Activity (10 Years)
Years Active: 2005-2023
Publications (10 Years): 15
Top Topics
Privacy Protection
Authentication Scheme
Top Venues
Secur. Commun. Networks
Wirel. Pers. Commun.
SmartCom
ICPADS
</>
Publications
</>
Junguo Liao
,
Qiong Wu
DTSAC: Smart Contract-based Access Control with Delegation and Trust Management.
ICPADS
(2023)
Junguo Liao
,
Haifeng Wang
,
June Wu
A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system.
Concurr. Comput. Pract. Exp.
35 (4) (2023)
Junguo Liao
,
Yixun Zhou
,
Qiangqiang Qin
An adaptive traffic sign recognition scheme based on deep learning in complex environment.
ISPA/BDCloud/SocialCom/SustainCom
(2022)
Haifeng Wang
,
Junguo Liao
Blockchain Privacy Protection Algorithm Based on Pedersen Commitment and Zero-knowledge Proof.
ICBTA
(2021)
Sijie Jiang
,
Junguo Liao
,
Shaobo Zhang
,
Gengming Zhu
,
Su Wang
,
Wei Liang
A Post-processing Trajectory Publication Method Under Differential Privacy.
SmartCom
(2020)
Yao Xiao
,
Junguo Liao
Privacy Security Classification (PSC) Model for the Attributes of Social Network Users.
ICAIS (2)
(2020)
Lixin Wang
,
Junguo Liao
,
Chaoqian Xu
Vehicle Detection Based on Drone Images with the Improved Faster R-CNN.
ICMLC
(2019)
Xiong Li
,
Jieyao Peng
,
Jianwei Niu
,
Fan Wu
,
Junguo Liao
,
Kim-Kwang Raymond Choo
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J.
5 (3) (2018)
Shaobo Zhang
,
Guojun Wang
,
Qin Liu
,
Xi Wen
,
Junguo Liao
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
ISPA/IUCC
(2017)
Xiong Li
,
Junguo Liao
,
Wei Liang
,
Jingqiang Zhao
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password.
ICCCS (1)
(2016)
Xiong Li
,
Jianwei Niu
,
Muhammad Khurram Khan
,
Junguo Liao
,
Xiaoke Zhao
Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
Secur. Commun. Networks
9 (13) (2016)
Xiong Li
,
Jianwei Niu
,
Saru Kumari
,
Junguo Liao
,
Wei Liang
,
Muhammad Khurram Khan
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks
9 (15) (2016)
Xiong Li
,
Junguo Liao
,
Saru Kumari
,
Wei Liang
,
Fan Wu
,
Muhammad Khurram Khan
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun.
85 (1) (2015)
Xiong Li
,
Jianwei Niu
,
Junguo Liao
,
Wei Liang
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst.
28 (2) (2015)
Xiong Li
,
Jianwei Niu
,
Saru Kumari
,
Junguo Liao
,
Wei Liang
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun.
80 (1) (2015)
Xiong Li
,
Junguo Liao
,
Jiao Zhang
,
Jianwei Niu
,
Saru Kumari
A secure remote user mutual authentication scheme using smart cards.
ComComAP
(2014)
Xiong Li
,
Jianwei Niu
,
Yazhi Liu
,
Junguo Liao
,
Wei Liang
Robust dynamic ID-based remote user authentication scheme using smart cards.
Int. J. Ad Hoc Ubiquitous Comput.
17 (4) (2014)
Xiong Li
,
Muhammad Khurram Khan
,
Saru Kumari
,
Junguo Liao
,
Wei Liang
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
ISBAST
(2014)
Xiong Li
,
Jianwei Niu
,
Muhammad Khurram Khan
,
Junguo Liao
Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards.
ISBAST
(2013)
Xiong Li
,
Jianwei Niu
,
Muhammad Khurram Khan
,
Junguo Liao
An enhanced smart card based remote user password authentication scheme.
J. Netw. Comput. Appl.
36 (5) (2013)
Xiong Li
,
Jianwei Niu
,
Muhammad Khurram Khan
,
Junguo Liao
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement.
ISBAST
(2013)
Lezhen Ling
,
Junguo Liao
Anonymous electronic voting protocol with traceability.
ICITST
(2011)
Junguo Liao
,
Bin Zhu
,
Yong He
Security Analysis of NSSK Protocol and its Improvement.
DASC
(2009)
Hai-Jun Xiao
,
Fan Hong
,
Zhao-Li Zhang
,
Junguo Liao
Intrusion Detection Using Ensemble of SVM Classifiers.
FSKD (4)
(2007)
Zhao-Li Zhang
,
Fan Hong
,
Junguo Liao
Modeling Chinese Wall Policy Using Colored Petri Nets.
CIT
(2006)
Xian Zhu
,
Shaobin Wang
,
Fan Hong
,
Junguo Liao
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.
CANS
(2005)