


default search action
Haowen Tan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Minghua Yuan
, Haowen Tan
, Wenying Zheng
, Pandi Vijayakumar
, Fayez Alqahtani
, Amr Tolba
:
A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments. IEEE Internet Things J. 11(18): 29615-29627 (2024) - [j29]Jinliang Chen, Tianqi Zhou
, Sai Ji, Haowen Tan, Wenying Zheng:
Efficient public auditing scheme for non-administrator group with secure user revocation. J. Inf. Secur. Appl. 80: 103676 (2024) - [j28]You-Xin Xing, Haowen Tan, Yanning Xu, Lu Wang:
A Tiny Example Based Procedural Model for Real-Time Glinty Appearance Rendering. J. Comput. Sci. Technol. 39(4): 771-784 (2024) - [c9]Haowen Tan, Yue Sun, Yifan Chen:
Optimizing Targeted Drug Delivery through Hierarchical Network-Based Molecular Communication System. EMBC 2024: 1-4 - [i1]Chunlu Chen, Ji Liu, Haowen Tan, Xingjian Li, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai, Dejing Dou:
Trustworthy Federated Learning: Privacy, Security, and Beyond. CoRR abs/2411.01583 (2024) - 2023
- [j27]Sichun Lv, Haowen Tan, Wenying Zheng, Tao Zhang
, Menglei Wang:
A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing. Comput. Commun. 209: 239-248 (2023) - [j26]Yuxiang Zhou, Haowen Tan, Karunarathina Chandrathilaka Appuhamilage Asiria Iroshan:
A secure authentication and key agreement scheme with dynamic management for vehicular networks. Connect. Sci. 35(1) (2023) - [j25]Qingru Ma, Haowen Tan, Tianqi Zhou:
Mutual authentication scheme for smart devices in IoT-enabled smart home systems. Comput. Stand. Interfaces 86: 103743 (2023) - [j24]Haowen Tan:
An efficient IoT group association and data sharing mechanism in edge computing paradigm. Cyber Secur. Appl. 1: 100003 (2023) - [j23]Ishak Meraouche
, Sabyasachi Dutta
, Haowen Tan, Kouichi Sakurai:
Learning asymmetric encryption using adversarial neural networks. Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023) - [j22]Ying Tian, Haowen Tan, Jian Shen, Pandi Vijayakumar, Brij B. Gupta, Varsha Arya:
Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management. Inf. Sci. 644: 119255 (2023) - [j21]Haowen Tan
, Wenying Zheng
, Pandi Vijayakumar
:
Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs. IEEE Trans. Intell. Transp. Syst. 24(6): 6389-6400 (2023) - [j20]Haowen Tan
, Wenying Zheng
, Pandi Vijayakumar
, Kouichi Sakurai
, Neeraj Kumar
:
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15590-15600 (2023) - [j19]Haowen Tan
, Wenying Zheng
, Yunguo Guan
, Rongxing Lu
:
A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications. IEEE Trans. Veh. Technol. 72(3): 3622-3635 (2023) - 2022
- [j18]Haowen Tan
, Junqiu Zhu
, Yanning Xu
, Xiangxu Meng, Lu Wang
, Ling-Qi Yan:
Real-Time Microstructure Rendering with MIP-Mapped Normal Map Samples. Comput. Graph. Forum 41(1): 495-506 (2022) - [c8]Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta
, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. AsiaCCS 2022: 1213-1215 - [c7]Tianqi Zhou, Wenying Zheng, Haowen Tan:
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. NSS 2022: 305-318 - [c6]Qingru Ma, Tianqi Zhou
, Haowen Tan
:
D2D Authentication Scheme for IoT-enabled Smart Home. SocialSec 2022: 83-93 - [c5]Yuxiang Zhou, Haowen Tan, Karunarathina Chandrathilaka Appuhamilage Asiria Iroshan:
A Secure and Privacy-Preserving Authentication Scheme in IoMT. SocialSec 2022: 163-174 - 2021
- [j17]Ishak Meraouche
, Sabyasachi Dutta
, Haowen Tan
, Kouichi Sakurai
:
Neural Networks-Based Cryptography: A Survey. IEEE Access 9: 124727-124740 (2021) - [j16]Shichang Xuan
, Zhiyu Chen, Ilyong Chung, Haowen Tan, Dapeng Man, Xiaojiang Du, Wu Yang, Mohsen Guizani
:
ECBCM: A prestige-based edge computing blockchain security consensus model. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j15]Guozhong Dong
, Weizhe Zhang
, Haowen Tan
, Rahul Yadav
, Shuaishuai Tan
:
EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements. Secur. Commun. Networks 2021: 9954957:1-9954957:11 (2021) - [c4]Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. CANDAR (Workshops) 2021: 473-477 - 2020
- [j14]Haowen Tan
, Ilyong Chung
:
Secure Authentication and Key Management With Blockchain in VANETs. IEEE Access 8: 2482-2498 (2020) - [j13]Yuanzhao Song
, Haowen Tan
:
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks. Cybersecur. 3(1): 21 (2020) - [j12]Tianqi Zhou, Jian Shen
, Xiong Li
, Chen Wang
, Haowen Tan
:
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix. Future Gener. Comput. Syst. 108: 1307-1313 (2020) - [j11]Haowen Tan
, Shichang Xuan
, Ilyong Chung
:
HCDA: Efficient Pairing-Free Homographic Key Management for Dynamic Cross-Domain Authentication in VANETs. Symmetry 12(6): 1003 (2020)
2010 – 2019
- 2019
- [j10]Haowen Tan
, Ilyong Chung:
Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor. IEEE Access 7: 151459-151474 (2019) - [j9]Haowen Tan
, Yuanzhao Song
, Shichang Xuan
, Sung Bum Pan
, Ilyong Chung
:
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis. Symmetry 11(8): 969 (2019) - 2018
- [j8]Haowen Tan
, Ziyuan Gui, Ilyong Chung:
A Secure and Efficient Certificateless Authentication Scheme With Unsupervised Anomaly Detection in VANETs. IEEE Access 6: 74260-74276 (2018) - [j7]Jian Shen
, Ziyuan Gui, Sai Ji, Jun Shen, Haowen Tan, Yi Tang:
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106: 117-123 (2018) - [j6]Haowen Tan
, Ilyong Chung
:
A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs. Sensors 18(11): 3930 (2018) - [j5]Haowen Tan
, Dongmin Choi, Pankoo Kim, Sung Bum Pan, Ilyong Chung:
Comments on "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks". IEEE Trans. Intell. Transp. Syst. 19(7): 2149-2151 (2018) - [j4]Haowen Tan
, Dongmin Choi
, Pankoo Kim
, Sung Bum Pan
, Ilyong Chung
:
Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs. Wirel. Commun. Mob. Comput. 2018: 7978027:1-7978027:13 (2018) - 2017
- [j3]Jian Shen
, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22761-22783 (2017) - [j2]Jian Shen
, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang:
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multim. Tools Appl. 76(21): 22785 (2017) - 2015
- [j1]Jian Shen, Haowen Tan, Sangman Moh, Ilyong Chung, Qi Liu, Xingming Sun:
Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Networks 17(5): 453-462 (2015) - 2014
- [c3]Jian Shen, Haowen Tan, Sai Ji, Yongjun Ren, Jin Wang:
A Comparative Survey on RFID Grouping Authentication Protocols. ICS 2014: 982-993 - [c2]Jian Shen, Haowen Tan, Yuhui Zheng, Sai Ji, Jin Wang:
An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection. ICS 2014: 2070-2079 - [c1]Jian Shen, Haowen Tan, Yongjun Ren, Yuhui Zheng, Jin Wang
:
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers. ICS 2014: 2162-2171
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint