Profile The profile is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 4 Similar Profiles
Wireless sensor networks Engineering & Materials Science
Communication Engineering & Materials Science
Network protocols Engineering & Materials Science
Cryptography Engineering & Materials Science
Authentication Engineering & Materials Science
Jamming Engineering & Materials Science
Code division multiple access Engineering & Materials Science
Frequency hopping Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Grants 2007 2018

Publications 1994 2017

  • 16 h-Index
  • 73 Conference contribution
  • 39 Article
  • 1 Chapter

A client-based secure deduplication of multimedia data

Li, D., Yang, C., Li, C., Jiang, Q., Chen, X., Ma, J. & Ren, J. Jul 28 2017 2017 IEEE International Conference on Communications, ICC 2017. Institute of Electrical and Electronics Engineers Inc., 7997111

Research output: ResearchConference contribution

Image quality
Internet
Bandwidth
Communication

Congestion-aware routing scheme based on traffic information in sensor networks

Tang, D., Li, T. & Ren, J. 2017 In : Ad-Hoc and Sensor Wireless Networks. 35, 3-4, p. 281-300 20 p.

Research output: Research - peer-reviewArticle

congestion
traffic
sensors
Sensor networks
Throughput

Dynamic Authentication Protocol Using Self-powered Timers for Passive Internet of Things

Afifi, M. H., Zhou, L., Chakrabartty, S. & Ren, J. Sep 28 2017 (Accepted/In press) In : IEEE Internet of Things Journal.

Research output: Research - peer-reviewArticle

Authentication
Network protocols
Internet of things
Telecommunication links
Servers
1 Citations

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing

Zhou, K., Afifi, M. H. & Ren, J. Nov 1 2017 In : IEEE Transactions on Information Forensics and Security. 12, 11, p. 2518-2531 14 p., 7937952

Research output: Research - peer-reviewArticle

Mobile cloud computing
Outsourcing
Mobile devices
Cryptography
Servers

Optimal construction of regenerating code through rate-matching in hostile networks

Li, J., Li, T. & Ren, J. Jul 1 2017 In : IEEE Transactions on Information Theory. 63, 7, p. 4414-4429 16 p., 7900421

Research output: Research - peer-reviewArticle

Bandwidth
efficiency
Repair