Changshe Ma
Orcid: 0000-0002-7369-6788
According to our database1,
Changshe Ma
authored at least 22 papers
between 2005 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
2021
Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification.
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries Without Keyword Pair Result Pattern Leakage.
IEEE Access, 2020
2019
2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2012
2011
Proceedings of the Information Security Practice and Experience, 2011
2010
Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
IACR Cryptol. ePrint Arch., 2007
2006
Comput. Stand. Interfaces, 2006
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Information Security, 8th International Conference, 2005