Chunxiang Xu

Orcid: 0000-0002-5411-7621

According to our database1, Chunxiang Xu authored at least 169 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A portable blind cloud storage scheme against compromised servers.
J. Syst. Archit., January, 2024

BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management.
J. Inf. Sci. Eng., January, 2024

Privacy-Preserving Cryptocurrency With Threshold Authentication and Regulation.
IEEE Trans. Inf. Forensics Secur., 2024

Hardening Password-Based Credential Databases.
IEEE Trans. Inf. Forensics Secur., 2024

Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates.
IEEE Trans. Inf. Forensics Secur., 2024

TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy.
IEEE Trans. Dependable Secur. Comput., 2024

A Secure Two-Factor Authentication Key Exchange Scheme.
IEEE Trans. Dependable Secur. Comput., 2024

Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage.
J. Parallel Distributed Comput., 2024

Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG.
Int. J. Intell. Syst., 2024

Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
ttPAKE: Typo tolerance password-authenticated key exchange.
J. Inf. Secur. Appl., December, 2023

HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain.
IEEE Trans. Mob. Comput., November, 2023

GAIN: Decentralized Privacy-Preserving Federated Learning.
J. Inf. Secur. Appl., November, 2023

EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems.
Sensors, October, 2023

Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things.
IEEE Syst. J., September, 2023

Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023

Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023

LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023

Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage.
IEEE Trans. Serv. Comput., 2023

SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search.
IEEE Trans. Cloud Comput., 2023

Novel bribery mining attacks in the bitcoin system and the bribery miner's dilemma.
CoRR, 2023

A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022

A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens.
IEEE Trans. Inf. Forensics Secur., 2022

Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems.
IEEE Trans. Dependable Secur. Comput., 2022

On the Security of Verifiable Searchable Encryption Schemes.
IEEE Trans. Cloud Comput., 2022

On the Security of an ECC-Based Authentication Scheme for Internet of Drones.
IEEE Syst. J., 2022

Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022

Improvements on <i>k</i>-error linear complexity of <i>q</i>-ary sequences derived from Euler quotients.
Cryptologia, 2022

Efficient Anonymous Authentication for Wireless Body Area Networks.
IEEE Access, 2022

Ciphertext storage scheme supporting data hierarchical management and control.
Proceedings of the International Conference on Networking and Network Applications, 2022

Formal Verification of Security Protocols: ProVerif and Extensions.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Review of Detection and Avoidance of Interference Among Multiple Applications in Software-Defined Networks.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks.
Wirel. Pers. Commun., 2021

PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021

Security Analysis of a Path Validation Scheme With Constant-Size Proof.
IEEE Trans. Inf. Forensics Secur., 2021

Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021

FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors.
IEEE Trans. Cloud Comput., 2021

Comments on an identity-based signature scheme for VANETs.
J. Syst. Archit., 2021

ICAS: Two-factor identity-concealed authentication scheme for remote-servers.
J. Syst. Archit., 2021

PFLM: Privacy-preserving federated learning with membership proof.
Inf. Sci., 2021

Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021

A Novel Nonlinear Control for Uncertain Polynomial Type-2 Fuzzy Systems (Case Study: Cart-Pole System).
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

BESURE: Blockchain-Based Cloud-Assisted eHealth System with Secure Data Provenance.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

A Blockchain-based Online Transaction System for Physical Products Trading with Fairness, Privacy Preservation, and Auditability.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

Privacy-Preserving Friend Matching for Mobile Social Networks.
Proceedings of the IEEE Global Communications Conference, 2021

Lattice-Based Secure Authentication Scheme for Cloud Storage.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Data Security in Cloud Storage
Wireless Networks, Springer, ISBN: 978-981-15-4373-9, 2020

Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage.
IEEE Trans. Serv. Comput., 2020

On the Security of a Key Agreement and Key Protection Scheme.
IEEE Trans. Inf. Forensics Secur., 2020

Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020

Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey.
Int. J. Netw. Secur., 2020

Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.
Int. J. Inf. Sec., 2020

Efficient light-weight private auditing scheme for cloud-based wireless body area networks.
Int. J. Electron. Secur. Digit. Forensics, 2020

Server-aided searchable encryption in multi-user setting.
Comput. Commun., 2020

On k-Error Linear Complexity of Binary Sequences Derived From Euler Quotients Modulo 2p.
IEEE Access, 2020

Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage.
Proceedings of the Security and Privacy in Digital Economy, 2020

Towards an Aggregate Signature-based Authentication for Opportunistic Networks.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Regularized extreme learning machine-based intelligent adaptive control for uncertain nonlinear systems in networked control systems.
Pers. Ubiquitous Comput., 2019

Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems.
Pervasive Mob. Comput., 2019

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
KSII Trans. Internet Inf. Syst., 2019

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2019

Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
J. Inf. Secur. Appl., 2019

CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
J. Inf. Secur. Appl., 2019

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019

On error linear complexity of new generalized cyclotomic binary sequences of period <i>p</i><sup>2</sup>.
Inf. Process. Lett., 2019

DStore: A distributed system for outsourced data storage and retrieval.
Future Gener. Comput. Syst., 2019

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019

An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
Sci. China Inf. Sci., 2019

Lattice-based dynamic group signature for anonymous authentication in IoT.
Ann. des Télécommunications, 2019

Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
Wirel. Pers. Commun., 2018

HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
KSII Trans. Internet Inf. Syst., 2018

Private Blockchain-Based Secure Access Control for Smart Home Systems.
KSII Trans. Internet Inf. Syst., 2018

A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
J. Inf. Secur. Appl., 2018

Lattice-based searchable public-key encryption scheme for secure cloud storage.
Int. J. Web Grid Serv., 2018

Efficient multi-receiver identity-based signcryption from lattice assumption.
Int. J. Electron. Secur. Digit. Forensics, 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018

Pretraining Convolutional Neural Networks for Image-Based Vehicle Classification.
Adv. Multim., 2018

Blockchain-Based Secure Data Provenance for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

On k-error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period p<sup>2</sup>.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

Statistical learning based fully homomorphic encryption on encrypted data.
Soft Comput., 2017

A Privacy Model for RFID Tag Ownership Transfer.
Secur. Commun. Networks, 2017

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017

Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol.
Int. J. Netw. Secur., 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

On error linear complexity of new generalized cyclotomic binary sequences of period p<sup>2</sup>.
CoRR, 2017

2016
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
Symmetry, 2016

云存储环境下支持策略变更的CP-ABE方案 (CP-ABE Scheme with Supporting Policy Elastic Updating in Cloud Storage Environment).
计算机科学, 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016

An Efficient Dynamic Group Signature with Non-frameability.
KSII Trans. Internet Inf. Syst., 2016

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability.
Inf., 2016

An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter.
Int. J. Netw. Secur., 2016

A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT.
Int. J. Netw. Secur., 2016

PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users.
Int. J. Netw. Secur., 2016

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System.
Int. J. Netw. Secur., 2016

Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016

A new group signature scheme for dynamic membership.
Int. J. Electron. Secur. Digit. Forensics, 2016

Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope.
Intell. Autom. Soft Comput., 2016

A new certificateless signature with enhanced security and aggregation version.
Concurr. Comput. Pract. Exp., 2016

Analysis and improvement of a fair remote retrieval protocol for private medical records.
Concurr. Comput. Pract. Exp., 2016

Cryptographic Public Verification of Data Integrity for Cloud Storage Systems.
IEEE Cloud Comput., 2016

Secure Searchable Public-Key Encryption for Cloud Storage.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Secur. Appl., 2015

A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update.
Int. J. Netw. Secur., 2015

Server-aided aggregate verification signature: security definition and construction.
Int. J. Inf. Commun. Technol., 2015

A post-quantum communication secure identity-based proxy-signcryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2015

An efficient certificateless deniable authentication protocol without pairings.
Int. J. Electron. Secur. Digit. Forensics, 2015

Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

ID-Based Deniable Threshold Ring Authentication.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2014

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014

Cloud data auditing with designated verifier.
Frontiers Comput. Sci., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Efficient forward secure identity-based shorter signature from lattice.
Comput. Electr. Eng., 2014

Secure and efficient privacy-preserving public auditing scheme for cloud storage.
Comput. Electr. Eng., 2014

A Non-Parametric Data Envelopment Analysis Approach for Cloud Services Evaluation.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014

Optimized MHealth Batch Verification for a Variant of DSA.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol in Proximity-Based Mobile Social Networks.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

An Improved Certificateless Aggregate Signature.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A novel certificateless deniable authentication protocol.
IACR Cryptol. ePrint Arch., 2013

Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013

A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
Strongly unforgeable proxy signature scheme secure in the standard model.
J. Syst. Softw., 2011

Improvement of a proxy multi-signature scheme without random oracles.
Comput. Commun., 2011

The Research of Tobacco Leaf Roasting Control Tactics Based on Fuzzy PID.
Proceedings of the Advances in Computer Science, 2011

2010
A new model for model checking: cycle-weighted Kripke structure.
Frontiers Comput. Sci. China, 2010

Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Petri Net-Based Method for Data Validation of Web Services Composition.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Petri Net-Based Algorithm for RFID Event Detection.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules.
IACR Cryptol. ePrint Arch., 2009

An efficient anonymous proxy signature scheme with provable security.
Comput. Stand. Interfaces, 2009

Designated verifier proxy signature scheme without random oracles.
Comput. Math. Appl., 2009

A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Cryptanalysis of Two Identity Based Signcryption Schemes.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security.
Int. J. Netw. Secur., 2008

A practical method to analyze workflow logic models.
Concurr. Comput. Pract. Exp., 2008

Modeling and verifying BPEL using synchronized net.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

2007
Formalizing Web Service Choreography Interface.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Stochastic modeling and quality evaluation of component-based software systems.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Stochastic Modeling and Quality Evaluation of Workflow Systems Based on QWF-Nets.
Proceedings of the Computational Science, 2006

2005
A Note on Secure Key Issuing in ID-based Cryptography.
IACR Cryptol. ePrint Arch., 2005

2004
Forgery Attacks on Chang et al.'s signature scheme with message recovery.
IACR Cryptol. ePrint Arch., 2004


  Loading...