Chunxiang Xu
Orcid: 0000-0002-5411-7621
According to our database1,
Chunxiang Xu
authored at least 167 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Syst. Archit., January, 2024
BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management.
J. Inf. Sci. Eng., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Int. J. Intell. Syst., 2024
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
J. Inf. Secur. Appl., December, 2023
HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain.
IEEE Trans. Mob. Comput., November, 2023
J. Inf. Secur. Appl., November, 2023
Sensors, October, 2023
Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things.
IEEE Syst. J., September, 2023
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Cloud Comput., 2023
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Syst. J., 2022
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022
Improvements on <i>k</i>-error linear complexity of <i>q</i>-ary sequences derived from Euler quotients.
Cryptologia, 2022
IEEE Access, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Review of Detection and Avoidance of Interference Among Multiple Applications in Software-Defined Networks.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks.
Wirel. Pers. Commun., 2021
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021
Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage.
IEEE Trans. Cloud Comput., 2021
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors.
IEEE Trans. Cloud Comput., 2021
J. Syst. Archit., 2021
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021
A Novel Nonlinear Control for Uncertain Polynomial Type-2 Fuzzy Systems (Case Study: Cart-Pole System).
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
A Blockchain-based Online Transaction System for Physical Products Trading with Fairness, Privacy Preservation, and Auditability.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
Wireless Networks, Springer, ISBN: 978-981-15-4373-9, 2020
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage.
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020
Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey.
Int. J. Netw. Secur., 2020
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.
Int. J. Inf. Sec., 2020
Efficient light-weight private auditing scheme for cloud-based wireless body area networks.
Int. J. Electron. Secur. Digit. Forensics, 2020
On k-Error Linear Complexity of Binary Sequences Derived From Euler Quotients Modulo 2p.
IEEE Access, 2020
Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Regularized extreme learning machine-based intelligent adaptive control for uncertain nonlinear systems in networked control systems.
Pers. Ubiquitous Comput., 2019
Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems.
Pervasive Mob. Comput., 2019
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
KSII Trans. Internet Inf. Syst., 2019
An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2019
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
J. Inf. Secur. Appl., 2019
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
J. Inf. Secur. Appl., 2019
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019
On error linear complexity of new generalized cyclotomic binary sequences of period <i>p</i><sup>2</sup>.
Inf. Process. Lett., 2019
Future Gener. Comput. Syst., 2019
Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019
An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
Sci. China Inf. Sci., 2019
Ann. des Télécommunications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
Wirel. Pers. Commun., 2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
KSII Trans. Internet Inf. Syst., 2018
KSII Trans. Internet Inf. Syst., 2018
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
J. Inf. Secur. Appl., 2018
Int. J. Web Grid Serv., 2018
Int. J. Electron. Secur. Digit. Forensics, 2018
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018
Adv. Multim., 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
On k-error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period p<sup>2</sup>.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017
Soft Comput., 2017
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017
Int. J. Netw. Secur., 2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017
On error linear complexity of new generalized cyclotomic binary sequences of period p<sup>2</sup>.
CoRR, 2017
2016
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
Symmetry, 2016
云存储环境下支持策略变更的CP-ABE方案 (CP-ABE Scheme with Supporting Policy Elastic Updating in Cloud Storage Environment).
计算机科学, 2016
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Inf., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users.
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope.
Intell. Autom. Soft Comput., 2016
Concurr. Comput. Pract. Exp., 2016
Analysis and improvement of a fair remote retrieval protocol for private medical records.
Concurr. Comput. Pract. Exp., 2016
IEEE Cloud Comput., 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
2015
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015
J. Inf. Secur. Appl., 2015
Int. J. Netw. Secur., 2015
Int. J. Inf. Commun. Technol., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
2014
KSII Trans. Internet Inf. Syst., 2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014
Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014
Comput. Electr. Eng., 2014
Comput. Electr. Eng., 2014
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol in Proximity-Based Mobile Social Networks.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013
Frontiers Comput. Sci., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing.
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2011
J. Syst. Softw., 2011
Comput. Commun., 2011
Proceedings of the Advances in Computer Science, 2011
2010
Frontiers Comput. Sci. China, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
A Petri Net-Based Algorithm for RFID Event Detection.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Comput. Stand. Interfaces, 2009
Comput. Math. Appl., 2009
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Int. J. Netw. Secur., 2008
Concurr. Comput. Pract. Exp., 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006
Proceedings of the Computational Science, 2006
2005
IACR Cryptol. ePrint Arch., 2005
2004
IACR Cryptol. ePrint Arch., 2004