Huixian Li
Orcid: 0000-0001-8098-9573
According to our database1,
Huixian Li
authored at least 31 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
1
2
3
4
1
2
1
1
2
2
2
2
2
2
2
1
1
1
1
2
1
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Trans. Inf. Forensics Secur., 2025
2024
An Adaptive Safe-Region Diversity Oversampling Algorithm for Imbalanced Classification.
IEEE Access, 2024
Enhancing Language Learning Through Multimodal AI-Driven Feedback on Picture Descriptions: An Eye-Tracking Study.
Proceedings of the Proceeding of the 32nd International Conference on Computers in Education, 2024
2022
Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability.
J. Inf. Secur. Appl., 2022
2020
2019
Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC.
IEEE Access, 2019
IEEE Access, 2019
2018
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings.
IEEE Access, 2018
IEEE Access, 2018
2017
Int. J. Commun. Syst., 2017
IET Inf. Secur., 2017
2016
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model.
Int. J. Distributed Sens. Networks, 2016
Int. J. Distributed Sens. Networks, 2016
2015
Secure of personal health records shared in cloud computing using cipher-text attribute based encryption.
Int. J. Secur. Networks, 2015
2014
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
Int. J. Commun. Syst., 2014
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2014
2013
Inf. Process. Lett., 2013
nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness.
Comput. Informatics, 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
2012
Improved multicast key management of Chinese wireless local area network security standard.
IET Commun., 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
Proceedings of the Advances in Computer Science, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2003
Proceedings of the 11th European Conference on Information Systems, 2003