Jie Chen

Orcid: 0000-0002-4152-8923

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China


According to our database1, Jie Chen authored at least 16 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Meet-in-the-middle attacks on AES with value constraints.
Des. Codes Cryptogr., September, 2024

2023
New Meet-in-the-Middle Attacks on FOX Block Cipher.
Comput. J., May, 2023

Improved integral cryptanalysis of SPNbox in digital rights management systems.
IET Inf. Secur., January, 2023

2022
Improved key-recovery attacks on reduced-round WEM-8.
Des. Codes Cryptogr., 2022

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix.
Sci. China Inf. Sci., 2022

2021
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid.
KSII Trans. Internet Inf. Syst., 2021

2018
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks.
Int. J. Distributed Sens. Networks, 2018

2015
PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Secur. Commun. Networks, 2015

An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2015

EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid.
Int. J. Distributed Sens. Networks, 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Gener. Comput. Syst., 2015

2014
Group-based authentication and key agreement for machine-type communication.
Int. J. Grid Util. Comput., 2014

Group Key Agreement in Multimedia Service for Machine Type Communication.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture.
Clust. Comput., 2013

2012
Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2007
Impossible differential cryptanalysis of Advanced Encryption Standard.
Sci. China Ser. F Inf. Sci., 2007


  Loading...