Jing Xu
Orcid: 0000-0002-0432-6206Affiliations:
- Chinese Academy of Sciences, Trusted Computing and Information Assurance Laboratory, Beijing, China
- Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China (former)
- Chinese Academy of Sciences, Academy of Mathematics and Systems Science, China (PhD 2002)
According to our database1,
Jing Xu
authored at least 46 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
1
3
3
3
3
4
1
1
2
4
1
2
1
2
1
1
2
1
1
2
2
1
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting.
IEEE Trans. Dependable Secur. Comput., 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Inf. Secur. Appl., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
Correction to: Revisiting the Security of Qian et al.'s Revised Tree-$\hbox {LSHB}^+$ Protocol.
Wirel. Pers. Commun., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Revisiting the Security of Qian et al.'s Revised Tree- $$\hbox {LSHB}^+$$ LSHB + Protocol.
Wirel. Pers. Commun., 2019
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.
IEEE Trans. Dependable Secur. Comput., 2019
CoRR, 2019
Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network.
Proceedings of the Computer Security - ESORICS 2019, 2019
2017
Sci. China Inf. Sci., 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Proceedings of the Applied Cryptography and Network Security, 2015
2013
Secur. Commun. Networks, 2013
J. Comput. Sci. Technol., 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2011
J. Inf. Process. Syst., 2011
An efficient location-based compromise-tolerant key management scheme for sensor networks.
Inf. Process. Lett., 2011
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card.
Concurr. Comput. Pract. Exp., 2011
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.
Comput. Commun., 2011
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2009
Comput. Stand. Interfaces, 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
2003
IACR Cryptol. ePrint Arch., 2003