Kefei Chen

Orcid: 0000-0003-1961-5614

According to our database1, Kefei Chen authored at least 256 papers between 1995 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Load-aware switch migration for controller load balancing in edge-cloud architectures.
Future Gener. Comput. Syst., 2025

2024
A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time.
Symmetry, June, 2024

A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024

Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center.
IEEE Internet Things J., April, 2024

A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+.
J. Ambient Intell. Humaniz. Comput., February, 2024

Faster matrix approximate homomorphic encryption.
Comput. Stand. Interfaces, January, 2024

Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates.
IEEE Trans. Inf. Forensics Secur., 2024

TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy.
IEEE Trans. Dependable Secur. Comput., 2024

A Secure Two-Factor Authentication Key Exchange Scheme.
IEEE Trans. Dependable Secur. Comput., 2024

A blockchain-based framework for federated learning with privacy preservation in power load forecasting.
Knowl. Based Syst., 2024

TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT.
IET Inf. Secur., 2024

2023
ttPAKE: Typo tolerance password-authenticated key exchange.
J. Inf. Secur. Appl., December, 2023

GAIN: Decentralized Privacy-Preserving Federated Learning.
J. Inf. Secur. Appl., November, 2023

Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023

DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., April, 2023

Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage.
IEEE Trans. Serv. Comput., 2023

SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search.
IEEE Trans. Cloud Comput., 2023

A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme.
IET Inf. Secur., 2023

Revocable attribute-based encryption from standard lattices.
Comput. Stand. Interfaces, 2023

Leveled Fully Homomorphic Signcryption From Lattices.
IEEE Access, 2023

An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids.
Wirel. Pers. Commun., 2022

On the Security of Verifiable Searchable Encryption Schemes.
IEEE Trans. Cloud Comput., 2022

Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022

An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs.
J. Syst. Archit., 2022

A blockchain-based dynamic and traceable data integrity verification scheme for smart homes.
J. Syst. Archit., 2022

A sanitizable signcryption scheme with public verifiability via chameleon hash function.
J. Inf. Secur. Appl., 2022

Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices.
IEEE Internet Things J., 2022

Provable Data Possession Schemes from Standard Lattices for Cloud Computing.
Comput. J., 2022

2021
Explaining similarity for SPARQL queries.
World Wide Web, 2021

Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET.
IEEE Trans. Veh. Technol., 2021

A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era.
IEEE Trans. Netw. Sci. Eng., 2021

Security Analysis of a Path Validation Scheme With Constant-Size Proof.
IEEE Trans. Inf. Forensics Secur., 2021

Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021

Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021

CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN.
Theor. Comput. Sci., 2021

Attribute-based proxy re-encryption from standard lattices.
Theor. Comput. Sci., 2021

CLE against SOA with Better Data Security Storage to Cloud 5G.
Secur. Commun. Networks, 2021

Compressible Multikey and Multi-Identity Fully Homomorphic Encryption.
Secur. Commun. Networks, 2021

Efficient First-Price Sealed-Bid Auction Scheme.
J. Inf. Sci. Eng., 2021

Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings.
IEEE Access, 2021

2020
On the Security of a Key Agreement and Key Protection Scheme.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

Practical CCA-Secure Functional Encryptions for Deterministic Functions.
Secur. Commun. Networks, 2020

A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update.
Secur. Commun. Networks, 2020

Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.
Peer-to-Peer Netw. Appl., 2020

Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.
Int. J. Inf. Sec., 2020

Reusable Fuzzy Extractor Based on the LPN Assumption.
Comput. J., 2020

Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers Inf. Technol. Electron. Eng., 2019

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
KSII Trans. Internet Inf. Syst., 2019

Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
J. Inf. Secur. Appl., 2019

Functional broadcast encryption with applications to data sharing for cloud storage.
Inf. Sci., 2019

A more efficient leveled strongly-unforgeable fully homomorphic signature scheme.
Inf. Sci., 2019

Fully homomorphic encryption based on the ring learning with rounding problem.
IET Inf. Secur., 2019

A framework for quantum homomorphic encryption with experimental demonstration.
CoRR, 2019

A new VRSA-based pairing-free certificateless signature scheme for fog computing.
Concurr. Comput. Pract. Exp., 2019

An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
Sci. China Inf. Sci., 2019

Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes.
IEEE Access, 2019

Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Adversarial attack against scene recognition system for unmanned vehicles.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
LWR-Based Fully Homomorphic Encryption, Revisited.
Secur. Commun. Networks, 2018

A new randomized message-locked encryption in the standard model.
Peer-to-Peer Netw. Appl., 2018

Connected Vehicles' Security from the Perspective of the In-Vehicle Network.
IEEE Netw., 2018

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
KSII Trans. Internet Inf. Syst., 2018

Access control encryption with efficient verifiable sanitized decryption.
Inf. Sci., 2018

Efficient identity-based threshold decryption scheme from bilinear pairings.
Frontiers Comput. Sci., 2018

Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.
Cryptogr., 2018

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF.
Sci. China Inf. Sci., 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018

Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.
Proceedings of the Information Security Practice and Experience, 2018

Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything.
Secur. Commun. Networks, 2017

Insight of the protection for data security under selective opening attacks.
Inf. Sci., 2017

Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security.
Informatica, 2017

Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens.
Comput. Stand. Interfaces, 2017

A new construction on randomized message-locked encryption in the standard model via UCEs.
Sci. China Inf. Sci., 2017

An efficient pairing-free certificateless signature scheme for resource-limited systems.
Sci. China Inf. Sci., 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017

Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Comput. Electr. Eng., 2017

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016

Fuzzy certificateless signature.
Secur. Commun. Networks, 2016

Certificateless encryption secure against selective opening attack.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Efficient revocable identity-based encryption from multilinear maps.
Secur. Commun. Networks, 2015

<i>n</i>-Evasive all-but-many lossy trapdoor function and its constructions.
Secur. Commun. Networks, 2015

Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience.
IET Inf. Secur., 2015

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security.
IACR Cryptol. ePrint Arch., 2015

Non-malleability under Selective Opening Attacks: Implication and Separation.
IACR Cryptol. ePrint Arch., 2015

Optimal assignment schemes for general access structures based on linear programming.
Des. Codes Cryptogr., 2015

Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
Comput. J., 2015

Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Int. J. Appl. Math. Comput. Sci., 2015

A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Attribute-based key-insulated signature and its applications.
Inf. Sci., 2014

Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
Int. J. Internet Protoc. Technol., 2014

PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurr. Comput. Pract. Exp., 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014

Proofs of Retrievability Based on MRD Codes.
Proceedings of the Information Security Practice and Experience, 2014

On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

2013
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013

Enhancements of a three-party password-based authenticated key exchange protocol.
Int. Arab J. Inf. Technol., 2013

Proofs of Data Possession and Retrievability Based on MRD Codes.
IACR Cryptol. ePrint Arch., 2013

A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms.
IACR Cryptol. ePrint Arch., 2013

Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Secure and Oblivious Information Hiding in Binary Image.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Leakage-resilient lossy trapdoor functions and public-key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Syst., 2012

An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2012

Identity-Based Key-Insulated Signcryption.
Informatica, 2012

Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment.
Int. J. Cloud Appl. Comput., 2012

On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012

Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures.
IACR Cryptol. ePrint Arch., 2012

Efficient identity-based threshold signature scheme from bilinear pairings in the standard model.
IACR Cryptol. ePrint Arch., 2012

Efficient identity-based threshold decryption scheme from bilinear pairings.
IACR Cryptol. ePrint Arch., 2012

Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model.
IACR Cryptol. ePrint Arch., 2012

Accountable authority key policy attribute-based encryption.
Sci. China Inf. Sci., 2012

Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption.
Proceedings of the Network and System Security - 6th International Conference, 2012

Annihilators of Fast Discrete Fourier Spectra Attacks.
Proceedings of the Advances in Information and Computer Security, 2012

Designated Condition One-Time Signatures.
Proceedings of the Internet and Distributed Computing Systems, 2012

Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

A Generic Construction of Accountable Decryption and Its Applications.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Restrictive partially blind signature for resource-constrained information systems.
Knowl. Inf. Syst., 2011

Key updating technique in identity-based encryption.
Inf. Sci., 2011

Self-generated-certificate public key encryption without pairing and its application.
Inf. Sci., 2011

YI Cloud: Improving user privacy with secret key recovery in cloud storage.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011

Lightweight Delegated Subset Test with Privacy Protection.
Proceedings of the Information Security Practice and Experience, 2011

Homomorphic Linear Authentication Schemes for Proofs of Retrievability.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010

A Genetic Algorithm Based Clustering Approach with Tabu Operation and K-Means Operation.
J. Intell. Syst., 2010

Practical Certificateless Aggregate Signatures from Bilinear Maps.
J. Inf. Sci. Eng., 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism.
Inf. Sci., 2010

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010

2009
Fair and Secure Mobile Billing Systems.
Wirel. Pers. Commun., 2009

When is a key establishment protocol correct?
Secur. Commun. Networks, 2009

Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng., 2009

Receipt-Freeness for Groth e-Voting Schemes.
J. Inf. Sci. Eng., 2009

Provably Secure Identity-based Threshold Key Escrow from Pairing.
Int. J. Netw. Secur., 2009

A key management protocol with robust continuity for sensor networks.
Comput. Stand. Interfaces, 2009

Secure multiple-times proxy signature scheme.
Comput. Stand. Interfaces, 2009

Democratic group signatures with collective traceability.
Comput. Electr. Eng., 2009

A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Efficient Secure Multiparty Computation Protocol in Asynchronous Network.
Proceedings of the Advances in Information Security and Assurance, 2009

How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Extended PEG Algorithm for High Rate LDPC Codes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Bitwise Higher Order Differential Cryptanalysis.
Proceedings of the Trusted Systems, First International Conference, 2009

A game controller based on multiple sensors.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2009

2008
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng., 2008

A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008

A tabu search approach for the minimum sum-of-squares clustering problem.
Inf. Sci., 2008

Enforcing trust in pervasive computing.
Int. J. Syst. Syst. Eng., 2008

Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2008

Democratic Group Signatures with Threshold Traceability.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2008

A synthetic indifferentiability analysis of some block-cipher-based hash functions.
Des. Codes Cryptogr., 2008

MOHCS: Towards Mining Overlapping Highly Connected Subgraphs
CoRR, 2008

New Constructions of Permutation Arrays
CoRR, 2008

New Lower Bounds on Sizes of Permutation Arrays
CoRR, 2008

New Upper Bounds on Sizes of Permutation Arrays
CoRR, 2008

Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
J. Res. Pract. Inf. Technol., 2008

A Tamper-Evident Voting Machine Resistant to Covert Channels.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Certificateless threshold cryptosystem secure against chosen-ciphertext attack.
Inf. Sci., 2007

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
Informatica, 2007

Code-based Ring Signature Scheme.
Int. J. Netw. Secur., 2007

LFSR-based Signatures with Message Recovery.
Int. J. Netw. Secur., 2007

Filling the Gap between Voters and Cryptography in e-Voting.
IACR Cryptol. ePrint Arch., 2007

Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Sci. China Ser. F Inf. Sci., 2007

ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Comput. Electr. Eng., 2007

Two Certificateless Aggregate Signatures From Bilinear Maps.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Efficient Partially Blind Signature from LFSR.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Protocol Engineering Principles for Cryptographic Protocols Design.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Efficient Receipt-Free Electronic Auction Protocol.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Secure Time Synchronization Protocol for Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Identity-Based Threshold Decryption Revisited.
Proceedings of the Information Security Practice and Experience, 2007

Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Undeniable Mobile Billing Schemes.
Proceedings of the Public Key Infrastructure, 2007

Linkable Ring Signatures from Linear Feedback Shift Register.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Efficient Blind Signatures from Linear Feedback Shift Register.
Proceedings of the Cooperative Design, 2007

2006
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, 2006

Provably Secure Convertible User Designating Confirmer Partially Blind Signatures.
Informatica, 2006

Construction of Dynamic Threshold Decryption Scheme from Pairing.
Int. J. Netw. Secur., 2006

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
IACR Cryptol. ePrint Arch., 2006

Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i.
IACR Cryptol. ePrint Arch., 2006

Comments on a theorem on grid access control.
Future Gener. Comput. Syst., 2006

Comments on an access control model in semantic grid.
Future Gener. Comput. Syst., 2006

Analysis and improvement of fair certified e-mail delivery protocol.
Comput. Stand. Interfaces, 2006

An Improved Hybrid Genetic Clustering Algorithm.
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006

Rights Protection for Data Cubes.
Proceedings of the Information Security, 9th International Conference, 2006

A Practical Clumped-Tree Multicast Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2006

A Non-committing Encryption Scheme Based on Quadratic Residue.
Proceedings of the Computer and Information Sciences, 2006

Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006

A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
Proceedings of the Critical Information Infrastructures Security, 2006

Efficient Partially Blind Signature Scheme with Provable Security.
Proceedings of the Computing and Combinatorics, 12th Annual International Conference, 2006

Identity-Based Key-Insulated Signature with Secure Key-Updates.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Identity-Based Key-Insulated Signature Without Random Oracles.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Some new characters on the wire-tap channel of type II.
IEEE Trans. Inf. Theory, 2005

Efficient Authenticated Encryption Schemes with Public Verifiability
CoRR, 2005

Improvements on the WTLS protocol to avoid denial of service attacks.
Comput. Secur., 2005

Identity oriented signature scheme based on quadratic residues.
Appl. Math. Comput., 2005

A dynamic threshold commercial key escrow scheme based on conic.
Appl. Math. Comput., 2005

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.
Appl. Math. Comput., 2005

Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005

An Efficient Asynchronous Proactive RSA Scheme.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Proactive RSA Scheme for Large-Scale Ad Hoc Networks.
Proceedings of the Challenges in Ad Hoc Networking, 2005

A Hybrid Tabu Search Based Clustering Algorithm.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Efficient and Proactive Threshold Signcryption.
Proceedings of the Information Security, 8th International Conference, 2005

An Authentication Protocol for Pervasive Computing.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Security Solution of WLAN Based on Public Key Cryptosystem.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An efficient proxy signature scheme in home network DRM.
Proceedings of the ICETE 2005, 2005

Identity Based Conference Key Distribution Scheme from Parings.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Tabu Search Based Method for Minimum Sum of Squares Clustering.
Proceedings of the Pattern Recognition and Data Mining, 2005

A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Proceedings of the Discovery Science, 8th International Conference, 2005

A Novel Clustering Technique Based on Improved Noising Method.
Proceedings of the Progress in Pattern Recognition, 2005

Efficient Identity-Based Signatures and Blind Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Clustering with Noising Method.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

2004
A genetic clustering method for intrusion detection.
Pattern Recognit., 2004

Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol., 2004

Asynchronous Proactive RSA.
IACR Cryptol. ePrint Arch., 2004

Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004

Cryptanalysis of a timestamp-based password authentication scheme.
IACR Cryptol. ePrint Arch., 2004

On the orders of transformation matrices (mod <i>n</i>) and two types of generalized arnold transformation matrices.
Sci. China Ser. F Inf. Sci., 2004

Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Digital Image Authentication Based on Turbo Codes.
Proceedings of the Interactive Multimedia and Next Generation Networks: Second International Workshop on Multimedia Interactive Protocols and Systems, 2004

Proxy Structured Multisignature Scheme from Bilinear Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

SDD: Secure Distributed Diffusion Protocol for Sensor Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

ID-Based Proxy Blind Signature.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Identity Based Proxy-Signcryption Scheme from Pairings.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature.
IACR Cryptol. ePrint Arch., 2003

an attack on a multisignature scheme.
IACR Cryptol. ePrint Arch., 2003

Attacks on the (enhanced) Yang-Shieh authentication.
Comput. Secur., 2003

On the spectral singularities of watermarked audio.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Multimedia Tampering Localization Based on the Perturbation in Reverse Processing.
Proceedings of the Advances in Web-Age Information Management, 2003

On the Noninvertibility of Adaptive Digital Watermarking.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol., 2002

Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
Proceedings of the Advances in Web-Age Information Management, 2002

A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
Proceedings of the Information Security, 5th International Conference, 2002

Electronic Payment in Mobile Environment.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

1995
Rangabstandscodes und ihre Anwendungen in der Kryptographie.
PhD thesis, 1995

A New Identification Algorithm.
Proceedings of the Cryptography: Policy and Algorithms, 1995


  Loading...