Kefei Chen
Orcid: 0000-0003-1961-5614
According to our database1,
Kefei Chen
authored at least 256 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Load-aware switch migration for controller load balancing in edge-cloud architectures.
Future Gener. Comput. Syst., 2025
2024
A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time.
Symmetry, June, 2024
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+.
J. Ambient Intell. Humaniz. Comput., February, 2024
Comput. Stand. Interfaces, January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A blockchain-based framework for federated learning with privacy preservation in power load forecasting.
Knowl. Based Syst., 2024
IET Inf. Secur., 2024
2023
J. Inf. Secur. Appl., December, 2023
J. Inf. Secur. Appl., November, 2023
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., April, 2023
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Cloud Comput., 2023
IET Inf. Secur., 2023
Comput. Stand. Interfaces, 2023
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids.
Wirel. Pers. Commun., 2022
IEEE Trans. Cloud Comput., 2022
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs.
J. Syst. Archit., 2022
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes.
J. Syst. Archit., 2022
A sanitizable signcryption scheme with public verifiability via chameleon hash function.
J. Inf. Secur. Appl., 2022
IEEE Internet Things J., 2022
Comput. J., 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
Theor. Comput. Sci., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings.
IEEE Access, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Secur. Commun. Networks, 2020
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update.
Secur. Commun. Networks, 2020
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.
Peer-to-Peer Netw. Appl., 2020
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.
Int. J. Inf. Sec., 2020
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers Inf. Technol. Electron. Eng., 2019
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
KSII Trans. Internet Inf. Syst., 2019
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
J. Inf. Secur. Appl., 2019
Inf. Sci., 2019
Inf. Sci., 2019
IET Inf. Secur., 2019
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
Sci. China Inf. Sci., 2019
IEEE Access, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Peer-to-Peer Netw. Appl., 2018
IEEE Netw., 2018
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
KSII Trans. Internet Inf. Syst., 2018
Inf. Sci., 2018
Frontiers Comput. Sci., 2018
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.
Cryptogr., 2018
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF.
Sci. China Inf. Sci., 2018
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.
Proceedings of the Information Security Practice and Experience, 2018
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017
Secur. Commun. Networks, 2017
Inf. Sci., 2017
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security.
Informatica, 2017
Comput. Stand. Interfaces, 2017
A new construction on randomized message-locked encryption in the standard model via UCEs.
Sci. China Inf. Sci., 2017
An efficient pairing-free certificateless signature scheme for resource-limited systems.
Sci. China Inf. Sci., 2017
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Comput. Electr. Eng., 2017
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Optimal assignment schemes for general access structures based on linear programming.
Des. Codes Cryptogr., 2015
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
Comput. J., 2015
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Int. J. Appl. Math. Comput. Sci., 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
2014
Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
Int. J. Internet Protoc. Technol., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurr. Comput. Pract. Exp., 2014
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
2013
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013
Int. Arab J. Inf. Technol., 2013
IACR Cryptol. ePrint Arch., 2013
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Syst., 2012
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2012
Int. J. Cloud Appl. Comput., 2012
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model.
IACR Cryptol. ePrint Arch., 2012
Sci. China Inf. Sci., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Knowl. Inf. Syst., 2011
Self-generated-certificate public key encryption without pairing and its application.
Inf. Sci., 2011
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010
A Genetic Algorithm Based Clustering Approach with Tabu Operation and K-Means Operation.
J. Intell. Syst., 2010
J. Inf. Sci. Eng., 2010
Inf. Sci., 2010
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism.
Inf. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010
2009
J. Inf. Sci. Eng., 2009
Int. J. Netw. Secur., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2009
2008
J. Inf. Sci. Eng., 2008
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008
Inf. Sci., 2008
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Des. Codes Cryptogr., 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Inf. Sci., 2007
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
Informatica, 2007
IACR Cryptol. ePrint Arch., 2007
Sci. China Ser. F Inf. Sci., 2007
Comput. Electr. Eng., 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the Information Security Practice and Experience, 2007
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Cooperative Design, 2007
2006
Informatica, 2006
Informatica, 2006
Int. J. Netw. Secur., 2006
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Future Gener. Comput. Syst., 2006
Comput. Stand. Interfaces, 2006
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Computer and Information Sciences, 2006
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the Computing and Combinatorics, 12th Annual International Conference, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
IEEE Trans. Inf. Theory, 2005
Comput. Secur., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.
Appl. Math. Comput., 2005
Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Challenges in Ad Hoc Networking, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
An efficient proxy signature scheme in home network DRM.
Proceedings of the ICETE 2005, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Pattern Recognition and Data Mining, 2005
Proceedings of the Discovery Science, 8th International Conference, 2005
Proceedings of the Progress in Pattern Recognition, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005
2004
J. Comput. Sci. Technol., 2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
On the orders of transformation matrices (mod <i>n</i>) and two types of generalized arnold transformation matrices.
Sci. China Ser. F Inf. Sci., 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Interactive Multimedia and Next Generation Networks: Second International Workshop on Multimedia Interactive Protocols and Systems, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003
Proceedings of the Advances in Web-Age Information Management, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol., 2002
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
Proceedings of the Advances in Web-Age Information Management, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995