Qingshui Xue

According to our database1, Qingshui Xue authored at least 28 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribute-based proxy signature scheme with dynamic strong forward security.
Int. J. Sens. Networks, 2024

2023
Classical Communication Coset State (t,n) Threshold Quantum Digital Signature.
IEEE Access, 2023

2022
PBFT Algorithm for Internet of Things.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2019
An RBF neural network-based dynamic virtual network embedding algorithm.
Concurr. Comput. Pract. Exp., 2019

The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Security Modeling and Analysis on Intra Vehicular Network.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

A Virtual Network Embedding Algorithm Based on RBF Neural Network.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Multi-Objective Virtual Network Embedding Algorithm Based on Global Resource Capacity.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Multi-proxy multi-signature binding positioning protocol.
Secur. Commun. Networks, 2016

A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Multi-proxy Multi-signature Binding Positioning Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Position-based proxy signcryption.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Positioning-Protocol-Based Digital Signature.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Proxy multi-signature binding positioning protocol.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

2010
Some basic principles for proxy signature schemes based on ECDLP.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2005
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2005

Efficient Non-interactive Deniable Authentication Protocols.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
A new threshold proxy signature scheme from bilinear pairings.
Sci. China Ser. F Inf. Sci., 2004

An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

A Model that Coordinates Short-Lived and Long-Lived Transactions for Web Services.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A Threshold Proxy Signature Scheme Using Self-Certified Public Keys.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Improvement of Multi-Proxy Signature Scheme.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004


  Loading...