Qiuliang Xu
Orcid: 0000-0001-5277-8453
According to our database1,
Qiuliang Xu
authored at least 124 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Ambient Intell. Humaniz. Comput., February, 2024
2023
Theor. Comput. Sci., June, 2023
2022
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices.
IEEE Internet Things J., 2022
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles.
Int. J. Intell. Syst., 2022
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort.
Comput. J., 2022
2021
Secur. Commun. Networks, 2021
Quantum Inf. Process., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
2019
Secur. Commun. Networks, 2019
Int. J. High Perform. Comput. Netw., 2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
Comput. Secur., 2019
IEEE Access, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
2018
Soft Comput., 2018
J. Inf. Secur. Appl., 2018
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.
Int. J. High Perform. Comput. Netw., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017
IACR Cryptol. ePrint Arch., 2017
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017
k-out-of-n oblivious transfer protocol with security against malicious adversaries.
Comput. Syst. Sci. Eng., 2017
Ann. des Télécommunications, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
J. Medical Syst., 2016
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Secur. Commun. Networks, 2015
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Secur. Commun. Networks, 2015
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
Secur. Commun. Networks, 2015
Mob. Inf. Syst., 2015
J. Ambient Intell. Humaniz. Comput., 2015
Int. J. Inf. Secur. Priv., 2015
Int. J. High Perform. Comput. Netw., 2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
J. Comput., 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity.
J. Networks, 2011
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
J. Networks, 2010
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition.
IACR Cryptol. ePrint Arch., 2010
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model.
Proceedings of the Advances in Computer Science and Information Technology, 2010
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing.
Proceedings of the Neural Information Processing. Models and Applications, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
J. Networks, 2009
J. Networks, 2009
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
On the Security of Certificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008