Xi Jun Lin
Orcid: 0000-0002-8818-8436
According to our database1,
Xi Jun Lin
authored at least 37 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., 2024
2023
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems.
J. Syst. Archit., September, 2023
2021
IEEE Trans. Inf. Forensics Secur., 2021
Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021
Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021
Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2021
2020
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020
2019
Comput. J., 2019
2018
Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018
Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.
IEICE Trans. Inf. Syst., 2018
Discret. Appl. Math., 2018
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018
Comput. J., 2018
2017
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015
2013
IACR Cryptol. ePrint Arch., 2013
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IACR Cryptol. ePrint Arch., 2013
2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Inf. Process. Lett., 2010
2009
2008
J. Commun. Networks, 2008