Xiao Lan

Orcid: 0000-0002-4091-5569

According to our database1, Xiao Lan authored at least 19 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel framework for Chinese personal sensitive information detection.
Connect. Sci., December, 2024

Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion.
Comput. Secur., 2024

2023
Laws and Regulations tell how to classify your data: A case study on higher education.
Inf. Process. Manag., May, 2023

Efficient and Secure Quantile Aggregation of Private Data Streams.
IEEE Trans. Inf. Forensics Secur., 2023

Listen carefully to experts when you classify data: A generic data classification ontology encoded from regulations.
Inf. Process. Manag., 2023

Efficient and Secure Quantile Aggregation of Private Data Streams.
IACR Cryptol. ePrint Arch., 2023

A systematic security analysis of EMV protocol.
Comput. Stand. Interfaces, 2023

ANTI: An Adaptive Network Traffic Indexing Algorithm for High-Speed Networks.
Proceedings of the IEEE Global Communications Conference, 2023

2021
Accountable Proxy Re-Encryption for Secure Data Sharing.
IEEE Trans. Dependable Secur. Comput., 2021

PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT.
Secur. Commun. Networks, 2021

Corrigendum to "BNRDT: When Data Transmission Meets Blockchain".
Secur. Commun. Networks, 2021

2020
BNRDT: When Data Transmission Meets Blockchain.
Secur. Commun. Networks, 2020

BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme.
J. Inf. Secur. Appl., 2020

Ferret: Fast Extension for coRRElated oT with small communication.
IACR Cryptol. ePrint Arch., 2020

Modular Security Analysis of OAuth 2.0 in the Three-Party Setting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.
IEEE Trans. Dependable Secur. Comput., 2019

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach.
IEEE Access, 2019

2016
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2010
Enhancing video games in real time with biofeedback data.
Proceedings of the ACM SIGGRAPH ASIA 2010 Posters, Seoul, Republic of Korea, December 15, 2010


  Loading...