Xiao Tan
Orcid: 0000-0002-7100-3853Affiliations:
- Hangzhou Normal University, Key Laboratory of Cryptography and Network Security, China
- City University of Hong Kong, Department of Computer Science, Hong Kong (PhD 2014)
According to our database1,
Xiao Tan
authored at least 27 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., October, 2024
Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., March, 2024
2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud.
J. Cloud Comput., December, 2023
Comput. Secur., December, 2023
IEEE Access, 2023
2022
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022
2021
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city.
EURASIP J. Wirel. Commun. Netw., 2021
2020
Plaintext related image hybrid encryption scheme using algebraic interpolation and generalized chaotic map.
Multim. Tools Appl., 2020
2019
Image Hybrid Encryption Based on Matrix Nonlinear Operation and Generalized Arnold Transformation.
Int. J. Pattern Recognit. Artif. Intell., 2019
2018
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems.
Peer-to-Peer Netw. Appl., 2018
2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Serv. Comput., 2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017
2015
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Comput., 2015
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014
Secur. Commun. Networks, 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012