Xiao Tan

Orcid: 0000-0002-7100-3853

Affiliations:
  • Hangzhou Normal University, Key Laboratory of Cryptography and Network Security, China
  • City University of Hong Kong, Department of Computer Science, Hong Kong (PhD 2014)


According to our database1, Xiao Tan authored at least 27 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs.
IEEE Internet Things J., October, 2024

Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., March, 2024

2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023

Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud.
J. Cloud Comput., December, 2023

Proof of retrievability with flexible designated verification for cloud storage.
Comput. Secur., December, 2023

CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage.
IEEE Access, 2023

2022
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022

2021
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city.
EURASIP J. Wirel. Commun. Netw., 2021

2020
Plaintext related image hybrid encryption scheme using algebraic interpolation and generalized chaotic map.
Multim. Tools Appl., 2020

2019
Image Hybrid Encryption Based on Matrix Nonlinear Operation and Generalized Arnold Transformation.
Int. J. Pattern Recognit. Artif. Intell., 2019

2018
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems.
Peer-to-Peer Netw. Appl., 2018

2017
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
Wirel. Pers. Commun., 2017

A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Serv. Comput., 2017

Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017

2015
Concurrent signature without random oracles.
Theor. Comput. Sci., 2015

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Comput., 2015

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015

Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network.
Wirel. Pers. Commun., 2014

Extending concurrent signature to multiple parties.
Theor. Comput. Sci., 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

A practical anonymous authentication protocol for wireless roaming.
Secur. Commun. Networks, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification.
Inf. Technol. Control., 2013

An Efficient Proof of Retrievability with Public Auditing in Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012


  Loading...