Xiaofeng Chen
Orcid: 0000-0001-5858-5070Affiliations:
- Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Sun Yat-sen University, China (former)
According to our database1,
Xiaofeng Chen
authored at least 321 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks.
ACM Trans. Internet Things, August, 2024
IEEE Trans. Mob. Comput., May, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application.
IEEE Trans. Dependable Secur. Comput., 2024
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Inf. Sci., 2024
Inf. Sci., 2024
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024
Balancing Generalization and Robustness in Adversarial Training via Steering through Clean and Adversarial Gradient Directions.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023
Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023
IEEE Trans. Parallel Distributed Syst., February, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
IACR Cryptol. ePrint Arch., 2023
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Explaining Adversarial Robustness of Neural Networks from Clustering Effect Perspective.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Task-Adaptive Feature Fusion for Generalized Few-Shot Relation Classification in an Open World Environment.
IEEE ACM Trans. Audio Speech Lang. Process., 2022
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022
Comput. Stand. Interfaces, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE/ACM Trans. Netw., 2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain.
IEEE Trans. Ind. Informatics, 2021
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records.
IEEE Trans. Dependable Secur. Comput., 2021
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021
Inf. Sci., 2021
Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT.
IEEE Internet Things J., 2021
Comput. Stand. Interfaces, 2021
CoRR, 2021
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020
Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 2).
IEEE Trans. Sustain. Comput., 2020
Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 1).
IEEE Trans. Sustain. Comput., 2020
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020
Local Binary Pattern-Based Adaptive Differential Evolution for Multimodal Optimization Problems.
IEEE Trans. Cybern., 2020
J. Netw. Comput. Appl., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets.
Int. J. Inf. Sec., 2020
IACR Cryptol. ePrint Arch., 2020
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020
Sci. China Inf. Sci., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud.
Proceedings of the Database Systems for Advanced Applications, 2020
A Two-phase Prototypical Network Model for Incremental Few-shot Relation Classification.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019
ACM Trans. Intell. Syst. Technol., 2019
IEEE Trans. Ind. Informatics, 2019
Multiobjective Cloud Workflow Scheduling: A Multiple Populations Ant Colony System Approach.
IEEE Trans. Cybern., 2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
J. Inf. Secur. Appl., 2019
Inf. Sci., 2019
IEEE Internet Things J., 2019
Concurr. Comput. Pract. Exp., 2019
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019
Ann. des Télécommunications, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
IEEE Trans. Knowl. Data Eng., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018
Peer-to-Peer Netw. Appl., 2018
J. Netw. Comput. Appl., 2018
Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
Inf. Sci., 2018
Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018
Int. J. High Perform. Comput. Netw., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Comput. Secur., 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017
Soft Comput., 2017
Soft Comput., 2017
IEEE Syst. J., 2017
Pers. Ubiquitous Comput., 2017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017
Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02348-4, 2016
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016
Soft Comput., 2016
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016
Int. J. Inf. Sec., 2016
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016
Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Design and analysis of secure mechanisms based on tripartite credibility for RFID systems.
Comput. Stand. Interfaces, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
J. Supercomput., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Theor. Comput. Sci., 2015
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Comput., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Secur. Commun. Networks, 2015
Pervasive Mob. Comput., 2015
Designing cloud-based electronic health record system with attribute-based encryption.
Multim. Tools Appl., 2015
V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mob. Inf. Syst., 2015
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015
J. Comput. Syst. Sci., 2015
J. Comput. Secur., 2015
Editorial preface for the special issue "Advances in security, privacy and trust technologies".
J. Ambient Intell. Humaniz. Comput., 2015
New attribute-based authentication and its application in anonymous cloud access service.
Int. J. Web Grid Serv., 2015
Intell. Autom. Soft Comput., 2015
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Gener. Comput. Syst., 2015
Future Gener. Comput. Syst., 2015
Proceedings of the Provable Security, 2015
A Stable Matching-Based Selection and Memory Enhanced MOEA/D for Evolutionary Dynamic Multiobjective Optimization.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
J. Supercomput., 2014
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014
KSII Trans. Internet Inf. Syst., 2014
Inf. Sci., 2014
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
Int. J. Grid Util. Comput., 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
Concurr. Comput. Pract. Exp., 2014
Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014
Comput. Networks, 2014
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. Univers. Comput. Sci., 2013
J. Internet Serv. Inf. Secur., 2013
Int. J. Netw. Secur., 2013
Int. J. Grid Util. Comput., 2013
Comput. Sci. Inf. Syst., 2013
Selectively unforgeable but existentially forgeable signature schemes and applications.
Sci. China Inf. Sci., 2013
Comput. Informatics, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks.
Secur. Commun. Networks, 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Theor. Comput. Sci., 2011
Comput. Electr. Eng., 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Inf. Sci., 2009
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
Inf. Process. Lett., 2009
Int. J. Netw. Secur., 2009
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Basic Properties of Calcium Phosphate Cement Containing Chitosan in its Liquid Phase.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008
Inf. Sci., 2008
Int. J. Netw. Secur., 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
J. Syst. Softw., 2007
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Provable Security, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Inf. Process. Lett., 2004
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
2002