Xiaofeng Chen

Orcid: 0000-0001-5858-5070

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
  • Sun Yat-sen University, China (former)


According to our database1, Xiaofeng Chen authored at least 321 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks.
ACM Trans. Internet Things, August, 2024

Optimal Verifiable Data Streaming Under Concurrent Queries.
IEEE Trans. Mob. Comput., May, 2024

Abuse-resistant deniable encryption.
Comput. Stand. Interfaces, January, 2024

Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
IEEE Trans. Inf. Forensics Secur., 2024

Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing.
IEEE Trans. Dependable Secur. Comput., 2024

Public Proofs of Data Replication and Retrievability With User-Friendly Replication.
IEEE Trans. Dependable Secur. Comput., 2024

Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application.
IEEE Trans. Dependable Secur. Comput., 2024

SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput., 2024

MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

New approach for efficient malicious multiparty private set intersection.
Inf. Sci., 2024

MaskArmor: Confidence masking-based defense mechanism for GNN against MIA.
Inf. Sci., 2024

Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024

Balancing Generalization and Robustness in Adversarial Training via Steering through Clean and Adversarial Gradient Directions.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SAME: Sample Reconstruction against Model Extraction Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023

Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023

Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems.
IEEE Trans. Parallel Distributed Syst., February, 2023

Verifiable and Redactable Blockchains With Fully Editing Operations.
IEEE Trans. Inf. Forensics Secur., 2023

TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support.
IEEE Trans. Dependable Secur. Comput., 2023

FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain-Based Accountable Auditing With Multi-Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study.
IACR Cryptol. ePrint Arch., 2023

Research Philosophy of Modern Cryptography.
IACR Cryptol. ePrint Arch., 2023

A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Proceedings of the 32nd USENIX Security Symposium, 2023

ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Explaining Adversarial Robustness of Neural Networks from Clustering Effect Perspective.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

Achieving Searchable Encryption Scheme With Search Pattern Hidden.
IEEE Trans. Serv. Comput., 2022

IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022

Differentially Private Byzantine-Robust Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022

DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution.
IEEE Trans. Dependable Secur. Comput., 2022

Task-Adaptive Feature Fusion for Generalized Few-Shot Relation Classification in an Open World Environment.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022

Efficient public-key authenticated deniable encryption schemes.
Comput. Stand. Interfaces, 2022

Lattice-based group encryptions with only one trapdoor.
Sci. China Inf. Sci., 2022

Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

GAME: Generative-Based Adaptive Model Extraction Attack.
Proceedings of the Computer Security - ESORICS 2022, 2022

Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Privacy-Preserving Machine Learning
Springer, ISBN: 978-981-16-9138-6, 2022

2021
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.
IEEE/ACM Trans. Netw., 2021

Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng., 2021

Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021

Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain.
IEEE Trans. Ind. Informatics, 2021

ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records.
IEEE Trans. Dependable Secur. Comput., 2021

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-preserving and verifiable online crowdsourcing with worker updates.
Inf. Sci., 2021

Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT.
IEEE Internet Things J., 2021

Trusted data sharing with flexible access control based on blockchain.
Comput. Stand. Interfaces, 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021

Efficient and Verifiable Proof of Replication with Fast Fault Localization.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Optimal Verifiable Data Streaming Protocol with Data Auditing.
Proceedings of the Computer Security - ESORICS 2021, 2021

Efficient Multi-client Order-Revealing Encryption and Its Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Forward-Secure Group Encryptions from Lattices.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020

Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 2).
IEEE Trans. Sustain. Comput., 2020

Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 1).
IEEE Trans. Sustain. Comput., 2020

DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

Local Binary Pattern-Based Adaptive Differential Evolution for Multimodal Optimization Problems.
IEEE Trans. Cybern., 2020

Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

Blockchain-based public auditing and secure deduplication with fair arbitration.
Inf. Sci., 2020

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

Blockchain-Based Dynamic Provable Data Possession for Smart Cities.
IEEE Internet Things J., 2020

Concise ID-based mercurial functional commitments and applications to zero-knowledge sets.
Int. J. Inf. Sec., 2020

Secure Cloud Auditing with Efficient Ownership Transfer (Full Version).
IACR Cryptol. ePrint Arch., 2020

SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020

An Efficient Secure Dynamic Skyline Query Model.
CoRR, 2020

Blockchain-based multiple groups data sharing with anonymity and traceability.
Sci. China Inf. Sci., 2020

New Practical Public-Key Deniable Encryption.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Secure Cloud Auditing with Efficient Ownership Transfer.
Proceedings of the Computer Security - ESORICS 2020, 2020

SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud.
Proceedings of the Database Systems for Advanced Applications, 2020

A Two-phase Prototypical Network Model for Incremental Few-shot Relation Classification.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019

Secure Deduplication System with Active Key Update and Its Application in IoT.
ACM Trans. Intell. Syst. Technol., 2019

Game Theoretical Analysis on Encrypted Cloud Data Deduplication.
IEEE Trans. Ind. Informatics, 2019

Multiobjective Cloud Workflow Scheduling: A Multiple Populations Ant Colony System Approach.
IEEE Trans. Cybern., 2019

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019

HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput., 2019

Secure distributed data geolocation scheme against location forgery attack.
J. Inf. Secur. Appl., 2019

Privacy-preserving authentication for general directed graphs in industrial IoT.
Inf. Sci., 2019

New publicly verifiable computation for batch matrix multiplication.
Inf. Sci., 2019

Non-interactive privacy-preserving neural network prediction.
Inf. Sci., 2019

A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.
IEEE Internet Things J., 2019

Multi-device anonymous authentication.
Int. J. Inf. Sec., 2019

Blockchain-based fair three-party contract signing protocol for fog computing.
Concurr. Comput. Pract. Exp., 2019

A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019

New efficient constructions of verifiable data streaming with accountability.
Ann. des Télécommunications, 2019

Toward Forward Secure SSE Supporting Conjunctive Keyword Search.
IEEE Access, 2019

Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.
Proceedings of the Computer Security - ESORICS 2019, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

Rethinking Identification Protocols from the Point of View of the GDPR.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training.
IEEE Trans. Knowl. Data Eng., 2018

Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Netw. Appl., 2018

Blockchain-based publicly verifiable data deletion scheme for cloud storage.
J. Netw. Comput. Appl., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018

A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018

Comparable encryption scheme supporting multiple users in cloud computing.
Int. J. High Perform. Comput. Netw., 2018

Privacy-preserving machine learning with multiple data providers.
Future Gener. Comput. Syst., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Gener. Comput. Syst., 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Comput. Secur., 2018

An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Inf. Forensics Secur., 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework.
Soft Comput., 2017

Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Syst. J., 2017

Towards privacy protection and malicious behavior traceability in smart health.
Pers. Ubiquitous Comput., 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Proceedings of the Information Security Practice and Experience, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

New Publicly Verifiable Computation for Batch Matrix Multiplication.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Fair Three-Party Contract Singing Protocol Based on Blockchain.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Introduction to Secure Outsourcing Computation
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02348-4, 2016

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

Efficient request-based comparable encryption scheme based on sliding window method.
Soft Comput., 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Secur. Commun. Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive Mob. Comput., 2016

New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016

Secure searchable encryption: a survey.
J. Commun. Inf. Networks, 2016

Secure three-party computational protocols for triangle area.
Int. J. Inf. Sec., 2016

N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016

Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Efficient and Secure Storage for Outsourced Data: A Survey.
Data Sci. Eng., 2016

Design and analysis of secure mechanisms based on tripartite credibility for RFID systems.
Comput. Stand. Interfaces, 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Hybrid Cloud Approach for Secure Authorized Deduplication.
IEEE Trans. Parallel Distributed Syst., 2015

Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
J. Supercomput., 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Inf. Forensics Secur., 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Secur. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Comput., 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Secur. Commun. Networks, 2015

Secure multi-server-aided data deduplication in cloud computing.
Pervasive Mob. Comput., 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multim. Tools Appl., 2015

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mob. Inf. Syst., 2015

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015

Secure deduplication storage systems supporting keyword search.
J. Comput. Syst. Sci., 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

Editorial preface for the special issue "Advances in security, privacy and trust technologies".
J. Ambient Intell. Humaniz. Comput., 2015

New attribute-based authentication and its application in anonymous cloud access service.
Int. J. Web Grid Serv., 2015

Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons.
Intell. Autom. Soft Comput., 2015

Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Gener. Comput. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Gener. Comput. Syst., 2015

Advances on cloud services and cloud computing.
Concurr. Comput. Pract. Exp., 2015

Extend the Concept of Public Key Encryption with Delegated Search.
Comput. J., 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

A Stable Matching-Based Selection and Memory Enhanced MOEA/D for Evolutionary Dynamic Multiobjective Optimization.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Secure Encrypted Image Search in Mobile Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Request-Based Comparable Encryption Scheme with Multiple Users.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Improved Algorithm for Secure Outsourcing of Modular Exponentiations.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A New Efficient Request-Based Comparable Encryption Scheme.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distributed Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distributed Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distributed Syst., 2014

Deniability and forward secrecy of one-round authenticated key exchange.
J. Supercomput., 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
Int. J. Grid Util. Comput., 2014

Privacy-preserving data utilization in hybrid clouds.
Future Gener. Comput. Syst., 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Gener. Comput. Syst., 2014

New and efficient conditional e-payment systems with transferability.
Future Gener. Comput. Syst., 2014

Advances in secure and intelligent data processing.
Concurr. Comput. Pract. Exp., 2014

Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014

Ticket-based handoff authentication for wireless mesh networks.
Comput. Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Secure Deduplication Storage Systems with Keyword Search.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

A Secure Three-Party Computational Protocol for Triangle Area.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013

An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. Univers. Comput. Sci., 2013

Constructing Verifiable Random Number in Finite Field.
J. Internet Serv. Inf. Secur., 2013

Security Analysis of a Suite of Deniable Authentication Protocols.
Int. J. Netw. Secur., 2013

Efficient online/offline signcryption without key exposure.
Int. J. Grid Util. Comput., 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013

Selectively unforgeable but existentially forgeable signature schemes and applications.
Sci. China Inf. Sci., 2013

Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing.
Comput. Informatics, 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Efficient Proof of Retrievability with Public Auditing in Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Secure and Verifiable Outsourcing of Sequence Comparisons.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Server-Aided Hierarchical Identity-Based Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Efficient Fair Conditional Payments for Outsourcing Computations.
IEEE Trans. Inf. Forensics Secur., 2012

Identity-based construction for secure and efficient handoff authentication schemes in wireless networks.
Secur. Commun. Networks, 2012

A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Generic security-amplifying methods of ordinary digital signatures.
Inf. Sci., 2012

Refine the Concept of Public Key Encryption with Delegated Search.
IACR Cryptol. ePrint Arch., 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2012

Efficient ID-based non-malleable trapdoor commitment.
Comput. Electr. Eng., 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Short Non-delegatable Strong Designated Verifier Signature.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Identity-based trapdoor mercurial commitments and applications.
Theor. Comput. Sci., 2011

Provable Security.
J. Internet Serv. Inf. Secur., 2011

New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

Discrete logarithm based chameleon hashing and signatures without key exposure.
Comput. Electr. Eng., 2011

Non-delegatable Strong Designated Verifier Signature on Elliptic Curves.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Non-interactive Deniable Authentication Protocols.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Efficient Online/Offline Signcryption Scheme.
Intell. Autom. Soft Comput., 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
The ring authenticated encryption scheme - How to provide a clue wisely.
Inf. Sci., 2009

Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
Inf. Process. Lett., 2009

Analysis of Two Types Deniable Authentication Protocols.
Int. J. Netw. Secur., 2009

Identity-based Universal Designated Verifier Signature Proof System.
Int. J. Netw. Secur., 2009

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptol. ePrint Arch., 2009

Identity-Based Chameleon Hash Scheme Without Key Exposure.
IACR Cryptol. ePrint Arch., 2009

Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring.
IACR Cryptol. ePrint Arch., 2009

ID-Based Adaptive Oblivious Transfer.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Basic Properties of Calcium Phosphate Cement Containing Chitosan in its Liquid Phase.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New and Efficient Signature on Commitment Values.
Int. J. Netw. Secur., 2008

A New Type of Designated Confirmer Signatures for a Group of Individuals.
Int. J. Netw. Secur., 2008

A Tamper-Evident Voting Machine Resistant to Covert Channels.
Proceedings of the Provable Security, Second International Conference, 2008

Efficient designated confirmer signature from bilinear pairings.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
ID-based restrictive partially blind signatures and applications.
J. Syst. Softw., 2007

On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptol. ePrint Arch., 2007

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Proceedings of the Provable Security, 2007

ID-based Ring Proxy Signatures.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Society-oriented Designated Confirmer Signatures.
Proceedings of the Third International Conference on Natural Computation, 2007

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptol. ePrint Arch., 2006

A New Signature Scheme Without Random Oracles from Bilinear Pairings.
Proceedings of the Progressin Cryptology, 2006

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006

Generalization of the Selective-ID Security Model for HIBS Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Cryptanalysis of Huang-Chang partially blind signature scheme.
J. Syst. Softw., 2005

Comment on the Public Key Substitution Attacks.
Int. J. Netw. Secur., 2005

A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2005

Attack on Okamoto et al.'s New Short Signature Schemes.
IACR Cryptol. ePrint Arch., 2005

<i>t</i>-Out-of-<i>n</i> String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

Identity-Based Universal Designated Verifier Signatures.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

ID-Based Restrictive Partially Blind Signatures.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Attack on an ID-based authenticated group key agreement scheme from PKC 2004.
Inf. Process. Lett., 2004

Chameleon Hashing without Key Exposure.
IACR Cryptol. ePrint Arch., 2004

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004

New ID-Based Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2004

Publicly Verifiable Auctions with Minimal Leakage.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Limited Verifier Signature from Bilinear Pairings.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Attack on Two ID-based Authenticated Group Key Agreement Schemes.
IACR Cryptol. ePrint Arch., 2003

A New Approach to Prevent Blackmailing in E-Cash.
IACR Cryptol. ePrint Arch., 2003

A New ID-based Group Signature Scheme from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2003

Security analysis of the improved group signature.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
Proceedings of the Information Security and Cryptology, 2003

ID-Based Distributed "Magic Ink" Signature from Pairings.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

New Key Improvements and Its Application to XTR System.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Fair Electronic Cash Based on Double Signatur.
J. Comput. Sci. Technol., 2002


  Loading...