Xinyi Huang
Orcid: 0000-0003-0070-1707Affiliations:
- Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- University of Wollongong, School of Computer Science and Software Engineering, Australia (PhD 2009)
According to our database1,
Xinyi Huang
authored at least 315 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on nsclab.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems.
IEEE Trans. Aerosp. Electron. Syst., August, 2024
A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing.
IEEE Internet Things J., April, 2024
Comput. Stand. Interfaces, March, 2024
IEEE Trans. Serv. Comput., 2024
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption.
IEEE Trans. Serv. Comput., 2024
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A review and implementation of physical layer channel key generation in the Internet of Things.
J. Inf. Secur. Appl., 2024
IACR Cryptol. ePrint Arch., 2024
Comput. Stand. Interfaces, 2024
Comput. Stand. Interfaces, 2024
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud.
Comput. Stand. Interfaces, 2024
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification.
CoRR, 2024
FairRelay: Fair and Cost-Efficient Peer-to-Peer Content Delivery through Payment Channel Networks.
CoRR, 2024
Comput. J., 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain.
IEEE Trans. Computers, December, 2023
A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees.
Comput. J., December, 2023
A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023
ACM Trans. Embed. Comput. Syst., September, 2023
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023
Randomization is all you need: A privacy-preserving federated learning framework for news recommendation.
Inf. Sci., August, 2023
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT.
IEEE Trans. Computers, May, 2023
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU.
ACM Trans. Embed. Comput. Syst., March, 2023
Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge.
Theor. Comput. Sci., March, 2023
IEEE Trans. Parallel Distributed Syst., February, 2023
ACM Trans. Sens. Networks, February, 2023
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation.
IEEE Trans. Serv. Comput., 2023
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Dependable Secur. Comput., 2023
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Universal product learning with errors: A new variant of LWE for lattice-based cryptography.
Theor. Comput. Sci., 2022
IEEE Trans. Cloud Comput., 2022
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
Comput. J., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Knowl. Data Eng., 2021
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
IEEE Trans. Inf. Forensics Secur., 2021
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Fuzzy Systems and Data Mining VII, 2021
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020
J. Supercomput., 2020
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Emerg. Top. Comput., 2020
Theor. Comput. Sci., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2020
Indistinguishability and unextractablility of password-based authentication in blockchain.
Future Gener. Comput. Syst., 2020
Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020
Sci. China Inf. Sci., 2020
Sci. China Inf. Sci., 2020
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Veh. Commun., 2019
Inf. Sci., 2019
IEEE Internet Things J., 2019
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.
IEEE Internet Things J., 2019
Concurr. Comput. Pract. Exp., 2019
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
IEEE Access, 2019
IEEE Access, 2019
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Fuzzy Systems and Data Mining V, 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IEEE Trans. Knowl. Data Eng., 2018
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018
Peer-to-Peer Netw. Appl., 2018
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018
Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Comput. Networks, 2018
IEEE Commun. Mag., 2018
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Information Security Practice and Experience, 2018
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Wirel. Pers. Commun., 2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017
IEEE Trans. Dependable Secur. Comput., 2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
Soft Comput., 2017
IEEE Syst. J., 2017
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Pers. Ubiquitous Comput., 2017
J. Comput. Syst. Sci., 2017
J. Comput. Syst. Sci., 2017
Inf. Sci., 2017
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Comput. Secur., 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
ACM Trans. Internet Techn., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016
Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Gener. Comput. Syst., 2016
Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurr. Comput. Pract. Exp., 2016
Comput. Informatics, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommun. Syst., 2015
IEEE Trans. Dependable Secur. Comput., 2015
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Inf. Sci., 2015
New attribute-based authentication and its application in anonymous cloud access service.
Int. J. Web Grid Serv., 2015
Int. J. Inf. Sec., 2015
Int. J. High Perform. Comput. Netw., 2015
Int. J. Embed. Syst., 2015
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2015
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption.
Future Gener. Comput. Syst., 2015
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Secur. Commun. Networks, 2014
A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intell. Humaniz. Comput., 2014
SA<sup>3</sup>: Self-adaptive anonymous authentication for dynamic authentication policies.
Future Gener. Comput. Syst., 2014
Concurr. Comput. Pract. Exp., 2014
Comput. Networks, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism.
J. Comput. Sci. Technol., 2013
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013
Comput. Electr. Eng., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013
2012
J. Syst. Softw., 2012
Comput. Math. Appl., 2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011
IEEE J. Sel. Areas Commun., 2011
2010
J. Comput. Secur., 2010
Int. J. Secur. Networks, 2010
Int. J. Comput. Commun. Control, 2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010
2009
Comput. Stand. Interfaces, 2009
2008
J. Commun. Networks, 2008
Int. J. Netw. Secur., 2008
Int. J. Inf. Sec., 2008
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
J. Comput. Sci. Technol., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Public Key Infrastructure, 2007
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005