default search action
Kefei Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j142]Yong Liu, Qian Meng, Kefei Chen, Zhonghua Shen:
Load-aware switch migration for controller load balancing in edge-cloud architectures. Future Gener. Comput. Syst. 162: 107489 (2025) - 2024
- [j141]Jifa Hu, Fuqun Wang, Kefei Chen:
Faster matrix approximate homomorphic encryption. Comput. Stand. Interfaces 87: 103775 (2024) - [j140]Jiamin Hu, Zhonghua Shen, Kefei Chen, Yuying Liu, Qian Meng, Fuqun Wang, Yong Liu:
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT. IET Inf. Secur. 2024(1) (2024) - [j139]Bin Lian, Jialin Cui, Hongyuan Chen, Xianghong Zhao, Fuqun Wang, Kefei Chen, Maode Ma:
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center. IEEE Internet Things J. 11(7): 12331-12345 (2024) - [j138]Zhiyu Xu, Liangliang Wang, Yiyuan Luo, Yu Long, Kai Zhang, Hailun Yan, Kefei Chen:
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks. IEEE Internet Things J. 11(8): 13482-13495 (2024) - [j137]Fei Li, Dongqing Xie, Wei Gao, Kefei Chen, Guilin Wang, Roberto Metere:
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. J. Ambient Intell. Humaniz. Comput. 15(2): 1317-1326 (2024) - [j136]Qifan Mao, Liangliang Wang, Yu Long, Lidong Han, Zihan Wang, Kefei Chen:
A blockchain-based framework for federated learning with privacy preservation in power load forecasting. Knowl. Based Syst. 284: 111338 (2024) - [j135]Xu Yan, Bin Lian, Yunhao Yang, Xiaotie Wang, Jialin Cui, Xianghong Zhao, Fuqun Wang, Kefei Chen:
A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time. Symmetry 16(6): 664 (2024) - [j134]Zhao Zhang, Chunxiang Xu, Changsong Jiang, Kefei Chen:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. IEEE Trans. Dependable Secur. Comput. 21(4): 1515-1527 (2024) - [j133]Yunxia Han, Chunxiang Xu, Changsong Jiang, Kefei Chen:
A Secure Two-Factor Authentication Key Exchange Scheme. IEEE Trans. Dependable Secur. Comput. 21(6): 5681-5693 (2024) - [j132]Changsong Jiang, Chunxiang Xu, Yunxia Han, Zhao Zhang, Kefei Chen:
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates. IEEE Trans. Inf. Forensics Secur. 19: 3844-3856 (2024) - 2023
- [j131]Xiaodan Jin, Fuqun Wang, Renjun Zhang, Bin Lian, Kefei Chen:
Leveled Fully Homomorphic Signcryption From Lattices. IEEE Access 11: 35232-35242 (2023) - [j130]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Fuqun Wang, Kefei Chen:
Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84: 103698 (2023) - [j129]Zhaoxuan Bian, Fuqun Wang, Renjun Zhang, Bin Lian, Lidong Han, Kefei Chen:
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme. IET Inf. Secur. 2023: 1-8 (2023) - [j128]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen:
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts. IEEE Internet Things J. 10(16): 14269-14284 (2023) - [j127]Changsong Jiang, Chunxiang Xu, Chenchen Cao, Kefei Chen:
GAIN: Decentralized Privacy-Preserving Federated Learning. J. Inf. Secur. Appl. 78: 103615 (2023) - [j126]Yunxia Han, Chunxiang Xu, Shanshan Li, Changsong Jiang, Kefei Chen:
ttPAKE: Typo tolerance password-authenticated key exchange. J. Inf. Secur. Appl. 79: 103658 (2023) - [j125]Changsong Jiang, Chunxiang Xu, Zhao Zhang, Kefei Chen:
SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search. IEEE Trans. Cloud Comput. 11(3): 3168-3183 (2023) - [j124]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Kefei Chen:
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. IEEE Trans. Serv. Comput. 16(1): 134-146 (2023) - [j123]Jiangwei Xu, Liangliang Wang, Mi Wen, Yu Long, Kefei Chen:
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network. IEEE Trans. Veh. Technol. 72(4): 5152-5166 (2023) - [c89]Changsong Jiang, Chunxiang Xu, Kefei Chen:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things. Inscrypt (2) 2023: 389-393 - 2022
- [j122]Fucai Luo, Saif M. Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen:
Provable Data Possession Schemes from Standard Lattices for Cloud Computing. Comput. J. 65(12): 3223-3239 (2022) - [j121]Jiasheng Chen, Liangliang Wang, Mi Wen, Kai Zhang, Kefei Chen:
Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices. IEEE Internet Things J. 9(11): 8967-8979 (2022) - [j120]Shuang Hu, Renjun Zhang, Fuqun Wang, Kefei Chen, Bin Lian, Gongliang Chen:
A sanitizable signcryption scheme with public verifiability via chameleon hash function. J. Inf. Secur. Appl. 71: 103371 (2022) - [j119]Chunliang Chen, Liangliang Wang, Yu Long, Yiyuan Luo, Kefei Chen:
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes. J. Syst. Archit. 130: 102677 (2022) - [j118]Leyan Shen, Liangliang Wang, Kai Zhang, Jinguo Li, Kefei Chen:
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs. J. Syst. Archit. 133: 102764 (2022) - [j117]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Xinsheng Wen, Kefei Chen, Jianfeng Ma:
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems. IEEE Syst. J. 16(2): 3096-3107 (2022) - [j116]Chuang Li, Chunxiang Xu, Shanshan Li, Kefei Chen, Yinbin Miao:
On the Security of Verifiable Searchable Encryption Schemes. IEEE Trans. Cloud Comput. 10(4): 2977-2978 (2022) - [j115]Huiwen Wang, Liangliang Wang, Mi Wen, Kefei Chen, Yiyuan Luo:
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids. Wirel. Pers. Commun. 126(2): 1577-1599 (2022) - 2021
- [j114]Huige Wang, Guangye Sui, Yunlei Zhao, Kefei Chen:
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings. IEEE Access 9: 10443-10459 (2021) - [j113]Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Efficient First-Price Sealed-Bid Auction Scheme. J. Inf. Sci. Eng. 37(3): 635-652 (2021) - [j112]Tongchen Shen, Fuqun Wang, Kefei Chen, Zhonghua Shen, Renjun Zhang:
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption. Secur. Commun. Networks 2021: 6619476:1-6619476:14 (2021) - [j111]Huige Wang, Xing Chang, Kefei Chen:
CLE against SOA with Better Data Security Storage to Cloud 5G. Secur. Commun. Networks 2021: 6695964:1-6695964:11 (2021) - [j110]Fucai Luo, Saif M. Al-Kuwari, Fuqun Wang, Kefei Chen:
Attribute-based proxy re-encryption from standard lattices. Theor. Comput. Sci. 865: 52-62 (2021) - [j109]Shengfeng Xu, Xiangxue Li, Haifeng Qian, Kefei Chen:
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN. Theor. Comput. Sci. 885: 91-103 (2021) - [j108]Kai Zhang, Mi Wen, Rongxing Lu, Kefei Chen:
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization. IEEE Trans. Dependable Secur. Comput. 18(6): 2875-2887 (2021) - [j107]Shiyu Li, Yuan Zhang, Chunxiang Xu, Kefei Chen:
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing. IEEE Trans. Inf. Forensics Secur. 16: 2564-2565 (2021) - [j106]Yangyang Wu, Changsong Jiang, Chunxiang Xu, Kefei Chen:
Security Analysis of a Path Validation Scheme With Constant-Size Proof. IEEE Trans. Inf. Forensics Secur. 16: 4246-4248 (2021) - [j105]Huilin Li, Yannan Li, Yong Yu, Baocang Wang, Kefei Chen:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. IEEE Trans. Netw. Sci. Eng. 8(2): 1019-1032 (2021) - [j104]Qian Meng, Jian Weng, Yinbin Miao, Kefei Chen, Zhonghua Shen, Fuqun Wang, Zhijun Li:
Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET. IEEE Trans. Veh. Technol. 70(12): 12342-12357 (2021) - [j103]Meng Wang, Kefei Chen, Gang Xiao, Xinyue Zhang, Hongxu Chen, Sen Wang:
Explaining similarity for SPARQL queries. World Wide Web 24(5): 1813-1835 (2021) - 2020
- [j102]Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen:
Reusable Fuzzy Extractor Based on the LPN Assumption. Comput. J. 63(12): 1826-1834 (2020) - [j101]Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. Int. J. Inf. Sec. 19(6): 711-720 (2020) - [j100]Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. Peer-to-Peer Netw. Appl. 13(6): 2334-2341 (2020) - [j99]Huige Wang, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. Secur. Commun. Networks 2020: 8823788:1-8823788:14 (2020) - [j98]Zhe Liu, Fuqun Wang, Kefei Chen, Fei Tang:
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update. Secur. Commun. Networks 2020: 8856592:1-8856592:11 (2020) - [j97]Ziyuan Hu, Shengli Liu, Kefei Chen:
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks. IEEE Trans. Dependable Secur. Comput. 17(5): 972-983 (2020) - [j96]Yunxia Han, Chunxiang Xu, Debiao He, Kefei Chen:
On the Security of a Key Agreement and Key Protection Scheme. IEEE Trans. Inf. Forensics Secur. 15: 3293-3294 (2020) - [c88]Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen:
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors. Inscrypt 2020: 202-220
2010 – 2019
- 2019
- [j95]Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li:
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. IEEE Access 7: 79299-79310 (2019) - [j94]Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage. Sci. China Inf. Sci. 62(5): 59101:1-59101:3 (2019) - [j93]Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:
A new VRSA-based pairing-free certificateless signature scheme for fog computing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j92]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
Fully homomorphic encryption based on the ring learning with rounding problem. IET Inf. Secur. 13(6): 639-648 (2019) - [j91]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. Inf. Sci. 480: 70-89 (2019) - [j90]Huige Wang, Yuan Zhang, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j89]Jining Zhao, Chunxiang Xu, Kefei Chen:
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy. J. Inf. Secur. Appl. 47: 39-49 (2019) - [j88]Jining Zhao, Chunxiang Xu, Kefei Chen:
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. KSII Trans. Internet Inf. Syst. 13(2): 1043-1063 (2019) - [j87]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Chunming Tang:
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash. Frontiers Inf. Technol. Electron. Eng. 20(2): 176-186 (2019) - [c87]Xuankai Wang, Mi Wen, Jinguo Li, Zipeng Fu, Rongxing Lu, Kefei Chen:
Adversarial attack against scene recognition system for unmanned vehicles. ACM TUR-C 2019: 65:1-65:6 - [c86]Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. Inscrypt 2019: 397-415 - [i29]Yu Zhang, Li Yu, Qi-Ping Su, Zhe Sun, Fuqun Wang, Xiao-Qiang Xu, Qingjun Xu, Jin-Shuang Jin, Kefei Chen, Chui-Ping Yang:
A framework for quantum homomorphic encryption with experimental demonstration. CoRR abs/1910.03500 (2019) - 2018
- [j86]Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li:
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China Inf. Sci. 61(3): 038106:1-038106:3 (2018) - [j85]Huige Wang, Kefei Chen, Baodong Qin, Ziyuan Hu:
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci. China Inf. Sci. 61(5): 058101:1-058101:3 (2018) - [j84]Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. Cryptogr. 2(4): 33 (2018) - [j83]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold decryption scheme from bilinear pairings. Frontiers Comput. Sci. 12(1): 177-189 (2018) - [j82]Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long:
Access control encryption with efficient verifiable sanitized decryption. Inf. Sci. 465: 72-85 (2018) - [j81]Jining Zhao, Chunxiang Xu, Kefei Chen:
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. KSII Trans. Internet Inf. Syst. 12(9): 4576-4598 (2018) - [j80]Xiangxue Li, Yu Yu, Guannan Sun, Kefei Chen:
Connected Vehicles' Security from the Perspective of the In-Vehicle Network. IEEE Netw. 32(3): 58-63 (2018) - [j79]Huige Wang, Kefei Chen, Yu Long, Junyao Ye, Liangliang Wang:
A new randomized message-locked encryption in the standard model. Peer-to-Peer Netw. Appl. 11(2): 298-308 (2018) - [j78]Fucai Luo, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. Secur. Commun. Networks 2018: 5967635:1-5967635:12 (2018) - [c85]Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. ACISP 2018: 265-283 - [c84]Jining Zhao, Chunxiang Xu, Kefei Chen:
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. FCS 2018: 121-137 - [c83]Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu:
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. ISPEC 2018: 119-140 - 2017
- [j77]Qi Xie, Zhixiong Tang, Kefei Chen:
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput. Electr. Eng. 59: 218-230 (2017) - [j76]Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen:
A new construction on randomized message-locked encryption in the standard model via UCEs. Sci. China Inf. Sci. 60(5): 52101 (2017) - [j75]Debiao He, Ding Wang, Qi Xie, Kefei Chen:
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Sci. China Inf. Sci. 60(5): 52104 (2017) - [j74]Liangliang Wang, Kefei Chen, Yu Long, Huige Wang:
An efficient pairing-free certificateless signature scheme for resource-limited systems. Sci. China Inf. Sci. 60(11): 119102 (2017) - [j73]Gang Han, Yu Yu, Xiangxue Li, Kefei Chen, Hui Li:
Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens. Comput. Stand. Interfaces 54: 20-28 (2017) - [j72]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. Informatica 28(2): 215-235 (2017) - [j71]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen, Jin Li:
Insight of the protection for data security under selective opening attacks. Inf. Sci. 412: 223-241 (2017) - [j70]Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything. Secur. Commun. Networks 2017: 6430850:1-6430850:11 (2017) - [j69]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017) - [c82]Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. CSS 2017: 148-162 - [c81]Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA. CSS 2017: 248-266 - [e7]Kefei Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10143, Springer 2017, ISBN 978-3-319-54704-6 [contents] - 2016
- [j68]Liangliang Wang, Kefei Chen, Yu Long, Huige Wang:
Cryptanalysis of a certificateless aggregate signature scheme. Secur. Commun. Networks 9(11): 1353-1358 (2016) - [j67]Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long:
Fuzzy certificateless signature. Secur. Commun. Networks 9(16): 3658-3669 (2016) - [j66]Huige Wang, Kefei Chen, Baodong Qin, Liangliang Wang:
Certificateless encryption secure against selective opening attack. Secur. Commun. Networks 9(18): 5600-5614 (2016) - [j65]Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng:
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Trans. Dependable Secur. Comput. 13(5): 533-546 (2016) - [c80]Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen:
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. AsiaCCS 2016: 487-498 - [c79]Lingbo Wei, Chi Zhang, Yanmin Gong, Yuguang Fang, Kefei Chen:
A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity. GLOBECOM 2016: 1-6 - 2015
- [j64]Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Int. J. Appl. Math. Comput. Sci. 25(2): 415-430 (2015) - [j63]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. Comput. J. 58(10): 2747-2757 (2015) - [j62]Qiang Li, Xiangxue Li, Xuejia Lai, Kefei Chen:
Optimal assignment schemes for general access structures based on linear programming. Des. Codes Cryptogr. 74(3): 623-644 (2015) - [j61]Baodong Qin, Shengli Liu, Kefei Chen:
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. IET Inf. Secur. 9(1): 32-42 (2015) - [j60]Zhengan Huang, Shengli Liu, Kefei Chen:
n-Evasive all-but-many lossy trapdoor function and its constructions. Secur. Commun. Networks 8(4): 550-564 (2015) - [j59]Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng, Qixiang Mei:
Efficient revocable identity-based encryption from multilinear maps. Secur. Commun. Networks 8(18): 3511-3522 (2015) - [c78]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability Under Selective Opening Attacks: Implication and Separation. ACNS 2015: 87-104 - [c77]Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, Huige Wang:
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings. INCoS 2015: 82-85 - [c76]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 - [i28]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. IACR Cryptol. ePrint Arch. 2015: 3 (2015) - [i27]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability under Selective Opening Attacks: Implication and Separation. IACR Cryptol. ePrint Arch. 2015: 316 (2015) - 2014
- [j58]Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Min-Rong Chen, Kefei Chen:
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Sci. China Inf. Sci. 57(7): 1-5 (2014) - [j57]Shengli Liu, Fangguo Zhang, Kefei Chen:
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption. Concurr. Comput. Pract. Exp. 26(8): 1506-1519 (2014) - [j56]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen:
PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(2): 685-689 (2014) - [j55]Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold signature scheme from bilinear pairings in standard model. Int. J. Internet Protoc. Technol. 8(2/3): 107-115 (2014) - [j54]Jianhong Chen, Yu Long, Kefei Chen, Jie Guo:
Attribute-based key-insulated signature and its applications. Inf. Sci. 275: 57-67 (2014) - [c75]Xianping Mao, Kefei Chen, Liangliang Wang, Yu Long:
On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme. INCoS 2014: 91-95 - [c74]Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Retrievability Based on MRD Codes. ISPEC 2014: 330-345 - 2013
- [j53]Shuhua Wu, Kefei Chen, Yuefei Zhu:
Enhancements of a three-party password-based authenticated key exchange protocol. Int. Arab J. Inf. Technol. 10(3): 215-221 (2013) - [j52]Shuhua Wu, Kefei Chen, Qiong Pu, Yuefei Zhu:
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 26(5): 674-686 (2013) - [c73]Baodong Qin, Shengli Liu, Kefei Chen, Manuel Charlemagne:
Leakage-resilient lossy trapdoor functions and public-key encryption. AsiaPKC@AsiaCCS 2013: 3-12 - [c72]Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. AsiaCCS 2013: 243-252 - [c71]Zheng Huang, Weidong Kou, Kefei Chen:
Secure and Oblivious Information Hiding in Binary Image. CSE 2013: 235-239 - [c70]Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010. INCoS 2013: 366-372 - [e6]Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng:
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013. ACM 2013, ISBN 978-1-4503-1767-2 [contents] - [e5]Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao:
Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2069-6 [contents] - [i26]Naomi Benger, Manuel Charlemagne, Kefei Chen:
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms. IACR Cryptol. ePrint Arch. 2013: 147 (2013) - [i25]Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Data Possession and Retrievability Based on MRD Codes. IACR Cryptol. ePrint Arch. 2013: 789 (2013) - 2012
- [j51]Yongtao Wang, Kefei Chen, Yu Long, Zhaohui Liu:
Accountable authority key policy attribute-based encryption. Sci. China Inf. Sci. 55(7): 1631-1638 (2012) - [j50]Longbin Lai, Linfeng Shen, Yanfei Zheng, Kefei Chen, Jing Zhang:
Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment. Int. J. Cloud Appl. Comput. 2(1): 71-82 (2012) - [j49]Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan:
Identity-Based Key-Insulated Signcryption. Informatica 23(1): 27-45 (2012) - [j48]Shuhua Wu, Kefei Chen:
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J. Medical Syst. 36(4): 2325-2337 (2012) - [j47]Shuhua Wu, Kefei Chen, Yuefei Zhu:
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety. J. Medical Syst. 36(5): 2743-2749 (2012) - [c69]Xuhua Zhou, Xuhua Ding, Kefei Chen:
A Generic Construction of Accountable Decryption and Its Applications. ACISP 2012: 322-335 - [c68]Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang:
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. AFRICACRYPT 2012: 53-66 - [c67]Wei Gao, Kefei Chen, Guilin Wang, Xueli Wang:
Designated Condition One-Time Signatures. IDCS 2012: 253-263 - [c66]Jingjing Wang, Kefei Chen, Shixiong Zhu:
Annihilators of Fast Discrete Fourier Spectra Attacks. IWSEC 2012: 182-196 - [c65]Shengli Liu, Fangguo Zhang, Kefei Chen:
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. NSS 2012: 100-112 - [i24]Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen:
Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. IACR Cryptol. ePrint Arch. 2012: 7 (2012) - [i23]Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen:
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. IACR Cryptol. ePrint Arch. 2012: 73 (2012) - [i22]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptol. ePrint Arch. 2012: 75 (2012) - [i21]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. IACR Cryptol. ePrint Arch. 2012: 104 (2012) - [i20]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. IACR Cryptol. ePrint Arch. 2012: 105 (2012) - [i19]Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen:
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. IACR Cryptol. ePrint Arch. 2012: 245 (2012) - 2011
- [j46]Junzuo Lai, Weidong Kou, Kefei Chen:
Self-generated-certificate public key encryption without pairing and its application. Inf. Sci. 181(11): 2422-2435 (2011) - [j45]Shengli Liu, Yu Long, Kefei Chen:
Key updating technique in identity-based encryption. Inf. Sci. 181(11): 2436-2440 (2011) - [j44]Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long, Kefei Chen:
Restrictive partially blind signature for resource-constrained information systems. Knowl. Inf. Syst. 26(1): 87-103 (2011) - [c64]Shengli Liu, Kefei Chen:
Homomorphic Linear Authentication Schemes for Proofs of Retrievability. INCoS 2011: 258-262 - [c63]Xuhua Zhou, Xuhua Ding, Kefei Chen:
Lightweight Delegated Subset Test with Privacy Protection. ISPEC 2011: 138-151 - [c62]Zheng Huang, Qiang Li, Dong Zheng, Kefei Chen, Xiangxue Li:
YI Cloud: Improving user privacy with secret key recovery in cloud storage. SOSE 2011: 268-272 - 2010
- [j43]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j42]Jian Weng, Min-Rong Chen, Kefei Chen, Robert H. Deng:
Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(4): 854-856 (2010) - [j41]Yu Long, Kefei Chen:
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Inf. Sci. 180(7): 1167-1181 (2010) - [j40]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen:
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Inf. Sci. 180(24): 5077-5089 (2010) - [j39]Zheng Gong, Yu Long, Xuan Hong, Kefei Chen:
Practical Certificateless Aggregate Signatures from Bilinear Maps. J. Inf. Sci. Eng. 26(6): 2093-2106 (2010) - [j38]Yongguo Liu, Hua Yan, Kefei Chen:
A Genetic Algorithm Based Clustering Approach with Tabu Operation and K-Means Operation. J. Intell. Syst. 19(1): 17-46 (2010) - [j37]Xiangxue Li, Weidong Qiu, Dong Zheng, Kefei Chen, Jianhua Li:
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 57(2): 793-800 (2010) - [i18]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010)
2000 – 2009
- 2009
- [j36]Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Democratic group signatures with collective traceability. Comput. Electr. Eng. 35(5): 664-672 (2009) - [j35]Xuan Hong, Kefei Chen:
Secure multiple-times proxy signature scheme. Comput. Stand. Interfaces 31(1): 19-23 (2009) - [j34]Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Weidong Qiu:
A key management protocol with robust continuity for sensor networks. Comput. Stand. Interfaces 31(4): 642-647 (2009) - [j33]Yu Long, Zheng Gong, Kefei Chen, Shengli Liu:
Provably Secure Identity-based Threshold Key Escrow from Pairing. Int. J. Netw. Secur. 8(3): 227-234 (2009) - [j32]Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
Towards Provable Security for Data Transmission Protocols in Sensor Network. J. Inf. Sci. Eng. 25(1): 319-333 (2009) - [j31]Wei Han, Kefei Chen, Dong Zheng:
Receipt-Freeness for Groth e-Voting Schemes. J. Inf. Sci. Eng. 25(2): 517-530 (2009) - [j30]Ling Dong, Kefei Chen, Xuejia Lai, Mi Wen:
When is a key establishment protocol correct? Secur. Commun. Networks 2(6): 567-579 (2009) - [j29]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen:
Fair and Secure Mobile Billing Systems. Wirel. Pers. Commun. 51(1): 81-93 (2009) - [c61]Dapeng Zhang, Zhongjie Cai, Kefei Chen, Bernhard Nebel:
A game controller based on multiple sensors. Advances in Computer Entertainment Technology 2009: 375-378 - [c60]Bo Zhu, Kefei Chen, Xuejia Lai:
Bitwise Higher Order Differential Cryptanalysis. INTRUST 2009: 250-262 - [c59]Zhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Extended PEG Algorithm for High Rate LDPC Codes. ISPA 2009: 494-498 - [c58]Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen:
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks. MASS 2009: 237-245 - [c57]Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen:
Efficient Secure Multiparty Computation Protocol in Asynchronous Network. ISA 2009: 152-158 - [c56]Mi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu:
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. WISM 2009: 413-425 - 2008
- [j28]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Parallel Key-Insulated Signature: Framework and Construction. J. Res. Pract. Inf. Technol. 40(1): 55-68 (2008) - [j27]Zheng Gong, Xuejia Lai, Kefei Chen:
A synthetic indifferentiability analysis of some block-cipher-based hash functions. Des. Codes Cryptogr. 48(3): 293-305 (2008) - [j26]Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen:
Enforcing trust in pervasive computing. Int. J. Syst. Syst. Eng. 1(1/2): 96-110 (2008) - [j25]Yongguo Liu, Zhang Yi, Hong Wu, Mao Ye, Kefei Chen:
A tabu search approach for the minimum sum-of-squares clustering problem. Inf. Sci. 178(12): 2680-2704 (2008) - [j24]Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) - [j23]Zheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen:
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. J. Inf. Sci. Eng. 24(5): 1347-1360 (2008) - [c55]Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 - [c54]Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220 - [c53]Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344 - [e4]Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4 [contents] - [i17]Lizhen Yang, Ling Dong, Kefei Chen:
New Upper Bounds on Sizes of Permutation Arrays. CoRR abs/0801.3983 (2008) - [i16]Lizhen Yang, Kefei Chen, Luo Yuan:
New Lower Bounds on Sizes of Permutation Arrays. CoRR abs/0801.3986 (2008) - [i15]Lizhen Yang, Kefei Chen, Luo Yuan:
New Constructions of Permutation Arrays. CoRR abs/0801.3987 (2008) - [i14]Xiahong Lin, Lin Gao, Kefei Chen, David K. Y. Chiu:
MOHCS: Towards Mining Overlapping Highly Connected Subgraphs. CoRR abs/0806.3215 (2008) - [i13]Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li:
Democratic Group Signatures with Threshold Traceability. IACR Cryptol. ePrint Arch. 2008: 112 (2008) - [i12]Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen:
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2008: 411 (2008) - [i11]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008) - 2007
- [j22]Yu Long, Kefei Chen, Shengli Liu:
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Comput. Electr. Eng. 33(3): 166-176 (2007) - [j21]Jian Weng, Shengli Liu, Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005. Sci. China Ser. F Inf. Sci. 50(3): 318-323 (2007) - [j20]Xiangxue Li, Dong Zheng, Kefei Chen:
LFSR-based Signatures with Message Recovery. Int. J. Netw. Secur. 4(3): 266-270 (2007) - [j19]Dong Zheng, Xiangxue Li, Kefei Chen:
Code-based Ring Signature Scheme. Int. J. Netw. Secur. 5(2): 154-157 (2007) - [j18]Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. Informatica 18(3): 375-394 (2007) - [j17]Yu Long, Kefei Chen:
Certificateless threshold cryptosystem secure against chosen-ciphertext attack. Inf. Sci. 177(24): 5620-5637 (2007) - [c52]Xiangxue Li, Dong Zheng, Kefei Chen:
Efficient Blind Signatures from Linear Feedback Shift Register. CDVE 2007: 423-425 - [c51]Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727 - [c50]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen:
Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345 - [c49]Xiangxue Li, Dong Zheng, Kefei Chen:
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ICA3PP 2007: 95-106 - [c48]Shengli Liu, Kefei Chen, Weidong Qiu:
Identity-Based Threshold Decryption Revisited. ISPEC 2007: 329-343 - [c47]Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. PAISI 2007: 288-294 - [c46]Hui Li, Yanfei Zheng, Mi Wen, Kefei Chen:
A Secure Time Synchronization Protocol for Sensor Network. PAKDD Workshops 2007: 515-526 - [c45]Mi Wen, Yanfei Zheng, Hui Li, Kefei Chen:
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. PAKDD Workshops 2007: 608-620 - [c44]Han Wei, Dong Zheng, Kefei Chen:
A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme. SITIS 2007: 355-360 - [c43]Zheng Huang, Weidong Qiu, Haibin Guan, Kefei Chen:
Efficient Receipt-Free Electronic Auction Protocol. SITIS 2007: 1023-1028 - [c42]Zheng Gong, Yu Long, Xuan Hong, Kefei Chen:
Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD (3) 2007: 188-193 - [c41]Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng:
Protocol Engineering Principles for Cryptographic Protocols Design. SNPD (3) 2007: 641-646 - [c40]Zheng Gong, Yu Long, Kefei Chen:
Efficient Partially Blind Signature from LFSR. SNPD (2) 2007: 717-722 - [i10]Wei Han, Dong Zheng, Kefei Chen:
Filling the Gap between Voters and Cryptography in e-Voting. IACR Cryptol. ePrint Arch. 2007: 266 (2007) - [i9]Zheng Gong, Xuejia Lai, Kefei Chen:
A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions. IACR Cryptol. ePrint Arch. 2007: 465 (2007) - 2006
- [j16]Changshe Ma, Shiqun Li, Kefei Chen, Shengli Liu:
Analysis and improvement of fair certified e-mail delivery protocol. Comput. Stand. Interfaces 28(4): 467-474 (2006) - [j15]Libin Wang, Kefei Chen:
Comments on an access control model in semantic grid. Future Gener. Comput. Syst. 22(1-2): 3-5 (2006) - [j14]Libin Wang, Kefei Chen:
Comments on a theorem on grid access control. Future Gener. Comput. Syst. 22(4): 381-384 (2006) - [j13]Yu Long, Kefei Chen:
Construction of Dynamic Threshold Decryption Scheme from Pairing. Int. J. Netw. Secur. 2(2): 111-113 (2006) - [j12]Zhenjie Huang, Kefei Chen, Yumin Wang:
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica 17(3): 347-362 (2006) - [j11]Yu Long, Kefei Chen, Shengli Liu:
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. Informatica 17(4): 519-534 (2006) - [c39]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480 - [c38]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26 - [c37]Zheng Gong, Xiangxue Li, Kefei Chen:
Efficient Partially Blind Signature Scheme with Provable Security. COCOON 2006: 378-386 - [c36]Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen:
Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209 - [c35]Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen:
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. ICSNC 2006: 29 - [c34]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423 - [c33]Feiyu Lei, Wen Chen, Kefei Chen:
A Non-committing Encryption Scheme Based on Quadratic Residue. ISCIS 2006: 972-980 - [c32]Ling Dong, Kefei Chen:
A Practical Clumped-Tree Multicast Encryption Scheme. ISPEC 2006: 165-176 - [c31]Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen:
Rights Protection for Data Cubes. ISC 2006: 359-372 - [c30]Yongguo Liu, Jun Peng, Kefei Chen, Zhang Yi:
An Improved Hybrid Genetic Clustering Algorithm. SETN 2006: 192-202 - [e3]Xuejia Lai, Kefei Chen:
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings. Lecture Notes in Computer Science 4284, Springer 2006, ISBN 3-540-49475-8 [contents] - [e2]David Pointcheval, Yi Mu, Kefei Chen:
Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings. Lecture Notes in Computer Science 4301, Springer 2006, ISBN 3-540-49462-6 [contents] - [e1]Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou:
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings. Lecture Notes in Computer Science 3903, Springer 2006, ISBN 3-540-33052-6 [contents] - [i8]Wei Han, Dong Zheng, Kefei Chen:
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. IACR Cryptol. ePrint Arch. 2006: 129 (2006) - [i7]Zhenjie Huang, Kefei Chen, Yumin Wang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. IACR Cryptol. ePrint Arch. 2006: 353 (2006) - 2005
- [j10]Weidong Qiu, Kefei Chen:
Identity oriented signature scheme based on quadratic residues. Appl. Math. Comput. 168(1): 235-242 (2005) - [j9]Xiangxue Li, Kefei Chen:
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1): 437-450 (2005) - [j8]Yu Long, Zhenfu Cao, Kefei Chen:
A dynamic threshold commercial key escrow scheme based on conic. Appl. Math. Comput. 171(2): 972-982 (2005) - [j7]Ruishan Zhang, Kefei Chen:
Improvements on the WTLS protocol to avoid denial of service attacks. Comput. Secur. 24(1): 76-82 (2005) - [j6]Luo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen:
Some new characters on the wire-tap channel of type II. IEEE Trans. Inf. Theory 51(3): 1222-1229 (2005) - [c29]Yongguo Liu, Yan Liu, Kefei Chen:
Clustering with Noising Method. ADMA 2005: 209-216 - [c28]Zhenjie Huang, Kefei Chen, Yumin Wang:
Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133 - [c27]Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen:
A Novel Clustering Technique Based on Improved Noising Method. CIARP 2005: 81-92 - [c26]Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen:
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. Discovery Science 2005: 380-382 - [c25]Yongguo Liu, Libin Wang, Kefei Chen:
A Tabu Search Based Method for Minimum Sum of Squares Clustering. ICAPR (1) 2005: 248-256 - [c24]Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu:
Identity Based Conference Key Distribution Scheme from Parings. ICCNMC 2005: 845-852 - [c23]Xiaoyun Wang, Kefei Chen:
An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196 - [c22]Wei Wei, Xuhua Ding, Kefei Chen:
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. ICICS 2005: 269-279 - [c21]Longjun Zhang, Han Wei, Dong Zheng, Kefei Chen:
A Security Solution of WLAN Based on Public Key Cryptosystem. ICPADS (2) 2005: 422-427 - [c20]Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen:
An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563 - [c19]Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu:
Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243 - [c18]Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen:
A Hybrid Tabu Search Based Clustering Algorithm. KES (2) 2005: 186-192 - [c17]Ruishan Zhang, Kefei Chen:
An Efficient Proactive RSA Scheme for Large-Scale Ad Hoc Networks. Med-Hoc-Net 2005: 331-335 - [c16]Ruishan Zhang, Kefei Chen:
An Efficient Asynchronous Proactive RSA Scheme. PDCAT 2005: 376-380 - [c15]Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng:
Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56 - [i6]Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability. CoRR abs/cs/0504019 (2005) - 2004
- [j5]Lizhen Yang, Kefei Chen:
On the orders of transformation matrices (mod n) and two types of generalized arnold transformation matrices. Sci. China Ser. F Inf. Sci. 47(5): 655-668 (2004) - [j4]Shengli Liu, Fangguo Zhang, Kefei Chen:
Authenticating Tripartite Key Agreement Protocol with Pairings. J. Comput. Sci. Technol. 19(2): 169-176 (2004) - [j3]Yongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang:
A genetic clustering method for intrusion detection. Pattern Recognit. 37(5): 927-942 (2004) - [c14]Xiangxue Li, Kefei Chen:
Identity Based Proxy-Signcryption Scheme from Pairings. IEEE SCC 2004: 494-497 - [c13]Dong Zheng, Huang Zheng, Kefei Chen, Weidong Kou:
ID-Based Proxy Blind Signature. AINA (2) 2004: 380-383 - [c12]Xiaoyun Wang, Lizhen Yang, Kefei Chen:
SDD: Secure Distributed Diffusion Protocol for Sensor Networks. ESAS 2004: 205-214 - [c11]Xiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li:
Proxy Structured Multisignature Scheme from Bilinear Pairings. ISPA 2004: 705-714 - [c10]Qing Yang, Kefei Chen:
Digital Image Authentication Based on Turbo Codes. MIPS 2004: 276-286 - [c9]Xiangxue Li, Kefei Chen, Shiqun Li:
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. PDCAT 2004: 591-595 - [i5]Lizhen Yang, Kefei Chen:
Cryptanalysis of a timestamp-based password authentication scheme. IACR Cryptol. ePrint Arch. 2004: 40 (2004) - [i4]Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen:
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. IACR Cryptol. ePrint Arch. 2004: 50 (2004) - [i3]Ruishan Zhang, Kefei Chen:
Asynchronous Proactive RSA. IACR Cryptol. ePrint Arch. 2004: 292 (2004) - 2003
- [j2]Kefei Chen, Sheng Zhong:
Attacks on the (enhanced) Yang-Shieh authentication. Comput. Secur. 22(8): 725-727 (2003) - [c8]Libin Wang, Kefei Chen:
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ACISP 2003: 154-165 - [c7]Xianfeng Zhao, Weinong Wang, Kefei Chen:
On the Noninvertibility of Adaptive Digital Watermarking. DEXA Workshops 2003: 347-351 - [c6]Xianfeng Zhao, Weinong Wang, Kefei Chen:
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. WAIM 2003: 483-494 - [c5]Xianfeng Zhao, Weinong Wang, Kefei Chen:
On the spectral singularities of watermarked audio. WEDELMUSIC 2003: 67-70 - [i2]Zheng Dong, Shengli Liu, Kefei Chen:
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature. IACR Cryptol. ePrint Arch. 2003: 200 (2003) - [i1]Zheng Dong, Kefei Chen:
an attack on a multisignature scheme. IACR Cryptol. ePrint Arch. 2003: 201 (2003) - 2002
- [j1]Dong Zheng, Kefei Chen, Jinyuan You:
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. J. Comput. Sci. Technol. 17(6): 749-756 (2002) - [c4]Zheng Huang, Kefei Chen:
Electronic Payment in Mobile Environment. DEXA Workshops 2002: 413-417 - [c3]Weidong Qiu, Kefei Chen, Dawu Gu:
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. ISC 2002: 177-190 - [c2]Xianfeng Zhao, Weinong Wang, Kefei Chen:
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. WAIM 2002: 430-440
1990 – 1999
- 1995
- [b1]Kefei Chen:
Rangabstandscodes und ihre Anwendungen in der Kryptographie. University of Giessen, Gießen, Germany, 1995, pp. 1-83 - [c1]Kefei Chen:
A New Identification Algorithm. Cryptography: Policy and Algorithms 1995: 244-249
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint