default search action
BibTeX records: Xiangxue Li
@article{DBLP:journals/apin/XiaoYZCL23, author = {Junchao Xiao and Lin Yang and Fuli Zhong and Hongbo Chen and Xiangxue Li}, title = {Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework}, journal = {Appl. Intell.}, volume = {53}, number = {3}, pages = {3183--3206}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-03412-8}, doi = {10.1007/S10489-022-03412-8}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/XiaoYZCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuJLLBH23, author = {Yongfeng Xu and Hanyu Jia and Xiangxue Li and Qiang Li and Yue Bao and Xintian Hou}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {115--142}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_5}, doi = {10.1007/978-3-031-33491-7\_5}, timestamp = {Wed, 31 May 2023 14:56:55 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuJLLBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiaL23, author = {Hanyu Jia and Xiangxue Li}, editor = {Chunpeng Ge and Moti Yung}, title = {{PFE:} Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {227--252}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_12}, doi = {10.1007/978-981-97-0942-7\_12}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/JiaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/ZhuL23, author = {Wenxing Zhu and Xiangxue Li}, title = {Secure Mutual Learning with Low Interactions for Deep Model Training}, booktitle = {19th International Conference on Mobility, Sensing and Networking, {MSN} 2023, Nanjing, China, December 14-16, 2023}, pages = {579--587}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MSN60784.2023.00087}, doi = {10.1109/MSN60784.2023.00087}, timestamp = {Tue, 02 Jul 2024 09:33:56 +0200}, biburl = {https://dblp.org/rec/conf/msn/ZhuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeiZCLL22, author = {Mengqi Wei and Wenxing Zhu and Liangkun Cui and Xiangxue Li and Qiang Li}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Privacy Leakage in Privacy-Preserving Neural Network Inference}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {133--152}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_7}, doi = {10.1007/978-3-031-17140-6\_7}, timestamp = {Tue, 27 Sep 2022 21:06:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WeiZCLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhuWLL22, author = {Wenxing Zhu and Mengqi Wei and Xiangxue Li and Qiang Li}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {275--294}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_14}, doi = {10.1007/978-3-031-17143-7\_14}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhuWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JiaLLBH22, author = {Hanyu Jia and Xiangxue Li and Qiang Li and Yue Bao and Xintian Hou}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Generic 2-Party {PFE} with Constant Rounds and Linear Active Security, and Efficient Instantiation}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {390--410}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_21}, doi = {10.1007/978-3-031-25538-0\_21}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/JiaLLBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaL22, author = {Hanyu Jia and Xiangxue Li}, title = {{PFE:} Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2022}, url = {https://eprint.iacr.org/2022/219}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JiaL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XuL21a, author = {Shengfeng Xu and Xiangxue Li}, title = {Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model}, journal = {{IEEE} Access}, volume = {9}, pages = {13683--13690}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3051047}, doi = {10.1109/ACCESS.2021.3051047}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XuL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuL21, author = {Shouqin Lu and Xiangxue Li}, title = {Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids}, journal = {{IEEE} Access}, volume = {9}, pages = {27588--27600}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3058180}, doi = {10.1109/ACCESS.2021.3058180}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ChenL21a, author = {Tongtong Chen and Xiangxue Li}, title = {(Semi-)Automatically Parsing Private Protocols for In-Vehicle {ECU} Communications}, journal = {Entropy}, volume = {23}, number = {11}, pages = {1495}, year = {2021}, url = {https://doi.org/10.3390/e23111495}, doi = {10.3390/E23111495}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/ChenL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/XuLQC21, author = {Shengfeng Xu and Xiangxue Li and Haifeng Qian and Kefei Chen}, title = {CPA/CCA2-secure {PKE} with squared-exponential {DFR} from low-noise {LPN}}, journal = {Theor. Comput. Sci.}, volume = {885}, pages = {91--103}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.06.025}, doi = {10.1016/J.TCS.2021.06.025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/XuLQC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuL21, author = {Yucheng Liu and Xiangxue Li}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Source Identification from In-Vehicle {CAN-FD} Signaling: What Can We Expect?}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12918}, pages = {204--223}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86890-1\_12}, doi = {10.1007/978-3-030-86890-1\_12}, timestamp = {Tue, 21 Sep 2021 19:14:09 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWL21, author = {Yucheng Liu and Hao Wu and Xiangxue Li}, title = {Another Look at the Connection between {CAN} Signal Ringing {\&} In-Vehicle {ECU} Identification}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1021--1030}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00141}, doi = {10.1109/TRUSTCOM53373.2021.00141}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaLQ21, author = {Jianfeng Ma and Xiangxue Li and Haifeng Qian}, title = {{LVRT:} Low Variances of Solo Mining Reward {\&} Inter-block Time in Collaborative PoW}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1039--1048}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00143}, doi = {10.1109/TRUSTCOM53373.2021.00143}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaLQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LuL21, author = {Shouqin Lu and Xiangxue Li}, title = {Lightweight Grouping-Proof for Post-Quantum {RFID} Security}, booktitle = {2021 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), Atlanta, GA, USA, October 18-21, 2021}, pages = {49--58}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SWC50871.2021.00017}, doi = {10.1109/SWC50871.2021.00017}, timestamp = {Fri, 03 Dec 2021 17:36:57 +0100}, biburl = {https://dblp.org/rec/conf/uic/LuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LinghuL21, author = {Yuan Linghu and Xiangxue Li}, title = {WSG-InV: Weighted State Graph Model for Intrusion Detection on In-Vehicle Network}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021, Nanjing, China, March 29 - April 1, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WCNC49053.2021.9417552}, doi = {10.1109/WCNC49053.2021.9417552}, timestamp = {Thu, 06 May 2021 17:21:01 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/LinghuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/YangLLQ20, author = {Chenlong Yang and Xiangxue Li and Jingjing Li and Haifeng Qian}, editor = {Meikang Qiu}, title = {Linear Scalability from Sharding and PoS}, booktitle = {Algorithms and Architectures for Parallel Processing - 20th International Conference, {ICA3PP} 2020, New York City, NY, USA, October 2-4, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12452}, pages = {548--562}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60245-1\_37}, doi = {10.1007/978-3-030-60245-1\_37}, timestamp = {Thu, 01 Oct 2020 13:46:54 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/YangLLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/WangXLQ20, author = {Qi Wang and Ming Xu and Xiangxue Li and Haifeng Qian}, editor = {Jia Hu and Geyong Min and Nektarios Georgalas and Zhiwei Zhao and Fei Hao and Wang Miao}, title = {Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm}, booktitle = {{IEEE} International Conference on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December 17-19, 2020}, pages = {305--312}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00064}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM51426.2020.00064}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/WangXLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/LinghuXLQ20, author = {Yuan Linghu and Ming Xu and Xiangxue Li and Haifeng Qian}, title = {Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network}, booktitle = {16th International Conference on Mobility, Sensing and Networking, {MSN} 2020, Tokyo, Japan, December 17-19, 2020}, pages = {479--487}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MSN50589.2020.00082}, doi = {10.1109/MSN50589.2020.00082}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/msn/LinghuXLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangLYW19, author = {Chenlong Yang and Xiangxue Li and Yu Yu and Ziping Wang}, title = {Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform}, journal = {{IEEE} Access}, volume = {7}, pages = {22966--22975}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2899000}, doi = {10.1109/ACCESS.2019.2899000}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangLYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/XiaoWL19, author = {Junchao Xiao and Hao Wu and Xiangxue Li}, title = {Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning}, journal = {Symmetry}, volume = {11}, number = {11}, pages = {1388}, year = {2019}, url = {https://doi.org/10.3390/sym11111388}, doi = {10.3390/SYM11111388}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/XiaoWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001ZWGL19, author = {Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Collision Resistant Hashing from Sub-exponential Learning Parity with Noise}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {3--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_1}, doi = {10.1007/978-3-030-34621-8\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001ZWGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/XiaoWL19, author = {Junchao Xiao and Hao Wu and Xiangxue Li}, editor = {Zheng Xiao and Laurence T. Yang and Pavan Balaji and Tao Li and Keqin Li and Albert Y. Zomaya}, title = {Robust and Self-Evolving {IDS} for In-Vehicle Network by Enabling Spatiotemporal Information}, booktitle = {21st {IEEE} International Conference on High Performance Computing and Communications; 17th {IEEE} International Conference on Smart City; 5th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019}, pages = {1390--1397}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00193}, doi = {10.1109/HPCC/SMARTCITY/DSS.2019.00193}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/XiaoWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/XiaoWLL19, author = {Junchao Xiao and Hao Wu and Xiangxue Li and Yuan Linghu}, editor = {Sheng Wen and Albert Y. Zomaya and Laurence T. Yang}, title = {Practical {IDS} on In-vehicle Network Against Diversified Attack Models}, booktitle = {Algorithms and Architectures for Parallel Processing - 19th International Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11945}, pages = {456--466}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38961-1\_40}, doi = {10.1007/978-3-030-38961-1\_40}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/XiaoWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LinghuLZ19, author = {Yuan Linghu and Xiangxue Li and Zhenlong Zhang}, editor = {Sheng Wen and Albert Y. Zomaya and Laurence T. Yang}, title = {Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing}, booktitle = {Algorithms and Architectures for Parallel Processing - 19th International Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11944}, pages = {468--483}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38991-8\_31}, doi = {10.1007/978-3-030-38991-8\_31}, timestamp = {Tue, 28 Jan 2020 10:52:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/LinghuLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangLY18, author = {Qi Wang and Xiangxue Li and Yu Yu}, title = {Anonymity for Bitcoin From Secure Escrow Address}, journal = {{IEEE} Access}, volume = {6}, pages = {12336--12341}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2787563}, doi = {10.1109/ACCESS.2017.2787563}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiYSC18, author = {Xiangxue Li and Yu Yu and Guannan Sun and Kefei Chen}, title = {Connected Vehicles' Security from the Perspective of the In-Vehicle Network}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {58--63}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700319}, doi = {10.1109/MNET.2018.1700319}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/LiYSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChengLQY18, author = {Haitao Cheng and Xiangxue Li and Haifeng Qian and Di Yan}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {{CCA} Secure Multi-recipient {KEM} from {LPN}}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {513--529}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_30}, doi = {10.1007/978-3-030-01950-1\_30}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChengLQY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChengLQY18a, author = {Haitao Cheng and Xiangxue Li and Haifeng Qian and Di Yan}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Simpler {CCA} Secure {PKE} from {LPN} Problem Without Double-Trapdoor}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {756--766}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_46}, doi = {10.1007/978-3-030-01950-1\_46}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChengLQY18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HanYLCL17, author = {Gang Han and Yu Yu and Xiangxue Li and Kefei Chen and Hui Li}, title = {Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens}, journal = {Comput. Stand. Interfaces}, volume = {54}, pages = {20--28}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.10.006}, doi = {10.1016/J.CSI.2016.10.006}, timestamp = {Sat, 27 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/HanYLCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoZLZD17, author = {Qinglan Zhao and Dong Zheng and Xiangxue Li and Yinghui Zhang and Xiaoli Dong}, title = {Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1965--1972}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1965}, doi = {10.1587/TRANSFUN.E100.A.1965}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoZLZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanYLZZL17, author = {Gang Han and Yu Yu and Xiangxue Li and Qifeng Zhou and Dong Zheng and Hui Li}, title = {1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {6268230:1--6268230:9}, year = {2017}, url = {https://doi.org/10.1155/2017/6268230}, doi = {10.1155/2017/6268230}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanYLZZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ZhangWLQ17, author = {Kai Zhang and Lifei Wei and Xiangxue Li and Haifeng Qian}, title = {Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2017}, year = {2017}, url = {https://doi.org/10.1155/2017/6128437}, doi = {10.1155/2017/6128437}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ZhangWLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YangLY17, author = {Limin Yang and Xiangxue Li and Yu Yu}, title = {VulDigger: {A} Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254428}, doi = {10.1109/GLOCOM.2017.8254428}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YangLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhangWLQ17, author = {Kai Zhang and Lifei Wei and Xiangxue Li and Haifeng Qian}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {210--219}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_19}, doi = {10.1007/978-3-319-60033-8\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/ZhangWLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001ZWGL17, author = {Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li}, title = {Collision Resistant Hashing from Learning Parity with Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1260}, year = {2017}, url = {http://eprint.iacr.org/2017/1260}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001ZWGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/TanTCYL16, author = {Yang Tan and Shaohua Tang and Jie Chen and Yong Yu and Xiangxue Li}, title = {Building a new secure variant of Rainbow signature scheme}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {2}, pages = {53--59}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0016}, doi = {10.1049/IET-IFS.2015.0016}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/TanTCYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangCLCQ16, author = {Kai Zhang and Wen Chen and Xiangxue Li and Jie Chen and Haifeng Qian}, title = {New application of partitioning methodology: identity-based dual receiver encryption}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5789--5802}, year = {2016}, url = {https://doi.org/10.1002/sec.1736}, doi = {10.1002/SEC.1736}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangCLCQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunYLZQZ16, author = {Yujuan Sun and Yu Yu and Xiangxue Li and Kai Zhang and Haifeng Qian and Yuan Zhou}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {293--309}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_18}, doi = {10.1007/978-3-319-40253-6\_18}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunYLZQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangGT0LQC16, author = {Kai Zhang and Junqing Gong and Shaohua Tang and Jie Chen and Xiangxue Li and Haifeng Qian and Zhenfu Cao}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {269--279}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897858}, doi = {10.1145/2897845.2897858}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangGT0LQC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YaoYLG16, author = {Nan Yao and Yu Yu and Xiangxue Li and Dawu Gu}, editor = {Kwok{-}Yan Lam and Chi{-}Hung Chi and Sihan Qing}, title = {On the Robustness of Learning Parity with Noise}, booktitle = {Information and Communications Security - 18th International Conference, {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9977}, pages = {99--106}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50011-9\_8}, doi = {10.1007/978-3-319-50011-9\_8}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/YaoYLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiLLC15, author = {Qiang Li and Xiangxue Li and Xuejia Lai and Kefei Chen}, title = {Optimal assignment schemes for general access structures based on linear programming}, journal = {Des. Codes Cryptogr.}, volume = {74}, number = {3}, pages = {623--644}, year = {2015}, url = {https://doi.org/10.1007/s10623-013-9879-3}, doi = {10.1007/S10623-013-9879-3}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiQYWZ15, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Yuan Zhou}, title = {Signcryption KEM/tag-KEM, revisited}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3067--3082}, year = {2015}, url = {https://doi.org/10.1002/sec.1232}, doi = {10.1002/SEC.1232}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiQYWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YuLW15, author = {Yu Yu and Xiangxue Li and Jian Weng}, title = {Pseudorandom generators from regular one-way functions: New constructions with improved parameters}, journal = {Theor. Comput. Sci.}, volume = {569}, pages = {58--69}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2014.12.013}, doi = {10.1016/J.TCS.2014.12.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/YuLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuGLW15, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {209--229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_11}, doi = {10.1007/978-3-662-48000-7\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/YuGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhengLA15, author = {Qingji Zheng and Xiangxue Li and Aytac Azgin}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {{CLKS:} Certificateless Keyword Search on Encrypted Data}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {239--253}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_16}, doi = {10.1007/978-3-319-25645-0\_16}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhengLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/YuGLW15, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {7--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_2}, doi = {10.1007/978-3-662-46494-6\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/YuGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengLA15, author = {Qingji Zheng and Xiangxue Li and Aytac Azgin}, title = {{CLKS:} Certificateless Keyword Search on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {814}, year = {2015}, url = {http://eprint.iacr.org/2015/814}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiZQZC14, author = {Xiangxue Li and Qingji Zheng and Haifeng Qian and Dong Zheng and Kefei Chen}, title = {{PWG:} Progressive Weight-Growth Algorithm for {LDPC} Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {2}, pages = {685--689}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.685}, doi = {10.1587/TRANSFUN.E97.A.685}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiZQZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiQZ14, author = {Xiangxue Li and Haifeng Qian and Yuan Zhou}, title = {Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption}, journal = {Inf. Sci.}, volume = {276}, pages = {290--294}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.055}, doi = {10.1016/J.INS.2014.02.055}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiQZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiQYWW14, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Ziping Wang}, title = {Robust password changing and DoS resilience for human-centric password authentication}, journal = {Secur. Commun. Networks}, volume = {7}, number = {10}, pages = {1552--1559}, year = {2014}, url = {https://doi.org/10.1002/sec.768}, doi = {10.1002/SEC.768}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiQYWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYLQZW14, author = {Xiangxue Li and Yu Yu and Qiang Li and Haifeng Qian and Yuan Zhou and Jian Weng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Arranging the Layout of Alphanumeric Buttons-the Role of Passwords}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1457--1459}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662368}, doi = {10.1145/2660267.2662368}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiYLQZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYLQZW14a, author = {Xiangxue Li and Yu Yu and Qiang Li and Haifeng Qian and Yuan Zhou and Jian Weng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1460--1462}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662379}, doi = {10.1145/2660267.2662379}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiYLQZW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/YuGL14, author = {Yu Yu and Dawu Gu and Xiangxue Li}, title = {The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from {A} Broader Class of One-way Functions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-082}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/082}, eprinttype = {ECCC}, eprint = {TR14-082}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/YuGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuGL14, author = {Yu Yu and Dawu Gu and Xiangxue Li}, title = {The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from {A} Broader Class of One-way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2014}, url = {http://eprint.iacr.org/2014/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuGLW14, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, title = {(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2014}, url = {http://eprint.iacr.org/2014/393}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuGLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LiQWY13, author = {Xiangxue Li and Haifeng Qian and Jian Weng and Yu Yu}, title = {Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model}, journal = {Math. Comput. Model.}, volume = {57}, number = {3-4}, pages = {503--511}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.06.030}, doi = {10.1016/J.MCM.2012.06.030}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LiQWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiQYZW13, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Yuan Zhou and Jian Weng}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Constructing Practical Signcryption {KEM} from Standard Assumptions without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {186--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_12}, doi = {10.1007/978-3-642-38980-1\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiQYZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YuLW13, author = {Yu Yu and Xiangxue Li and Jian Weng}, editor = {Kazue Sako and Palash Sarkar}, title = {Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {261--279}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_14}, doi = {10.1007/978-3-642-42045-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/YuLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiQYWZ13, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Yuan Zhou}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {167--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_13}, doi = {10.1007/978-3-319-02726-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiQYWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/LiQZ12, author = {Xiangxue Li and Haifeng Qian and Yuan Zhou}, title = {Pitfalls in identity based encryption using an elliptic curve combined public key}, journal = {Appl. Math. Lett.}, volume = {25}, number = {8}, pages = {1111--1113}, year = {2012}, url = {https://doi.org/10.1016/j.aml.2012.02.013}, doi = {10.1016/J.AML.2012.02.013}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/appml/LiQZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/ChenCWLLW12, author = {Jianhong Chen and Kefei Chen and Yongtao Wang and Xiangxue Li and Yu Long and Zhongmei Wan}, title = {Identity-Based Key-Insulated Signcryption}, journal = {Informatica}, volume = {23}, number = {1}, pages = {27--45}, year = {2012}, url = {http://content.iospress.com/articles/informatica/inf23-1-02}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/ChenCWLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/QianLH12, author = {Haifeng Qian and Xiangxue Li and Xinli Huang}, title = {Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model}, journal = {Informatica}, volume = {23}, number = {3}, pages = {443--460}, year = {2012}, url = {http://content.iospress.com/articles/informatica/inf23-3-07}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/QianLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/WangLCZ12, author = {Jingjing Wang and Xiangxue Li and Kefei Chen and Wenzheng Zhang}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {53--66}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_4}, doi = {10.1007/978-3-642-31410-0\_4}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/WangLCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/ZhangLQ12, author = {Yong Zhang and Xiangxue Li and Haifeng Qian}, title = {An anonymous remote attestation for trusted cloud computing}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {426--429}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664441}, doi = {10.1109/CCIS.2012.6664441}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/ccis/ZhangLQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/YuLQ12, author = {Yu Yu and Xiangxue Li and Haifeng Qian}, title = {Two-source extractors for leaky sources}, booktitle = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September 3-7, 2012}, pages = {452--456}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ITW.2012.6404713}, doi = {10.1109/ITW.2012.6404713}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/YuLQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZC12, author = {Qiang Li and Xiangxue Li and Dong Zheng and Kefei Chen}, title = {Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2012}, url = {http://eprint.iacr.org/2012/007}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZHC12, author = {Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen}, title = {On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2012}, url = {http://eprint.iacr.org/2012/245}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLZHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WengYDCL11, author = {Jian Weng and Guoxiang Yao and Robert H. Deng and Min{-}Rong Chen and Xiangxue Li}, title = {Cryptanalysis of a certificateless signcryption scheme in the standard model}, journal = {Inf. Sci.}, volume = {181}, number = {3}, pages = {661--667}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.09.037}, doi = {10.1016/J.INS.2010.09.037}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WengYDCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhouQL11, author = {Yuan Zhou and Haifeng Qian and Xiangxue Li}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {341--354}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_23}, doi = {10.1007/978-3-642-24861-0\_23}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhouQL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/HuangLZCL11, author = {Zheng Huang and Qiang Li and Dong Zheng and Kefei Chen and Xiangxue Li}, editor = {Jerry Zeyu Gao and Xiaodong Lu and Muhammad Younas and Hong Zhu}, title = {{YI} Cloud: Improving user privacy with secret key recovery in cloud storage}, booktitle = {{IEEE} 6th International Symposium on Service Oriented System Engineering, {SOSE} 2011, Irvine, CA, USA, December 12-14, 2011}, pages = {268--272}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SOSE.2011.6139116}, doi = {10.1109/SOSE.2011.6139116}, timestamp = {Wed, 21 Jun 2023 16:54:56 +0200}, biburl = {https://dblp.org/rec/conf/sose/HuangLZCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/LiQZCL10, author = {Xiangxue Li and Weidong Qiu and Dong Zheng and Kefei Chen and Jianhua Li}, title = {Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {57}, number = {2}, pages = {793--800}, year = {2010}, url = {https://doi.org/10.1109/TIE.2009.2028351}, doi = {10.1109/TIE.2009.2028351}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/LiQZCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ZhengLZG10, author = {Qingji Zheng and Xiangxue Li and Dong Zheng and Baoan Guo}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Regular Quasi-cyclic {LDPC} Codes with Girth 6 from Prime Fields}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {470--473}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.120}, doi = {10.1109/IIHMSP.2010.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ZhengLZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiZCL09, author = {Xiangxue Li and Dong Zheng and Kefei Chen and Jianhua Li}, title = {Democratic group signatures with collective traceability}, journal = {Comput. Electr. Eng.}, volume = {35}, number = {5}, pages = {664--672}, year = {2009}, url = {https://doi.org/10.1016/j.compeleceng.2009.01.005}, doi = {10.1016/J.COMPELECENG.2009.01.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LiZCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiZQZL09, author = {Xiangxue Li and Qingji Zheng and Haifeng Qian and Dong Zheng and Jianhua Li}, title = {Toward optimizing cauchy matrix for cauchy reed-solomon code}, journal = {{IEEE} Commun. Lett.}, volume = {13}, number = {8}, pages = {603--605}, year = {2009}, url = {https://doi.org/10.1109/LCOMM.2009.090988}, doi = {10.1109/LCOMM.2009.090988}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiZQZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZhouLZCL09, author = {Zhiheng Zhou and Xiangxue Li and Dong Zheng and Kefei Chen and Jianhua Li}, title = {Extended {PEG} Algorithm for High Rate {LDPC} Codes}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August 2009}, pages = {494--498}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ISPA.2009.80}, doi = {10.1109/ISPA.2009.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/ZhouLZCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/GuoLZLL09, author = {Chaonian Guo and Xiangxue Li and Dong Zheng and Shengli Liu and Jianhua Li}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {{AE-BP:} Adaptive Erasure Belief Propagation Decoding Algorithm of {LDPC} Codes}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {479--483}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.15}, doi = {10.1109/NCM.2009.15}, timestamp = {Sun, 21 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncm/GuoLZLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/WengLCL08, author = {Jian Weng and Shengli Liu and Kefei Chen and Xiangxue Li}, title = {Identity-Based Parallel Key-Insulated Signature: Framework and Construction}, journal = {J. Res. Pract. Inf. Technol.}, volume = {40}, number = {1}, pages = {55--68}, year = {2008}, url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.1.55.pdf}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/WengLCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WengLCL08, author = {Jian Weng and Xiangxue Li and Kefei Chen and Shengli Liu}, title = {Identity-Based Parallel Key-Insulated Signature Without Random Oracles}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {4}, pages = {1143--1157}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200807\_09.html}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WengLCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/GongLZC08, author = {Zheng Gong and Xiangxue Li and Dong Zheng and Kefei Chen}, title = {A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {5}, pages = {1347--1360}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/GongLZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengLMCL08, author = {Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li}, title = {Democratic Group Signatures with Threshold Traceability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2008}, url = {http://eprint.iacr.org/2008/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, title = {LFSR-based Signatures with Message Recovery}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {266--270}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p266-270.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhengLC07, author = {Dong Zheng and Xiangxue Li and Kefei Chen}, title = {Code-based Ring Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {2}, pages = {154--157}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p154-157.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhengLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangCLQ07, author = {Licheng Wang and Zhenfu Cao and Xiangxue Li and Haifeng Qian}, title = {Simulatability and security of certificateless threshold signatures}, journal = {Inf. Sci.}, volume = {177}, number = {6}, pages = {1382--1394}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2006.08.008}, doi = {10.1016/J.INS.2006.08.008}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangCLQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdve/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, editor = {Yuhua Luo}, title = {Efficient Blind Signatures from Linear Feedback Shift Register}, booktitle = {Cooperative Design, Visualization, and Engineering, 4th International Conference, {CDVE} 2007, Shanghai, China, September 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4674}, pages = {423--425}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74780-2\_57}, doi = {10.1007/978-3-540-74780-2\_57}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/cdve/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhengLCL07, author = {Dong Zheng and Xiangxue Li and Kefei Chen and Jianhua Li}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {Linkable Ring Signatures from Linear Feedback Shift Register}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {716--727}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_66}, doi = {10.1007/978-3-540-77090-9\_66}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/ZhengLCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, editor = {Hai Jin and Omer F. Rana and Yi Pan and Viktor K. Prasanna}, title = {Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register}, booktitle = {Algorithms and Architectures for Parallel Processing, 7th International Conference, {ICA3PP} 2007, Hangzhou, China, June 11-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4494}, pages = {95--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72905-1\_9}, doi = {10.1007/978-3-540-72905-1\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WengLCL06, author = {Jian Weng and Shengli Liu and Kefei Chen and Xiangxue Li}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Identity-Based Key-Insulated Signature with Secure Key-Updates}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {13--26}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_2}, doi = {10.1007/11937807\_2}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WengLCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/GongLC06, author = {Zheng Gong and Xiangxue Li and Kefei Chen}, editor = {Danny Z. Chen and D. T. Lee}, title = {Efficient Partially Blind Signature Scheme with Provable Security}, booktitle = {Computing and Combinatorics, 12th Annual International Conference, {COCOON} 2006, Taipei, Taiwan, August 15-18, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4112}, pages = {378--386}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11809678\_40}, doi = {10.1007/11809678\_40}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/GongLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LiC05, author = {Xiangxue Li and Kefei Chen}, title = {ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings}, journal = {Appl. Math. Comput.}, volume = {169}, number = {1}, pages = {437--450}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.10.046}, doi = {10.1016/J.AMC.2004.10.046}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/LiC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangCLQ05, author = {Lichen Wang and Zhenfu Cao and Xiangxue Li and Haifeng Qian}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Certificateless Threshold Signature Schemes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {104--109}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_15}, doi = {10.1007/11596981\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangCLQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnmc/LiCLL05, author = {Shiqun Li and Kefei Chen and Xiangxue Li and Rongxing Lu}, editor = {Xicheng Lu and Wei Zhao}, title = {Identity Based Conference Key Distribution Scheme from Parings}, booktitle = {Networking and Mobile Computing, Third International Conference, {ICCNMC} 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3619}, pages = {845--852}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11534310\_89}, doi = {10.1007/11534310\_89}, timestamp = {Fri, 09 Apr 2021 18:41:16 +0200}, biburl = {https://dblp.org/rec/conf/iccnmc/LiCLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/LiZLC05, author = {Shiqun Li and Jianying Zhou and Xiangxue Li and Kefei Chen}, editor = {Yi Pan and Daoxu Chen and Minyi Guo and Jiannong Cao and Jack J. Dongarra}, title = {An Authentication Protocol for Pervasive Computing}, booktitle = {Parallel and Distributed Processing and Applications, Third International Symposium, {ISPA} 2005, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3758}, pages = {553--563}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576235\_57}, doi = {10.1007/11576235\_57}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/ispa/LiZLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/LiC04, author = {Xiangxue Li and Kefei Chen}, title = {Identity Based Proxy-Signcryption Scheme from Pairings}, booktitle = {2004 {IEEE} International Conference on Services Computing {(SCC} 2004), 15-18 September 2004, Shanghai, China}, pages = {494--497}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCC.2004.1358050}, doi = {10.1109/SCC.2004.1358050}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/LiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/LiCZL04, author = {Xiangxue Li and Kefei Chen and Longjun Zhang and Shiqun Li}, editor = {Jiannong Cao and Laurence Tianruo Yang and Minyi Guo and Francis Chi{-}Moon Lau}, title = {Proxy Structured Multisignature Scheme from Bilinear Pairings}, booktitle = {Parallel and Distributed Processing and Applications, Second InternationalSymposium, {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3358}, pages = {705--714}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30566-8\_82}, doi = {10.1007/978-3-540-30566-8\_82}, timestamp = {Tue, 14 Apr 2020 13:23:10 +0200}, biburl = {https://dblp.org/rec/conf/ispa/LiCZL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/LiCL04, author = {Xiangxue Li and Kefei Chen and Shiqun Li}, editor = {Kim{-}Meow Liew and Hong Shen and Simon See and Wentong Cai and Pingzhi Fan and Susumu Horiguchi}, title = {Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings}, booktitle = {Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, {PDCAT} 2004, Singapore, December 8-10, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3320}, pages = {591--595}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30501-9\_113}, doi = {10.1007/978-3-540-30501-9\_113}, timestamp = {Fri, 12 Jun 2020 16:01:21 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/LiCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.