BibTeX records: Xiangxue Li

download as .bib file

@article{DBLP:journals/apin/XiaoYZCL23,
  author       = {Junchao Xiao and
                  Lin Yang and
                  Fuli Zhong and
                  Hongbo Chen and
                  Xiangxue Li},
  title        = {Robust anomaly-based intrusion detection system for in-vehicle network
                  by graph neural network framework},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {3},
  pages        = {3183--3206},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-03412-8},
  doi          = {10.1007/S10489-022-03412-8},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/XiaoYZCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuJLLBH23,
  author       = {Yongfeng Xu and
                  Hanyu Jia and
                  Xiangxue Li and
                  Qiang Li and
                  Yue Bao and
                  Xintian Hou},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear
                  Complexities},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {115--142},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_5},
  doi          = {10.1007/978-3-031-33491-7\_5},
  timestamp    = {Wed, 31 May 2023 14:56:55 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuJLLBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JiaL23,
  author       = {Hanyu Jia and
                  Xiangxue Li},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {{PFE:} Linear Active Security, Double-Shuffle Proofs, and Low-Complexity
                  Communication},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {227--252},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_12},
  doi          = {10.1007/978-981-97-0942-7\_12},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/JiaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/ZhuL23,
  author       = {Wenxing Zhu and
                  Xiangxue Li},
  title        = {Secure Mutual Learning with Low Interactions for Deep Model Training},
  booktitle    = {19th International Conference on Mobility, Sensing and Networking,
                  {MSN} 2023, Nanjing, China, December 14-16, 2023},
  pages        = {579--587},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSN60784.2023.00087},
  doi          = {10.1109/MSN60784.2023.00087},
  timestamp    = {Tue, 02 Jul 2024 09:33:56 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/ZhuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeiZCLL22,
  author       = {Mengqi Wei and
                  Wenxing Zhu and
                  Liangkun Cui and
                  Xiangxue Li and
                  Qiang Li},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Privacy Leakage in Privacy-Preserving Neural Network Inference},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_7},
  doi          = {10.1007/978-3-031-17140-6\_7},
  timestamp    = {Tue, 27 Sep 2022 21:06:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WeiZCLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhuWLL22,
  author       = {Wenxing Zhu and
                  Mengqi Wei and
                  Xiangxue Li and
                  Qiang Li},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {SecureBiNN: 3-Party Secure Computation for Binarized Neural Network
                  Inference},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {275--294},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_14},
  doi          = {10.1007/978-3-031-17143-7\_14},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhuWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JiaLLBH22,
  author       = {Hanyu Jia and
                  Xiangxue Li and
                  Qiang Li and
                  Yue Bao and
                  Xintian Hou},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Generic 2-Party {PFE} with Constant Rounds and Linear Active Security,
                  and Efficient Instantiation},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {390--410},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_21},
  doi          = {10.1007/978-3-031-25538-0\_21},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/JiaLLBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaL22,
  author       = {Hanyu Jia and
                  Xiangxue Li},
  title        = {{PFE:} Linear Active Security, Double-Shuffle Proofs, and Low-Complexity
                  Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/219},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XuL21a,
  author       = {Shengfeng Xu and
                  Xiangxue Li},
  title        = {Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard
                  Model},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {13683--13690},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3051047},
  doi          = {10.1109/ACCESS.2021.3051047},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XuL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuL21,
  author       = {Shouqin Lu and
                  Xiangxue Li},
  title        = {Quantum-Resistant Lightweight Authentication and Key Agreement Protocol
                  for Fog-Based Microgrids},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {27588--27600},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3058180},
  doi          = {10.1109/ACCESS.2021.3058180},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ChenL21a,
  author       = {Tongtong Chen and
                  Xiangxue Li},
  title        = {(Semi-)Automatically Parsing Private Protocols for In-Vehicle {ECU}
                  Communications},
  journal      = {Entropy},
  volume       = {23},
  number       = {11},
  pages        = {1495},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23111495},
  doi          = {10.3390/E23111495},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/ChenL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/XuLQC21,
  author       = {Shengfeng Xu and
                  Xiangxue Li and
                  Haifeng Qian and
                  Kefei Chen},
  title        = {CPA/CCA2-secure {PKE} with squared-exponential {DFR} from low-noise
                  {LPN}},
  journal      = {Theor. Comput. Sci.},
  volume       = {885},
  pages        = {91--103},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.06.025},
  doi          = {10.1016/J.TCS.2021.06.025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/XuLQC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuL21,
  author       = {Yucheng Liu and
                  Xiangxue Li},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Source Identification from In-Vehicle {CAN-FD} Signaling: What Can
                  We Expect?},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12918},
  pages        = {204--223},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86890-1\_12},
  doi          = {10.1007/978-3-030-86890-1\_12},
  timestamp    = {Tue, 21 Sep 2021 19:14:09 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWL21,
  author       = {Yucheng Liu and
                  Hao Wu and
                  Xiangxue Li},
  title        = {Another Look at the Connection between {CAN} Signal Ringing {\&}
                  In-Vehicle {ECU} Identification},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {1021--1030},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00141},
  doi          = {10.1109/TRUSTCOM53373.2021.00141},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaLQ21,
  author       = {Jianfeng Ma and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {{LVRT:} Low Variances of Solo Mining Reward {\&} Inter-block Time
                  in Collaborative PoW},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {1039--1048},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00143},
  doi          = {10.1109/TRUSTCOM53373.2021.00143},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaLQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/LuL21,
  author       = {Shouqin Lu and
                  Xiangxue Li},
  title        = {Lightweight Grouping-Proof for Post-Quantum {RFID} Security},
  booktitle    = {2021 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI),
                  Atlanta, GA, USA, October 18-21, 2021},
  pages        = {49--58},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SWC50871.2021.00017},
  doi          = {10.1109/SWC50871.2021.00017},
  timestamp    = {Fri, 03 Dec 2021 17:36:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/LuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LinghuL21,
  author       = {Yuan Linghu and
                  Xiangxue Li},
  title        = {WSG-InV: Weighted State Graph Model for Intrusion Detection on In-Vehicle
                  Network},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021,
                  Nanjing, China, March 29 - April 1, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCNC49053.2021.9417552},
  doi          = {10.1109/WCNC49053.2021.9417552},
  timestamp    = {Thu, 06 May 2021 17:21:01 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/LinghuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/YangLLQ20,
  author       = {Chenlong Yang and
                  Xiangxue Li and
                  Jingjing Li and
                  Haifeng Qian},
  editor       = {Meikang Qiu},
  title        = {Linear Scalability from Sharding and PoS},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 20th International
                  Conference, {ICA3PP} 2020, New York City, NY, USA, October 2-4, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12452},
  pages        = {548--562},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60245-1\_37},
  doi          = {10.1007/978-3-030-60245-1\_37},
  timestamp    = {Thu, 01 Oct 2020 13:46:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/YangLLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/WangXLQ20,
  author       = {Qi Wang and
                  Ming Xu and
                  Xiangxue Li and
                  Haifeng Qian},
  editor       = {Jia Hu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Zhiwei Zhao and
                  Fei Hao and
                  Wang Miao},
  title        = {Revisiting the Fairness and Randomness of Delegated Proof of Stake
                  Consensus Algorithm},
  booktitle    = {{IEEE} International Conference on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking,
                  ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December
                  17-19, 2020},
  pages        = {305--312},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00064},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM51426.2020.00064},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/WangXLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/LinghuXLQ20,
  author       = {Yuan Linghu and
                  Ming Xu and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle
                  Network},
  booktitle    = {16th International Conference on Mobility, Sensing and Networking,
                  {MSN} 2020, Tokyo, Japan, December 17-19, 2020},
  pages        = {479--487},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSN50589.2020.00082},
  doi          = {10.1109/MSN50589.2020.00082},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/LinghuXLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangLYW19,
  author       = {Chenlong Yang and
                  Xiangxue Li and
                  Yu Yu and
                  Ziping Wang},
  title        = {Basing Diversified Services of Complex IIoT Applications on Scalable
                  Block Graph Platform},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {22966--22975},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2899000},
  doi          = {10.1109/ACCESS.2019.2899000},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangLYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/XiaoWL19,
  author       = {Junchao Xiao and
                  Hao Wu and
                  Xiangxue Li},
  title        = {Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through
                  Lightweight Machine Learning},
  journal      = {Symmetry},
  volume       = {11},
  number       = {11},
  pages        = {1388},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11111388},
  doi          = {10.3390/SYM11111388},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/XiaoWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001ZWGL19,
  author       = {Yu Yu and
                  Jiang Zhang and
                  Jian Weng and
                  Chun Guo and
                  Xiangxue Li},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Collision Resistant Hashing from Sub-exponential Learning Parity with
                  Noise},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_1},
  doi          = {10.1007/978-3-030-34621-8\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001ZWGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XiaoWL19,
  author       = {Junchao Xiao and
                  Hao Wu and
                  Xiangxue Li},
  editor       = {Zheng Xiao and
                  Laurence T. Yang and
                  Pavan Balaji and
                  Tao Li and
                  Keqin Li and
                  Albert Y. Zomaya},
  title        = {Robust and Self-Evolving {IDS} for In-Vehicle Network by Enabling
                  Spatiotemporal Information},
  booktitle    = {21st {IEEE} International Conference on High Performance Computing
                  and Communications; 17th {IEEE} International Conference on Smart
                  City; 5th {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019},
  pages        = {1390--1397},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00193},
  doi          = {10.1109/HPCC/SMARTCITY/DSS.2019.00193},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/XiaoWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XiaoWLL19,
  author       = {Junchao Xiao and
                  Hao Wu and
                  Xiangxue Li and
                  Yuan Linghu},
  editor       = {Sheng Wen and
                  Albert Y. Zomaya and
                  Laurence T. Yang},
  title        = {Practical {IDS} on In-vehicle Network Against Diversified Attack Models},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 19th International
                  Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
                  2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11945},
  pages        = {456--466},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38961-1\_40},
  doi          = {10.1007/978-3-030-38961-1\_40},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/XiaoWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/LinghuLZ19,
  author       = {Yuan Linghu and
                  Xiangxue Li and
                  Zhenlong Zhang},
  editor       = {Sheng Wen and
                  Albert Y. Zomaya and
                  Laurence T. Yang},
  title        = {Deep Learning vs. Traditional Probabilistic Models: Case Study on
                  Short Inputs for Password Guessing},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 19th International
                  Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
                  2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11944},
  pages        = {468--483},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38991-8\_31},
  doi          = {10.1007/978-3-030-38991-8\_31},
  timestamp    = {Tue, 28 Jan 2020 10:52:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/LinghuLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangLY18,
  author       = {Qi Wang and
                  Xiangxue Li and
                  Yu Yu},
  title        = {Anonymity for Bitcoin From Secure Escrow Address},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {12336--12341},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2787563},
  doi          = {10.1109/ACCESS.2017.2787563},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LiYSC18,
  author       = {Xiangxue Li and
                  Yu Yu and
                  Guannan Sun and
                  Kefei Chen},
  title        = {Connected Vehicles' Security from the Perspective of the In-Vehicle
                  Network},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {58--63},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700319},
  doi          = {10.1109/MNET.2018.1700319},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/LiYSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChengLQY18,
  author       = {Haitao Cheng and
                  Xiangxue Li and
                  Haifeng Qian and
                  Di Yan},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {{CCA} Secure Multi-recipient {KEM} from {LPN}},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {513--529},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_30},
  doi          = {10.1007/978-3-030-01950-1\_30},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChengLQY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChengLQY18a,
  author       = {Haitao Cheng and
                  Xiangxue Li and
                  Haifeng Qian and
                  Di Yan},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Simpler {CCA} Secure {PKE} from {LPN} Problem Without Double-Trapdoor},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {756--766},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_46},
  doi          = {10.1007/978-3-030-01950-1\_46},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChengLQY18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HanYLCL17,
  author       = {Gang Han and
                  Yu Yu and
                  Xiangxue Li and
                  Kefei Chen and
                  Hui Li},
  title        = {Characterizing the semantics of passwords: The role of Pinyin for
                  Chinese Netizens},
  journal      = {Comput. Stand. Interfaces},
  volume       = {54},
  pages        = {20--28},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.10.006},
  doi          = {10.1016/J.CSI.2016.10.006},
  timestamp    = {Sat, 27 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/HanYLCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoZLZD17,
  author       = {Qinglan Zhao and
                  Dong Zheng and
                  Xiangxue Li and
                  Yinghui Zhang and
                  Xiaoli Dong},
  title        = {Characterizing Linear Structures of Boolean Functions from Arithmetic
                  Walsh Transform},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1965--1972},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1965},
  doi          = {10.1587/TRANSFUN.E100.A.1965},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoZLZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanYLZZL17,
  author       = {Gang Han and
                  Yu Yu and
                  Xiangxue Li and
                  Qifeng Zhou and
                  Dong Zheng and
                  Hui Li},
  title        = {1-Resilient Boolean Functions on Even Variables with Almost Perfect
                  Algebraic Immunity},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {6268230:1--6268230:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6268230},
  doi          = {10.1155/2017/6268230},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanYLZZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangWLQ17,
  author       = {Kai Zhang and
                  Lifei Wei and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {Scalable and Soundness Verifiable Outsourcing Computation in Marine
                  Mobile Computing},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2017},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6128437},
  doi          = {10.1155/2017/6128437},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhangWLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YangLY17,
  author       = {Limin Yang and
                  Xiangxue Li and
                  Yu Yu},
  title        = {VulDigger: {A} Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing
                  Changes},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254428},
  doi          = {10.1109/GLOCOM.2017.8254428},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YangLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ZhangWLQ17,
  author       = {Kai Zhang and
                  Lifei Wei and
                  Xiangxue Li and
                  Haifeng Qian},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Provably Secure Dual-Mode Publicly Verifiable Computation Protocol
                  in Marine Wireless Sensor Networks},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {210--219},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_19},
  doi          = {10.1007/978-3-319-60033-8\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wasa/ZhangWLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001ZWGL17,
  author       = {Yu Yu and
                  Jiang Zhang and
                  Jian Weng and
                  Chun Guo and
                  Xiangxue Li},
  title        = {Collision Resistant Hashing from Learning Parity with Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1260},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1260},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001ZWGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/TanTCYL16,
  author       = {Yang Tan and
                  Shaohua Tang and
                  Jie Chen and
                  Yong Yu and
                  Xiangxue Li},
  title        = {Building a new secure variant of Rainbow signature scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {53--59},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0016},
  doi          = {10.1049/IET-IFS.2015.0016},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/TanTCYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangCLCQ16,
  author       = {Kai Zhang and
                  Wen Chen and
                  Xiangxue Li and
                  Jie Chen and
                  Haifeng Qian},
  title        = {New application of partitioning methodology: identity-based dual receiver
                  encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {5789--5802},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1736},
  doi          = {10.1002/SEC.1736},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangCLCQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunYLZQZ16,
  author       = {Yujuan Sun and
                  Yu Yu and
                  Xiangxue Li and
                  Kai Zhang and
                  Haifeng Qian and
                  Yuan Zhou},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Batch Verifiable Computation with Public Verifiability for Outsourcing
                  Polynomials and Matrix Computations},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {293--309},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_18},
  doi          = {10.1007/978-3-319-40253-6\_18},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunYLZQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangGT0LQC16,
  author       = {Kai Zhang and
                  Junqing Gong and
                  Shaohua Tang and
                  Jie Chen and
                  Xiangxue Li and
                  Haifeng Qian and
                  Zhenfu Cao},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Practical and Efficient Attribute-Based Encryption with Constant-Size
                  Ciphertexts in Outsourced Verifiable Computation},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {269--279},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897858},
  doi          = {10.1145/2897845.2897858},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangGT0LQC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YaoYLG16,
  author       = {Nan Yao and
                  Yu Yu and
                  Xiangxue Li and
                  Dawu Gu},
  editor       = {Kwok{-}Yan Lam and
                  Chi{-}Hung Chi and
                  Sihan Qing},
  title        = {On the Robustness of Learning Parity with Noise},
  booktitle    = {Information and Communications Security - 18th International Conference,
                  {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9977},
  pages        = {99--106},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50011-9\_8},
  doi          = {10.1007/978-3-319-50011-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YaoYLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiLLC15,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Xuejia Lai and
                  Kefei Chen},
  title        = {Optimal assignment schemes for general access structures based on
                  linear programming},
  journal      = {Des. Codes Cryptogr.},
  volume       = {74},
  number       = {3},
  pages        = {623--644},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-013-9879-3},
  doi          = {10.1007/S10623-013-9879-3},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiLLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiQYWZ15,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Yuan Zhou},
  title        = {Signcryption KEM/tag-KEM, revisited},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3067--3082},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1232},
  doi          = {10.1002/SEC.1232},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiQYWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YuLW15,
  author       = {Yu Yu and
                  Xiangxue Li and
                  Jian Weng},
  title        = {Pseudorandom generators from regular one-way functions: New constructions
                  with improved parameters},
  journal      = {Theor. Comput. Sci.},
  volume       = {569},
  pages        = {58--69},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2014.12.013},
  doi          = {10.1016/J.TCS.2014.12.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/YuLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuGLW15,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way
                  Functions and Beyond},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {209--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_11},
  doi          = {10.1007/978-3-662-48000-7\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YuGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhengLA15,
  author       = {Qingji Zheng and
                  Xiangxue Li and
                  Aytac Azgin},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {{CLKS:} Certificateless Keyword Search on Encrypted Data},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_16},
  doi          = {10.1007/978-3-319-25645-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhengLA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/YuGLW15,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs
                  from a Broader Class of One-Way Functions},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {7--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_2},
  doi          = {10.1007/978-3-662-46494-6\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/YuGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengLA15,
  author       = {Qingji Zheng and
                  Xiangxue Li and
                  Aytac Azgin},
  title        = {{CLKS:} Certificateless Keyword Search on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {814},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/814},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengLA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiZQZC14,
  author       = {Xiangxue Li and
                  Qingji Zheng and
                  Haifeng Qian and
                  Dong Zheng and
                  Kefei Chen},
  title        = {{PWG:} Progressive Weight-Growth Algorithm for {LDPC} Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {2},
  pages        = {685--689},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.685},
  doi          = {10.1587/TRANSFUN.E97.A.685},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiZQZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiQZ14,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yuan Zhou},
  title        = {Notes on a group-oriented setting's multisigncryption scheme with
                  threshold designcryption},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {290--294},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.055},
  doi          = {10.1016/J.INS.2014.02.055},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiQZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiQYWW14,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Ziping Wang},
  title        = {Robust password changing and DoS resilience for human-centric password
                  authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {10},
  pages        = {1552--1559},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.768},
  doi          = {10.1002/SEC.768},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiQYWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiYLQZW14,
  author       = {Xiangxue Li and
                  Yu Yu and
                  Qiang Li and
                  Haifeng Qian and
                  Yuan Zhou and
                  Jian Weng},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Arranging the Layout of Alphanumeric Buttons-the Role of
                  Passwords},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1457--1459},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662368},
  doi          = {10.1145/2660267.2662368},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiYLQZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiYLQZW14a,
  author       = {Xiangxue Li and
                  Yu Yu and
                  Qiang Li and
                  Haifeng Qian and
                  Yuan Zhou and
                  Jian Weng},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Using Chinese Characters for Authentication-Algorithmic
                  Framework and Empirical Results},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1460--1462},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662379},
  doi          = {10.1145/2660267.2662379},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiYLQZW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/YuGL14,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li},
  title        = {The Randomized Iterate Revisited - Almost Linear Seed Length PRGs
                  from {A} Broader Class of One-way Functions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-082}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/082},
  eprinttype    = {ECCC},
  eprint       = {TR14-082},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/YuGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuGL14,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li},
  title        = {The Randomized Iterate Revisited - Almost Linear Seed Length PRGs
                  from {A} Broader Class of One-way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuGLW14,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  title        = {(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular
                  One-way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/393},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuGLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiQWY13,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Jian Weng and
                  Yu Yu},
  title        = {Fully secure identity-based signcryption scheme with shorter signcryptext
                  in the standard model},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {3-4},
  pages        = {503--511},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.06.030},
  doi          = {10.1016/J.MCM.2012.06.030},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiQWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiQYZW13,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Yuan Zhou and
                  Jian Weng},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Constructing Practical Signcryption {KEM} from Standard Assumptions
                  without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {186--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_12},
  doi          = {10.1007/978-3-642-38980-1\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiQYZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YuLW13,
  author       = {Yu Yu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Pseudorandom Generators from Regular One-Way Functions: New Constructions
                  with Improved Parameters},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_14},
  doi          = {10.1007/978-3-642-42045-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YuLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiQYWZ13,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Yuan Zhou},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Direct Construction of Signcryption Tag-KEM from Standard Assumptions
                  in the Standard Model},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_13},
  doi          = {10.1007/978-3-319-02726-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiQYWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/LiQZ12,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yuan Zhou},
  title        = {Pitfalls in identity based encryption using an elliptic curve combined
                  public key},
  journal      = {Appl. Math. Lett.},
  volume       = {25},
  number       = {8},
  pages        = {1111--1113},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.aml.2012.02.013},
  doi          = {10.1016/J.AML.2012.02.013},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/appml/LiQZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/ChenCWLLW12,
  author       = {Jianhong Chen and
                  Kefei Chen and
                  Yongtao Wang and
                  Xiangxue Li and
                  Yu Long and
                  Zhongmei Wan},
  title        = {Identity-Based Key-Insulated Signcryption},
  journal      = {Informatica},
  volume       = {23},
  number       = {1},
  pages        = {27--45},
  year         = {2012},
  url          = {http://content.iospress.com/articles/informatica/inf23-1-02},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/ChenCWLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/QianLH12,
  author       = {Haifeng Qian and
                  Xiangxue Li and
                  Xinli Huang},
  title        = {Tightly Secure Non-Interactive Multisignatures in the Plain Public
                  Key Model},
  journal      = {Informatica},
  volume       = {23},
  number       = {3},
  pages        = {443--460},
  year         = {2012},
  url          = {http://content.iospress.com/articles/informatica/inf23-3-07},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/QianLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/WangLCZ12,
  author       = {Jingjing Wang and
                  Xiangxue Li and
                  Kefei Chen and
                  Wenzheng Zhang},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Attack Based on Direct Sum Decomposition against the Nonlinear Filter
                  Generator},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_4},
  doi          = {10.1007/978-3-642-31410-0\_4},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/WangLCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/ZhangLQ12,
  author       = {Yong Zhang and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {An anonymous remote attestation for trusted cloud computing},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {426--429},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664441},
  doi          = {10.1109/CCIS.2012.6664441},
  timestamp    = {Sun, 08 Aug 2021 01:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/ZhangLQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/YuLQ12,
  author       = {Yu Yu and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {Two-source extractors for leaky sources},
  booktitle    = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September
                  3-7, 2012},
  pages        = {452--456},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITW.2012.6404713},
  doi          = {10.1109/ITW.2012.6404713},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/YuLQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZC12,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Optimal Multiple Assignments with (m, m)-Scheme for General Access
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/007},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZHC12,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Dong Zheng and
                  Zheng Huang and
                  Kefei Chen},
  title        = {On the Equivalence between the Set Covering Problem and the Problem
                  of Finding Optimal Cumulative Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/245},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WengYDCL11,
  author       = {Jian Weng and
                  Guoxiang Yao and
                  Robert H. Deng and
                  Min{-}Rong Chen and
                  Xiangxue Li},
  title        = {Cryptanalysis of a certificateless signcryption scheme in the standard
                  model},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {3},
  pages        = {661--667},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.09.037},
  doi          = {10.1016/J.INS.2010.09.037},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WengYDCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhouQL11,
  author       = {Yuan Zhou and
                  Haifeng Qian and
                  Xiangxue Li},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Non-interactive CDH-Based Multisignature Scheme in the Plain Public
                  Key Model with Tighter Security},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {341--354},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_23},
  doi          = {10.1007/978-3-642-24861-0\_23},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhouQL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/HuangLZCL11,
  author       = {Zheng Huang and
                  Qiang Li and
                  Dong Zheng and
                  Kefei Chen and
                  Xiangxue Li},
  editor       = {Jerry Zeyu Gao and
                  Xiaodong Lu and
                  Muhammad Younas and
                  Hong Zhu},
  title        = {{YI} Cloud: Improving user privacy with secret key recovery in cloud
                  storage},
  booktitle    = {{IEEE} 6th International Symposium on Service Oriented System Engineering,
                  {SOSE} 2011, Irvine, CA, USA, December 12-14, 2011},
  pages        = {268--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SOSE.2011.6139116},
  doi          = {10.1109/SOSE.2011.6139116},
  timestamp    = {Wed, 21 Jun 2023 16:54:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sose/HuangLZCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/LiQZCL10,
  author       = {Xiangxue Li and
                  Weidong Qiu and
                  Dong Zheng and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Anonymity Enhancement on Robust and Efficient Password-Authenticated
                  Key Agreement Using Smart Cards},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {57},
  number       = {2},
  pages        = {793--800},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIE.2009.2028351},
  doi          = {10.1109/TIE.2009.2028351},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/LiQZCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ZhengLZG10,
  author       = {Qingji Zheng and
                  Xiangxue Li and
                  Dong Zheng and
                  Baoan Guo},
  editor       = {Isao Echizen and
                  Jeng{-}Shyang Pan and
                  Dieter W. Fellner and
                  Alexander Nouak and
                  Arjan Kuijper and
                  Lakhmi C. Jain},
  title        = {Regular Quasi-cyclic {LDPC} Codes with Girth 6 from Prime Fields},
  booktitle    = {Sixth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
                  15-17 October, 2010, Proceedings},
  pages        = {470--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IIHMSP.2010.120},
  doi          = {10.1109/IIHMSP.2010.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ZhengLZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiZCL09,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Democratic group signatures with collective traceability},
  journal      = {Comput. Electr. Eng.},
  volume       = {35},
  number       = {5},
  pages        = {664--672},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.01.005},
  doi          = {10.1016/J.COMPELECENG.2009.01.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LiZCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiZQZL09,
  author       = {Xiangxue Li and
                  Qingji Zheng and
                  Haifeng Qian and
                  Dong Zheng and
                  Jianhua Li},
  title        = {Toward optimizing cauchy matrix for cauchy reed-solomon code},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {13},
  number       = {8},
  pages        = {603--605},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCOMM.2009.090988},
  doi          = {10.1109/LCOMM.2009.090988},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiZQZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZhouLZCL09,
  author       = {Zhiheng Zhou and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Extended {PEG} Algorithm for High Rate {LDPC} Codes},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
                  2009},
  pages        = {494--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISPA.2009.80},
  doi          = {10.1109/ISPA.2009.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/ZhouLZCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/GuoLZLL09,
  author       = {Chaonian Guo and
                  Xiangxue Li and
                  Dong Zheng and
                  Shengli Liu and
                  Jianhua Li},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Chen Rui and
                  Jong Hyung Lee and
                  Jian Wang and
                  Gang Kou},
  title        = {{AE-BP:} Adaptive Erasure Belief Propagation Decoding Algorithm of
                  {LDPC} Codes},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2009, Fifth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2009: International Conference on Networked
                  Computing, {IMS} 2009: International Conference on Advanced Information
                  Management and Service, {IDC} 2009: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 25-27, 2009},
  pages        = {479--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCM.2009.15},
  doi          = {10.1109/NCM.2009.15},
  timestamp    = {Sun, 21 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncm/GuoLZLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/WengLCL08,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Xiangxue Li},
  title        = {Identity-Based Parallel Key-Insulated Signature: Framework and Construction},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {40},
  number       = {1},
  pages        = {55--68},
  year         = {2008},
  url          = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.1.55.pdf},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/WengLCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WengLCL08,
  author       = {Jian Weng and
                  Xiangxue Li and
                  Kefei Chen and
                  Shengli Liu},
  title        = {Identity-Based Parallel Key-Insulated Signature Without Random Oracles},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {4},
  pages        = {1143--1157},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200807\_09.html},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WengLCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/GongLZC08,
  author       = {Zheng Gong and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {A Generic Construction for Instrusion-Resilient Signatures from Linear
                  Feedback Shift Register},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {5},
  pages        = {1347--1360},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/GongLZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengLMCL08,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Changshe Ma and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Democratic Group Signatures with Threshold Traceability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {LFSR-based Signatures with Message Recovery},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {266--270},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p266-270.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhengLC07,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Kefei Chen},
  title        = {Code-based Ring Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {154--157},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p154-157.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhengLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangCLQ07,
  author       = {Licheng Wang and
                  Zhenfu Cao and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {Simulatability and security of certificateless threshold signatures},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {6},
  pages        = {1382--1394},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2006.08.008},
  doi          = {10.1016/J.INS.2006.08.008},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangCLQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  editor       = {Yuhua Luo},
  title        = {Efficient Blind Signatures from Linear Feedback Shift Register},
  booktitle    = {Cooperative Design, Visualization, and Engineering, 4th International
                  Conference, {CDVE} 2007, Shanghai, China, September 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4674},
  pages        = {423--425},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74780-2\_57},
  doi          = {10.1007/978-3-540-74780-2\_57},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhengLCL07,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Kefei Chen and
                  Jianhua Li},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {Linkable Ring Signatures from Linear Feedback Shift Register},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {716--727},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_66},
  doi          = {10.1007/978-3-540-77090-9\_66},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ZhengLCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  editor       = {Hai Jin and
                  Omer F. Rana and
                  Yi Pan and
                  Viktor K. Prasanna},
  title        = {Efficient Linkable Ring Signatures and Threshold Signatures from Linear
                  Feedback Shift Register},
  booktitle    = {Algorithms and Architectures for Parallel Processing, 7th International
                  Conference, {ICA3PP} 2007, Hangzhou, China, June 11-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4494},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72905-1\_9},
  doi          = {10.1007/978-3-540-72905-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WengLCL06,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Xiangxue Li},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Identity-Based Key-Insulated Signature with Secure Key-Updates},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_2},
  doi          = {10.1007/11937807\_2},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WengLCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/GongLC06,
  author       = {Zheng Gong and
                  Xiangxue Li and
                  Kefei Chen},
  editor       = {Danny Z. Chen and
                  D. T. Lee},
  title        = {Efficient Partially Blind Signature Scheme with Provable Security},
  booktitle    = {Computing and Combinatorics, 12th Annual International Conference,
                  {COCOON} 2006, Taipei, Taiwan, August 15-18, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4112},
  pages        = {378--386},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11809678\_40},
  doi          = {10.1007/11809678\_40},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/GongLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LiC05,
  author       = {Xiangxue Li and
                  Kefei Chen},
  title        = {ID-based multi-proxy signature, proxy multi-signature and multi-proxy
                  multi-signature schemes from bilinear pairings},
  journal      = {Appl. Math. Comput.},
  volume       = {169},
  number       = {1},
  pages        = {437--450},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.10.046},
  doi          = {10.1016/J.AMC.2004.10.046},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/LiC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangCLQ05,
  author       = {Lichen Wang and
                  Zhenfu Cao and
                  Xiangxue Li and
                  Haifeng Qian},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Certificateless Threshold Signature Schemes},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {104--109},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_15},
  doi          = {10.1007/11596981\_15},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WangCLQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnmc/LiCLL05,
  author       = {Shiqun Li and
                  Kefei Chen and
                  Xiangxue Li and
                  Rongxing Lu},
  editor       = {Xicheng Lu and
                  Wei Zhao},
  title        = {Identity Based Conference Key Distribution Scheme from Parings},
  booktitle    = {Networking and Mobile Computing, Third International Conference, {ICCNMC}
                  2005, Zhangjiajie, China, August 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3619},
  pages        = {845--852},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11534310\_89},
  doi          = {10.1007/11534310\_89},
  timestamp    = {Fri, 09 Apr 2021 18:41:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnmc/LiCLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LiZLC05,
  author       = {Shiqun Li and
                  Jianying Zhou and
                  Xiangxue Li and
                  Kefei Chen},
  editor       = {Yi Pan and
                  Daoxu Chen and
                  Minyi Guo and
                  Jiannong Cao and
                  Jack J. Dongarra},
  title        = {An Authentication Protocol for Pervasive Computing},
  booktitle    = {Parallel and Distributed Processing and Applications, Third International
                  Symposium, {ISPA} 2005, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3758},
  pages        = {553--563},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576235\_57},
  doi          = {10.1007/11576235\_57},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/LiZLC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/LiC04,
  author       = {Xiangxue Li and
                  Kefei Chen},
  title        = {Identity Based Proxy-Signcryption Scheme from Pairings},
  booktitle    = {2004 {IEEE} International Conference on Services Computing {(SCC}
                  2004), 15-18 September 2004, Shanghai, China},
  pages        = {494--497},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCC.2004.1358050},
  doi          = {10.1109/SCC.2004.1358050},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/LiC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LiCZL04,
  author       = {Xiangxue Li and
                  Kefei Chen and
                  Longjun Zhang and
                  Shiqun Li},
  editor       = {Jiannong Cao and
                  Laurence Tianruo Yang and
                  Minyi Guo and
                  Francis Chi{-}Moon Lau},
  title        = {Proxy Structured Multisignature Scheme from Bilinear Pairings},
  booktitle    = {Parallel and Distributed Processing and Applications, Second InternationalSymposium,
                  {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3358},
  pages        = {705--714},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30566-8\_82},
  doi          = {10.1007/978-3-540-30566-8\_82},
  timestamp    = {Tue, 14 Apr 2020 13:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/LiCZL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/LiCL04,
  author       = {Xiangxue Li and
                  Kefei Chen and
                  Shiqun Li},
  editor       = {Kim{-}Meow Liew and
                  Hong Shen and
                  Simon See and
                  Wentong Cai and
                  Pingzhi Fan and
                  Susumu Horiguchi},
  title        = {Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear
                  Pairings},
  booktitle    = {Parallel and Distributed Computing: Applications and Technologies,
                  5th International Conference, {PDCAT} 2004, Singapore, December 8-10,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3320},
  pages        = {591--595},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30501-9\_113},
  doi          = {10.1007/978-3-540-30501-9\_113},
  timestamp    = {Fri, 12 Jun 2020 16:01:21 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/LiCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}