Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Qianqian Xing
@article{DBLP:journals/sensors/XingWXLWLW23, author = {Qianqian Xing and Xiaofeng Wang and Xinyue Xu and Jiaqi Lin and Fei Wang and Cui Li and Baosheng Wang}, title = {{BRT:} An Efficient and Scalable Blockchain-Based Revocation Transparency System for {TLS} Connections}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8816}, year = {2023}, url = {https://doi.org/10.3390/s23218816}, doi = {10.3390/S23218816}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/XingWXLWLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04693, author = {Xiaofeng Wang and Peng Zheng and Qianqian Xing}, title = {Security Analysis of Pairing-based Cryptography}, journal = {CoRR}, volume = {abs/2309.04693}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04693}, doi = {10.48550/ARXIV.2309.04693}, eprinttype = {arXiv}, eprint = {2309.04693}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04693.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuWX22, author = {Xiaoyan Wu and Xiaofeng Wang and Qianqian Xing}, title = {Identity-Based Authentication Protocol for Trustworthy {IP} Address}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {58--63}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586111}, doi = {10.1145/3586102.3586111}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiSWX21, author = {Pengkun Li and Jinshu Su and Xiaofeng Wang and Qianqian Xing}, title = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet Accountability}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {1974493:1--1974493:17}, year = {2021}, url = {https://doi.org/10.1155/2021/1974493}, doi = {10.1155/2021/1974493}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiSWX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiss/SuWXW21, author = {Yi Su and Baosheng Wang and Qianqian Xing and Xiaofeng Wang}, title = {{DISCA:} Decentralized Infrastructure for Secure Community Attribute certifying}, booktitle = {{AISS} 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26 - 28, 2021}, pages = {38:1--38:8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503047.3503089}, doi = {10.1145/3503047.3503089}, timestamp = {Mon, 24 Jan 2022 10:20:19 +0100}, biburl = {https://dblp.org/rec/conf/aiss/SuWXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/SuWXLWL21, author = {Yi Su and Baosheng Wang and Qianqian Xing and Pengkun Li and Xiaofeng Wang and Cui Li}, title = {Research on Blockchain-Based Inter-Domain Routing Authentication Technology}, booktitle = {21st International Conference on Communication Technology, {ICCT} 2021, Tianjin, China, October 13-16, 2021}, pages = {810--816}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCT52962.2021.9657917}, doi = {10.1109/ICCT52962.2021.9657917}, timestamp = {Tue, 11 Jan 2022 10:02:53 +0100}, biburl = {https://dblp.org/rec/conf/icct/SuWXLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuWPX19, author = {Wenzheng Liu and Xiaofeng Wang and Wei Peng and Qianqian Xing}, title = {Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based {ID-MAKA} Scheme for Mobile Cloud Computing Services}, journal = {{IEEE} Access}, volume = {7}, pages = {137770--137783}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942987}, doi = {10.1109/ACCESS.2019.2942987}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuWPX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LuoXWTX19, author = {Zhenhao Luo and Wei Xie and Baosheng Wang and Yong Tang and Qianqian Xing}, title = {EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains}, journal = {Symmetry}, volume = {11}, number = {2}, pages = {222}, year = {2019}, url = {https://doi.org/10.3390/sym11020222}, doi = {10.3390/SYM11020222}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/LuoXWTX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/XingWW18, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang}, title = {BGPcoin: Blockchain-Based Internet Number Resource Authority and {BGP} Security Solution}, journal = {Symmetry}, volume = {10}, number = {9}, pages = {408}, year = {2018}, url = {https://doi.org/10.3390/sym10090408}, doi = {10.3390/SYM10090408}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/XingWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/CaiWX17, author = {Guilin Cai and Baosheng Wang and Qianqian Xing}, title = {Game theoretic analysis for the mechanism of moving target defense}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {18}, number = {12}, pages = {2017--2034}, year = {2017}, url = {https://doi.org/10.1631/FITEE.1601797}, doi = {10.1631/FITEE.1601797}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/CaiWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XingWW17, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} BGPCoin: {A} Trustworthy Blockchain-based Resource Management Solution for {BGP} Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2591--2593}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138828}, doi = {10.1145/3133956.3138828}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XingWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/XingWWTW17, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang and Yong Tang and Yi Wang}, title = {Deja {Q} Encore {RIBE:} Anonymous Revocable Identity-Based Encryption with Short Parameters}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8253992}, doi = {10.1109/GLOCOM.2017.8253992}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/XingWWTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XingWWTL17, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang and Jing Tao and Liu Liu}, title = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {89--95}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.224}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XingWWTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/XingWWCYTG16, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang and Peixin Chen and Bo Yu and Yong Tang and Xianming Gao}, editor = {Jinjun Chen and Laurence T. Yang}, title = {Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security}, booktitle = {18th {IEEE} International Conference on High Performance Computing and Communications; 14th {IEEE} International Conference on Smart City; 2nd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016}, pages = {430--437}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0068}, doi = {10.1109/HPCC-SMARTCITY-DSS.2016.0068}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/XingWWCYTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.