
Xinxin Fan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j22]Lei Xu
, Lin Chen, Zhimin Gao, Larry Carranco, Xinxin Fan, Nolan Shah, Nour Diallo, Weidong Shi:
Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices. IEEE Consumer Electron. Mag. 9(2): 26-33 (2020) - [j21]Xinxin Fan, Ling Liu, Rui Zhang, Quanliang Jing, Jingping Bi:
Decentralized Trust Management: Risk Analysis and Trust Aggregation. ACM Comput. Surv. 53(1): 2:1-2:33 (2020) - [j20]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi:
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Netw. 34(1): 38-46 (2020) - [c52]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Weidong Shi:
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter. BSCI 2020: 53-62 - [c51]Xinxin Fan, Qi Chai, Lei Xu, Dong Guo:
DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things. BSCI 2020: 186-191 - [c50]Zhihua Zhu, Xinxin Fan, Xiaokai Chu, Jianhui Huang, Jingping Bi:
LRHNE: A Latent-Relation Enhanced Embedding Method for Heterogeneous Information Networks. CIKM 2020: 1923-1932 - [c49]Xinxin Fan
, Qi Chai, Zhi Zhong:
MULTAV: A Multi-chain Token Backed Voting Framework for Decentralized Blockchain Governance. ICBC 2020: 33-47 - [c48]Chenggang Wang, Boyang Wang, Xinxin Fan:
EcoBoost: Efficient Bootstrapping for Confidential Transactions. IEEE ICBC 2020: 1-3 - [c47]Zhihua Zhu, Xinxin Fan, Xiaokai Chu, Jingping Bi:
HGCN: A Heterogeneous Graph Convolutional Network-Based Deep Learning Model Toward Collective Classification. KDD 2020: 1161-1171 - [c46]Xinxin Fan
, Zhi Zhong, Qi Chai, Dong Guo:
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. SecureComm (2) 2020: 311-323 - [c45]Xinxin Fan, Qi Chai, Zhefeng Li, Tian Pan:
Decentralized IoT Data Authorization with Pebble Tracker. WF-IoT 2020: 1-2
2010 – 2019
- 2019
- [j19]Xinxin Fan, Guang Gong, Berry Schoenmakers, Francesco Sica
, Andrey Sidorenko:
Secure simultaneous bit extraction from Koblitz curves. Des. Codes Cryptogr. 87(1): 1-13 (2019) - [j18]Jie Wang
, Jingyu Tong, Xinxin Fan, Xiaorui Ma, Qinghua Gao
, Xiaoxia Huang
:
A Dynamic Differential Phase Analysis Method for Wireless Sensing. IEEE Trans. Veh. Technol. 68(8): 7723-7732 (2019) - [c44]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239 - [c43]Xiaokai Chu, Xinxin Fan, Di Yao, Chen-Lin Zhang, Jianhui Huang, Jingping Bi:
Noise-Aware Network Embedding for Multiplex Network. IJCNN 2019: 1-8 - [c42]Xiaokai Chu, Xinxin Fan, Di Yao, Zhihua Zhu, Jianhui Huang, Jingping Bi:
Cross-Network Embedding for Multi-Network Alignment. WWW 2019: 273-284 - [i8]Xinxin Fan, Ling Liu, Rui Zhang, Quanliang Jing, Jingping Bi:
Decentralized Trust Management: Risk Analysis and Trust Aggregation. CoRR abs/1909.11355 (2019) - 2018
- [j17]Jinping Yu
, Jingping Bi, Guoqiang Zhang
, Xinxin Fan, Zhongcheng Li:
Loop-Free Rerouting of Multiple Policies With Overlaps. IEEE Commun. Lett. 22(7): 1370-1373 (2018) - [j16]Boyang Wang
, Xinxin Fan:
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 15(6): 1027-1040 (2018) - [j15]Jie Wang
, Yunong Zhao
, Xinxin Fan, Qinghua Gao, Xiaorui Ma, Hongyu Wang
:
Device-Free Identification Using Intrinsic CSI Features. IEEE Trans. Veh. Technol. 67(9): 8571-8581 (2018) - [c41]Xinxin Fan:
Scalable practical byzantine fault tolerance with short-lived signature schemes. CASCON 2018: 245-256 - [c40]Zujie Ren, Na Yun, Youhuizi Li, Jian Wan, Yuan Wang, Lihua Yu, Xinxin Fan:
How Good is Query Optimizer in Spark? CollaborateCom 2018: 595-609 - [c39]Xinxin Fan:
Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. ICBC 2018: 127-138 - [c38]Xinxin Fan, Jingping Bi:
Identification for Strategically Malicious Participants. ICWS 2018: 373-388 - [c37]Xinxin Fan, Danyang He, Jingping Bi:
Trustworthiness and Untrustworthiness Inference with Group Assignment. ICWS 2018: 389-404 - [c36]Zixuan Ding, Xinxin Fan, Jinping Yu, Jingping Bi:
Update Cost-Aware Cache Replacement for Wildcard Rules in Software-Defined Networking. ISCC 2018: 457-463 - [c35]Haining Tan
, Weiqiang Tang
, Xinxin Fan
, Quanliang Jing
, Jingping Bi
:
SERL: Semantic-Path Biased Representation Learning of Heterogeneous Information Network. KSEM (1) 2018: 287-298 - [c34]Xinxin Fan, Qi Chai:
Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. MobiQuitous 2018: 482-484 - [c33]Zujie Ren, Na Yun, Weisong Shi
, Youhuizi Li, Jian Wan, Lihua Yu, Xinxin Fan:
Characterizing the Effectiveness of Query Optimizer in Spark. SERVICES 2018: 41-42 - [c32]Boyang Wang, Xinxin Fan:
Lightweight Verification for Searchable Encryption. TrustCom/BigDataSE 2018: 932-937 - [i7]Xinxin Fan:
Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. CoRR abs/1806.00951 (2018) - 2017
- [j14]Xinxin Fan, Adilet Otemissov, Francesco Sica
, Andrey Sidorenko:
Multiple point compression on elliptic curves. Des. Codes Cryptogr. 83(3): 565-588 (2017) - [j13]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
GroupTrust: Dependable Trust Management. IEEE Trans. Parallel Distributed Syst. 28(4): 1076-1090 (2017) - [c31]Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. INFOCOM 2017: 1-9 - [c30]Jinping Yu, Xinxin Fan, Guoqiang Zhang, Jingping Bi:
Scheduling loop-free updates for multiple policies with overlaps in software-defined networks. IPCCC 2017: 1-8 - [i6]Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A Reliable, Searchable and Privacy-Preserving e-Healthcare System for Cloud-Assisted Body Area Networks. CoRR abs/1702.03467 (2017) - 2016
- [j12]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. ACM Trans. Embed. Comput. Syst. 15(1): 1:1-1:28 (2016) - [c29]Xinxin Fan, Tim Güneysu
:
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). CCS 2016: 1888-1890 - [e1]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - 2015
- [j11]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. EAI Endorsed Trans. Security Safety 2(3): e4 (2015) - [j10]Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou:
Reliable and Resilient Trust Management in Distributed Service Provision Networks. ACM Trans. Web 9(3): 14:1-14:37 (2015) - [c28]Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. CODASPY 2015: 127-129 - 2014
- [j9]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
Optimal parameters for the WG stream cipher family. Cryptogr. Commun. 6(2): 117-135 (2014) - [c27]Bo Zhu, Xinxin Fan, Guang Gong:
Loxin - A solution to password-less universal login. INFOCOM Workshops 2014: 488-493 - [i5]Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. IACR Cryptol. ePrint Arch. 2014: 655 (2014) - 2013
- [j8]Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Cryptogr. Commun. 5(4): 277-289 (2013) - [j7]Xiaodong Chen, Mingchu Li, Xin Ma, Xinxin Fan:
Hamiltonian Connectedness in Claw-Free Graphs. Graphs Comb. 29(5): 1259-1267 (2013) - [j6]Zhenzhou Guo, Mingchu Li, Xinxin Fan:
Attribute-based ring signcryption scheme. Secur. Commun. Networks 6(6): 790-796 (2013) - [j5]Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun:
Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. Secur. Commun. Networks 6(9): 1126-1142 (2013) - [c26]Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou:
ServiceTrust: Trust Management in Service Provision Networks. IEEE SCC 2013: 272-279 - [c25]Gangqiang Yang, Xinxin Fan, Mark D. Aagaard, Guang Gong:
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs. WESS 2013: 8:1-8:10 - [c24]Xinxin Fan, Guang Gong:
Securing ZigBee smart energy profile 1.x with OpenECC library. SEGS@CCS 2013: 17-22 - [c23]Xinxin Fan, Nusa Zidaric, Mark D. Aagaard, Guang Gong:
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. TrustED@CCS 2013: 21-34 - [c22]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
On selection of optimal parameters for the WG stream cipher family. CWIT 2013: 17-21 - [c21]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. QSHINE 2013: 617-632 - [c20]Xinxin Fan, Guang Gong:
Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions. RFIDSec Asia 2013: 97-106 - 2012
- [j4]Xinxin Fan, Guang Gong:
Accelerating signature-based broadcast authentication for wireless sensor networks. Ad Hoc Networks 10(4): 723-736 (2012) - [j3]Xinxin Fan, Mingchu Li, Jianhua Ma, Yizhi Ren, Hui Zhao, Zhiyuan Su:
Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6): 1737-1750 (2012) - [c19]Xinxin Fan, Guang Gong:
LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks. ADHOCNETS 2012: 180-195 - [c18]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
EigenTrustp++: Attack resilient trust management. CollaborateCom 2012: 416-425 - [c17]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags. RFIDSec Asia 2012: 73-84 - [i4]Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations. IACR Cryptol. ePrint Arch. 2012: 681 (2012) - 2011
- [j2]Hui Zhao, Mingchu Li, Xinxin Fan:
A formal separation method of protocols to eliminate parallel attacks in virtual organization. Secur. Commun. Networks 4(12): 1461-1468 (2011) - [c16]Xinxin Fan, Guang Gong, Daniel W. Engels, Eric M. Smith:
A lightweight privacy-preserving mutual authentication protocol for RFID systems. GLOBECOM Workshops 2011: 1083-1087 - [c15]Xinxin Fan, Guang Gong, Honggang Hu:
Remedying the Hummingbird Cryptographic Algorithm. TrustCom 2011: 772-778 - [c14]Xinxin Fan, Guang Gong:
On the Security of Hummingbird-2 against Side Channel Cube Attacks. WEWoRC 2011: 18-29 - [i3]Qi Chai, Xinxin Fan, Guang Gong:
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2. IACR Cryptol. ePrint Arch. 2011: 247 (2011) - 2010
- [b1]Xinxin Fan:
Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks. University of Waterloo, Ontario, Canada, 2010 - [c13]Xinxin Fan, Guang Gong:
Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks. ADHOCNETS 2010: 328-343 - [c12]Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith:
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. Financial Cryptography Workshops 2010: 3-18 - [c11]Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks:
FPGA Implementations of the Hummingbird Cryptographic Algorithm. HOST 2010: 48-51 - [c10]Xinxin Fan, Mingchu Li, Yizhi Ren, Jianhua Ma:
Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks. UIC/ATC Workshops 2010: 358-363
2000 – 2009
- 2009
- [c9]Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels:
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. ICITST 2009: 1-7 - 2008
- [c8]Xianchao Zhang, Xinxin Fan, Xinyue Liu, Hong Yu:
A Ranking Algorithm via Changing Markov Probability Matrix Based on Distribution Factor. FSKD (5) 2008: 3-7 - [c7]Xinxin Fan, Guang Gong:
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. LCN 2008: 958-965 - [c6]Xinxin Fan, Guang Gong, David Jao:
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. Pairing 2008: 243-264 - [c5]Xinxin Fan, Guang Gong, David Jao:
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. Selected Areas in Cryptography 2008: 18-34 - 2007
- [j1]Xinxin Fan, Thomas J. Wollinger, Guang Gong:
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields. IET Inf. Secur. 1(2): 65-81 (2007) - [c4]Xinxin Fan, Guang Gong:
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Selected Areas in Cryptography 2007: 155-172 - 2006
- [c3]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. CT-RSA 2006: 64-81 - 2005
- [c2]Xinxin Fan, Yumin Wang:
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. AINA 2005: 978-983 - [c1]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. ITCC (1) 2005: 642-647 - [i2]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. IACR Cryptol. ePrint Arch. 2005: 228 (2005) - 2004
- [i1]Xinxin Fan, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2004: 223 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-31 01:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint