default search action
Xinxin Fan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Lin Liu, Xinxin Fan, Haoyang Liu, Chulong Zhang, Weibin Kong, Jingjing Dai, Yuming Jiang, Yaoqin Xie, Xiaokun Liang:
QUIZ: An arbitrary volumetric point matching method for medical image registration. Comput. Medical Imaging Graph. 112: 102336 (2024) - [j27]Xinxin Fan, Mengfan Li, Jia Zhou, Quanliang Jing, Chi Lin, Yunfeng Lu, Jingping Bi:
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks. IEEE Trans. Consumer Electron. 70(1): 2038-2048 (2024) - [j26]Mathias Brossard, Guilhem Bryant, Basma El Gaabouri, Xinxin Fan, Alexandre Ferreira, Edmund Grimley-Evans, Christopher Haster, Evan Johnson, Derek Miller, Fan Mo, Dominic P. Mulligan, Nick Spinale, Eric Van Hensbergen, Hugo J. M. Vincent, Shale Xiong:
Private Delegated Computations Using Strong Isolation. IEEE Trans. Emerg. Top. Comput. 12(1): 386-398 (2024) - [j25]Chi Lin, Zhouhe Sun, Asfandeyar Ahmad, Xinxin Fan, Yi Wang, Lei Wang, Xin Fan, Guowei Wu:
AirWrite: An Aerial Handwriting Trajectory Tracking and Recognition System With mmWave. IEEE Trans. Mob. Comput. 23(12): 13325-13341 (2024) - [c80]Jonathan Heiss, Fernando Castillo, Xinxin Fan:
Towards Credential-Based Device Registration in DApps for DePINs with ZKPs. Blockchain 2024: 583-590 - [c79]Rabimba Karanjai, Sangwon Shin, Wujie Xiong, Xinxin Fan, Lin Chen, Tianwei Zhang, Taeweon Suh, Weidong Shi, Veronika Kuchta, Francesco Sica, Lei Xu:
TPU as Cryptographic Accelerator. HASP@MICRO 2024: 37-44 - [c78]Xinxin Fan, Teik Guan Tan, Nicholas Ho, Shi Hong Choy:
Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum. ICBC 2024: 3-15 - [c77]Xinxin Fan, Xueping Yang:
Enabling Web2-Based User Authentication for Account Abstraction. ICBC 2024: 9-10 - [c76]Yubo Zhang, Yanfang Liu, Xinxin Fan, Yunfeng Lu:
CPLCS: Contrastive Prompt Learning-based Code Search with Cross-modal Interaction Mechanism. IJCNN 2024: 1-10 - [c75]Ranjith Chodavarapu, Rabimba Karanjai, Xinxin Fan, Weidong Shi, Lei Xu:
Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3. SSS 2024: 292-306 - [i18]Xinxin Fan, Lin Liu, Haoran Zhang:
Multimodal Information Interaction for Medical Image Segmentation. CoRR abs/2404.16371 (2024) - [i17]Thusitha Dayaratne, Xinxin Fan, Yuhong Liu, Carsten Rudolph:
SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity. CoRR abs/2405.02476 (2024) - [i16]Jonathan Heiss, Fernando Castillo, Xinxin Fan:
Towards Credential-based Device Registration in DApps for DePINs with ZKPs. CoRR abs/2406.19042 (2024) - [i15]Xinxin Fan, Veronika Kuchta, Francesco Sica, Lei Xu:
Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs. IACR Cryptol. ePrint Arch. 2024: 750 (2024) - 2023
- [j24]Yunfeng Lu, Xinxin Fan, Quanliang Jing:
TAEffect: Quantifying interaction risks in trust-enabled communication systems. Int. J. Commun. Syst. 36(4) (2023) - [c74]Xinxin Fan, Lei Xu:
Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper. BlockSys 2023: 9-12 - [c73]Rabimba Karanjai, Rowan Collier, Zhimin Gao, Lin Chen, Xinxin Fan, Taeweon Suh, Weidong Shi, Lei Xu:
Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection. BSCI 2023: 85-94 - [c72]Xinxin Fan, Zhi Zhong, Dong Guo, Qi Chai, Simone Romano:
Connecting Smart Devices to Smart Contracts with W3bstream. ICBC 2023: 1-2 - [c71]Rabimba Karanjai, Zhimin Gao, Lin Chen, Xinxin Fan, Teweon Suh, Weidong Shi, Lei Xu:
DHTee: Decentralized Infrastructure for Heterogeneous TEEs. ICBC 2023: 1-3 - [c70]Lin Liu, Xinxin Fan, Chulong Zhang, Jingjing Dai, Yaoqin Xie, Xiaokun Liang:
Three-Dimensional Medical Image Fusion with Deformable Cross-Attention. ICONIP (10) 2023: 551-563 - [c69]Mike McBride, Xinxin Fan, David Guzman:
BGP Blockchain for Metaverse - A Distributed Consensus System for BGP. MetaCom 2023: 769-774 - [c68]Mathias Brossard, Guilhem Bryant, Xinxin Fan, Alexandre Ferreira, Edmund Grimley-Evans, Christopher Haster, Derek Miller, Dominic P. Mulligan, Hugo J. M. Vincent, Shale Xiong, Lei Xu:
Privacy-Preserving Object Detection with Veracruz. PerCom Workshops 2023: 322-324 - [c67]Xinxin Fan, Lei Xu:
The 1st International Workshop on Decentralized Physical Infrastructure Networks (DePIN 2023). WF-IoT 2023: 1-2 - [i14]Rabimba Karanjai, Sangwon Shin, Xinxin Fan, Lin Chen, Tianwei Zhang, Taeweon Suh, Weidong Shi, Lei Xu:
TPU as Cryptographic Accelerator. CoRR abs/2307.06554 (2023) - [i13]Rabimba Karanjai, Rowan Collier, Zhimin Gao, Lin Chen, Xinxin Fan, Taeweon Suh, Weidong Shi, Lei Xu:
Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection. CoRR abs/2308.01474 (2023) - [i12]Lin Liu, Xinxin Fan, Haoyang Liu, Chulong Zhang, Weibin Kong, Jingjing Dai, Yuming Jiang, Yaoqin Xie, Xiaokun Liang:
QUIZ: An Arbitrary Volumetric Point Matching Method for Medical Image Registration. CoRR abs/2310.00296 (2023) - [i11]Lin Liu, Xinxin Fan, Chulong Zhang, Jingjing Dai, Yaoqin Xie, Xiaokun Liang:
Three-Dimensional Medical Image Fusion with Deformable Cross-Attention. CoRR abs/2310.06291 (2023) - [i10]Yubo Zhang, Yanfang Liu, Xinxin Fan, Yunfeng Lu:
Contrastive Prompt Learning-based Code Search based on Interaction Matrix. CoRR abs/2310.06342 (2023) - 2022
- [j23]Feimo Li, Shuaibo Li, Xinxin Fan, Xiong Li, Hongxing Chang:
Structural Attention Enhanced Continual Meta-Learning for Graph Edge Labeling Based Few-Shot Remote Sensing Scene Classification. Remote. Sens. 14(3): 485 (2022) - [c66]Quanliang Jing, Shuo Liu, Xinxin Fan, Jingwei Li, Di Yao, Baoli Wang, Jingping Bi:
Can Adversarial Training benefit Trajectory Representation?: An Investigation on Robustness for Trajectory Similarity Computation. CIKM 2022: 905-914 - [c65]Xiaokai Chu, Jiashu Zhao, Xinxin Fan, Di Yao, Zhihua Zhu, Lixin Zou, Dawei Yin, Jingping Bi:
Contrastive Disentangled Graph Convolutional Network for Weakly-Supervised Classification. DASFAA (1) 2022: 722-730 - [c64]David Guzman, Dirk Trossen, Mike McBride, Xinxin Fan:
Insights on Impact of Distributed Ledgers on Provider Networks. ICBC 2022: 3-17 - [c63]Libo Liu, Xinxin Fan, Xiaodong Zhang, Qingmao Hu:
Lightweight Dual-Domain Network for Real-Time Medical Image Segmentation. ICIP 2022: 396-400 - [c62]Baoli Wang, Xinxin Fan, Quanliang Jing, Yueyang Su, Jingwei Li, Jingping Bi:
GTAT: Adversarial Training with Generated Triplets. IJCNN 2022: 1-8 - [c61]Yubo Zhang, Yanfang Liu, Xinxin Fan, Yunfeng Lu:
RetCom: Information Retrieval-Enhanced Automatic Source-Code Summarization. QRS 2022: 948-957 - [i9]Mathias Brossard, Guilhem Bryant, Basma El Gaabouri, Xinxin Fan, Alexandre Ferreira, Edmund Grimley-Evans, Christopher Haster, Evan Johnson, Derek Miller, Fan Mo, Dominic P. Mulligan, Nick Spinale, Eric Van Hensbergen, Hugo J. M. Vincent, Shale Xiong:
Private delegated computations using strong isolation. CoRR abs/2205.03322 (2022) - 2021
- [j22]Xinxin Fan, Ling Liu, Rui Zhang, Quanliang Jing, Jingping Bi:
Decentralized Trust Management: Risk Analysis and Trust Aggregation. ACM Comput. Surv. 53(1): 2:1-2:33 (2021) - [c60]Quanliang Jing, Di Yao, Chang Gong, Xinxin Fan, Baoli Wang, Haining Tan, Jingping Bi:
TrajCross: Trajecotry Cross-Modal Retrieval with Contrastive Learning. IEEE BigData 2021: 344-349 - [c59]Xiaokai Chu, Xinxin Fan, Zhihua Zhu, Jingping Bi:
Variational Cross-Network Embedding for Anonymized User Identity Linkage. CIKM 2021: 2955-2959 - [c58]Lei Xu, Xinxin Fan, Lucas Hall, Qi Chai:
New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner. ICBC 2021: 43-58 - [c57]Wei Yang, Xinxin Fan, Yiqun Chen, Feimo Li, Hongxing Chang:
An Effective Implicit Multi-interest Interaction Network for Recommendation. ICONIP (4) 2021: 680-691 - [c56]Quanliang Jing, Di Yao, Xinxin Fan, Baoli Wang, Haining Tan, Xiangpeng Bu, Jingping Bi:
TRANSFAKE: Multi-task Transformer for Multimodal Enhanced Fake News Detection. IJCNN 2021: 1-8 - [c55]Baoli Wang, Xinxin Fan, Quanliang Jing, Haining Tan, Jingping Bi:
AdvCGAN: An Elastic and Covert Adversarial Examples Generating Framework. IJCNN 2021: 1-8 - 2020
- [j21]Lei Xu, Lin Chen, Zhimin Gao, Larry Carranco, Xinxin Fan, Nolan Shah, Nour Diallo, Weidong Shi:
Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices. IEEE Consumer Electron. Mag. 9(2): 26-33 (2020) - [j20]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi:
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Netw. 34(1): 38-46 (2020) - [c54]Seoyoung Ko, Xinxin Fan, Zhi Zhong, Qi Chai:
EMS: An Extensible and Modular Staking Architecture for Proof-of-Stake Systems. BCCA 2020: 122-128 - [c53]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Weidong Shi:
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter. BSCI 2020: 53-62 - [c52]Xinxin Fan, Qi Chai, Lei Xu, Dong Guo:
DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things. BSCI 2020: 186-191 - [c51]Zhihua Zhu, Xinxin Fan, Xiaokai Chu, Jianhui Huang, Jingping Bi:
LRHNE: A Latent-Relation Enhanced Embedding Method for Heterogeneous Information Networks. CIKM 2020: 1923-1932 - [c50]Xinxin Fan, Qi Chai, Zhi Zhong:
MULTAV: A Multi-chain Token Backed Voting Framework for Decentralized Blockchain Governance. ICBC 2020: 33-47 - [c49]Chenggang Wang, Boyang Wang, Xinxin Fan:
EcoBoost: Efficient Bootstrapping for Confidential Transactions. IEEE ICBC 2020: 1-3 - [c48]Zhihua Zhu, Xinxin Fan, Xiaokai Chu, Jingping Bi:
HGCN: A Heterogeneous Graph Convolutional Network-Based Deep Learning Model Toward Collective Classification. KDD 2020: 1161-1171 - [c47]Xinxin Fan, Zhi Zhong, Qi Chai, Dong Guo:
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. SecureComm (2) 2020: 311-323 - [c46]Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi:
Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement. TrustCom 2020: 1028-1035 - [c45]Xinxin Fan, Qi Chai, Zhefeng Li, Tian Pan:
Decentralized IoT Data Authorization with Pebble Tracker. WF-IoT 2020: 1-2
2010 – 2019
- 2019
- [j19]Xinxin Fan, Guang Gong, Berry Schoenmakers, Francesco Sica, Andrey Sidorenko:
Secure simultaneous bit extraction from Koblitz curves. Des. Codes Cryptogr. 87(1): 1-13 (2019) - [j18]Jie Wang, Jingyu Tong, Xinxin Fan, Xiaorui Ma, Qinghua Gao, Xiaoxia Huang:
A Dynamic Differential Phase Analysis Method for Wireless Sensing. IEEE Trans. Veh. Technol. 68(8): 7723-7732 (2019) - [c44]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239 - [c43]Xiaokai Chu, Xinxin Fan, Di Yao, Chen-Lin Zhang, Jianhui Huang, Jingping Bi:
Noise-Aware Network Embedding for Multiplex Network. IJCNN 2019: 1-8 - [c42]Xiaokai Chu, Xinxin Fan, Di Yao, Zhihua Zhu, Jianhui Huang, Jingping Bi:
Cross-Network Embedding for Multi-Network Alignment. WWW 2019: 273-284 - [i8]Xinxin Fan, Ling Liu, Rui Zhang, Quanliang Jing, Jingping Bi:
Decentralized Trust Management: Risk Analysis and Trust Aggregation. CoRR abs/1909.11355 (2019) - 2018
- [j17]Jinping Yu, Jingping Bi, Guoqiang Zhang, Xinxin Fan, Zhongcheng Li:
Loop-Free Rerouting of Multiple Policies With Overlaps. IEEE Commun. Lett. 22(7): 1370-1373 (2018) - [j16]Boyang Wang, Xinxin Fan:
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 15(6): 1027-1040 (2018) - [j15]Jie Wang, Yunong Zhao, Xinxin Fan, Qinghua Gao, Xiaorui Ma, Hongyu Wang:
Device-Free Identification Using Intrinsic CSI Features. IEEE Trans. Veh. Technol. 67(9): 8571-8581 (2018) - [c41]Xinxin Fan:
Scalable practical byzantine fault tolerance with short-lived signature schemes. CASCON 2018: 245-256 - [c40]Zujie Ren, Na Yun, Youhuizi Li, Jian Wan, Yuan Wang, Lihua Yu, Xinxin Fan:
How Good is Query Optimizer in Spark? CollaborateCom 2018: 595-609 - [c39]Xinxin Fan:
Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. ICBC 2018: 127-138 - [c38]Xinxin Fan, Jingping Bi:
Identification for Strategically Malicious Participants. ICWS 2018: 373-388 - [c37]Xinxin Fan, Danyang He, Jingping Bi:
Trustworthiness and Untrustworthiness Inference with Group Assignment. ICWS 2018: 389-404 - [c36]Zixuan Ding, Xinxin Fan, Jinping Yu, Jingping Bi:
Update Cost-Aware Cache Replacement for Wildcard Rules in Software-Defined Networking. ISCC 2018: 457-463 - [c35]Haining Tan, Weiqiang Tang, Xinxin Fan, Quanliang Jing, Jingping Bi:
SERL: Semantic-Path Biased Representation Learning of Heterogeneous Information Network. KSEM (1) 2018: 287-298 - [c34]Xinxin Fan, Qi Chai:
Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. MobiQuitous 2018: 482-484 - [c33]Zujie Ren, Na Yun, Weisong Shi, Youhuizi Li, Jian Wan, Lihua Yu, Xinxin Fan:
Characterizing the Effectiveness of Query Optimizer in Spark. SERVICES 2018: 41-42 - [c32]Boyang Wang, Xinxin Fan:
Lightweight Verification for Searchable Encryption. TrustCom/BigDataSE 2018: 932-937 - [i7]Xinxin Fan:
Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. CoRR abs/1806.00951 (2018) - 2017
- [j14]Xinxin Fan, Adilet Otemissov, Francesco Sica, Andrey Sidorenko:
Multiple point compression on elliptic curves. Des. Codes Cryptogr. 83(3): 565-588 (2017) - [j13]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
GroupTrust: Dependable Trust Management. IEEE Trans. Parallel Distributed Syst. 28(4): 1076-1090 (2017) - [c31]Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. INFOCOM 2017: 1-9 - [c30]Jinping Yu, Xinxin Fan, Guoqiang Zhang, Jingping Bi:
Scheduling loop-free updates for multiple policies with overlaps in software-defined networks. IPCCC 2017: 1-8 - [i6]Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A Reliable, Searchable and Privacy-Preserving e-Healthcare System for Cloud-Assisted Body Area Networks. CoRR abs/1702.03467 (2017) - 2016
- [j12]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. ACM Trans. Embed. Comput. Syst. 15(1): 1:1-1:28 (2016) - [c29]Xinxin Fan, Tim Güneysu:
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). CCS 2016: 1888-1890 - [e1]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - 2015
- [j11]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. EAI Endorsed Trans. Security Safety 2(3): e4 (2015) - [j10]Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou:
Reliable and Resilient Trust Management in Distributed Service Provision Networks. ACM Trans. Web 9(3): 14:1-14:37 (2015) - [c28]Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. CODASPY 2015: 127-129 - 2014
- [j9]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
Optimal parameters for the WG stream cipher family. Cryptogr. Commun. 6(2): 117-135 (2014) - [c27]Bo Zhu, Xinxin Fan, Guang Gong:
Loxin - A solution to password-less universal login. INFOCOM Workshops 2014: 488-493 - [i5]Bo Zhu, Xinxin Fan, Guang Gong:
Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. IACR Cryptol. ePrint Arch. 2014: 655 (2014) - 2013
- [j8]Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Cryptogr. Commun. 5(4): 277-289 (2013) - [j7]Xiaodong Chen, Mingchu Li, Xin Ma, Xinxin Fan:
Hamiltonian Connectedness in Claw-Free Graphs. Graphs Comb. 29(5): 1259-1267 (2013) - [j6]Zhenzhou Guo, Mingchu Li, Xinxin Fan:
Attribute-based ring signcryption scheme. Secur. Commun. Networks 6(6): 790-796 (2013) - [j5]Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun:
Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. Secur. Commun. Networks 6(9): 1126-1142 (2013) - [c26]Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou:
ServiceTrust: Trust Management in Service Provision Networks. IEEE SCC 2013: 272-279 - [c25]Gangqiang Yang, Xinxin Fan, Mark D. Aagaard, Guang Gong:
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs. WESS 2013: 8:1-8:10 - [c24]Xinxin Fan, Guang Gong:
Securing ZigBee smart energy profile 1.x with OpenECC library. SEGS@CCS 2013: 17-22 - [c23]Xinxin Fan, Nusa Zidaric, Mark D. Aagaard, Guang Gong:
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. TrustED@CCS 2013: 21-34 - [c22]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
On selection of optimal parameters for the WG stream cipher family. CWIT 2013: 17-21 - [c21]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. QSHINE 2013: 617-632 - [c20]Xinxin Fan, Guang Gong:
Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions. RFIDSec Asia 2013: 97-106 - 2012
- [j4]Xinxin Fan, Guang Gong:
Accelerating signature-based broadcast authentication for wireless sensor networks. Ad Hoc Networks 10(4): 723-736 (2012) - [j3]Xinxin Fan, Mingchu Li, Jianhua Ma, Yizhi Ren, Hui Zhao, Zhiyuan Su:
Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6): 1737-1750 (2012) - [c19]Xinxin Fan, Guang Gong:
LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks. ADHOCNETS 2012: 180-195 - [c18]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
EigenTrustp++: Attack resilient trust management. CollaborateCom 2012: 416-425 - [c17]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags. RFIDSec Asia 2012: 73-84 - [i4]Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations. IACR Cryptol. ePrint Arch. 2012: 681 (2012) - 2011
- [j2]Hui Zhao, Mingchu Li, Xinxin Fan:
A formal separation method of protocols to eliminate parallel attacks in virtual organization. Secur. Commun. Networks 4(12): 1461-1468 (2011) - [c16]Xinxin Fan, Guang Gong, Daniel W. Engels, Eric M. Smith:
A lightweight privacy-preserving mutual authentication protocol for RFID systems. GLOBECOM Workshops 2011: 1083-1087 - [c15]Xinxin Fan, Guang Gong, Honggang Hu:
Remedying the Hummingbird Cryptographic Algorithm. TrustCom 2011: 772-778 - [c14]Xinxin Fan, Guang Gong:
On the Security of Hummingbird-2 against Side Channel Cube Attacks. WEWoRC 2011: 18-29 - [i3]Qi Chai, Xinxin Fan, Guang Gong:
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2. IACR Cryptol. ePrint Arch. 2011: 247 (2011) - 2010
- [b1]Xinxin Fan:
Efficient Cryptographic Algorithms and Protocols for Mobile Ad Hoc Networks. University of Waterloo, Ontario, Canada, 2010 - [c13]Xinxin Fan, Guang Gong:
Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks. ADHOCNETS 2010: 328-343 - [c12]Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith:
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. Financial Cryptography Workshops 2010: 3-18 - [c11]Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks:
FPGA Implementations of the Hummingbird Cryptographic Algorithm. HOST 2010: 48-51 - [c10]Xinxin Fan, Mingchu Li, Yizhi Ren, Jianhua Ma:
Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks. UIC/ATC Workshops 2010: 358-363
2000 – 2009
- 2009
- [c9]Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels:
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. ICITST 2009: 1-7 - 2008
- [c8]Xianchao Zhang, Xinxin Fan, Xinyue Liu, Hong Yu:
A Ranking Algorithm via Changing Markov Probability Matrix Based on Distribution Factor. FSKD (5) 2008: 3-7 - [c7]Xinxin Fan, Guang Gong:
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. LCN 2008: 958-965 - [c6]Xinxin Fan, Guang Gong, David Jao:
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. Pairing 2008: 243-264 - [c5]Xinxin Fan, Guang Gong, David Jao:
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. Selected Areas in Cryptography 2008: 18-34 - 2007
- [j1]Xinxin Fan, Thomas J. Wollinger, Guang Gong:
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields. IET Inf. Secur. 1(2): 65-81 (2007) - [c4]Xinxin Fan, Guang Gong:
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. Selected Areas in Cryptography 2007: 155-172 - 2006
- [c3]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. CT-RSA 2006: 64-81 - 2005
- [c2]Xinxin Fan, Yumin Wang:
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. AINA 2005: 978-983 - [c1]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. ITCC (1) 2005: 642-647 - [i2]Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. IACR Cryptol. ePrint Arch. 2005: 228 (2005) - 2004
- [i1]Xinxin Fan, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2004: 223 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint