default search action
Qingshui Xue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Qingshui Xue, Zixuan Lu, Tianhao Zhang:
Attribute-based proxy signature scheme with dynamic strong forward security. Int. J. Sens. Networks 44(4): 214-225 (2024) - 2023
- [j5]Qingshui Xue, Zixuan Lu, Jing Han, Jiewei Cai:
Classical Communication Coset State (t,n) Threshold Quantum Digital Signature. IEEE Access 11: 115091-115109 (2023) - 2022
- [c22]Qingshui Xue, Zhang Tianhao, Sun Yue:
PBFT Algorithm for Internet of Things. ICCCS 2022: 684-689
2010 – 2019
- 2019
- [j4]Xiangwei Zheng, Yuang Zhang, Hui Zhang, Qingshui Xue:
An RBF neural network-based dynamic virtual network embedding algorithm. Concurr. Comput. Pract. Exp. 31(23) (2019) - [c21]Ju Xingzhong, Qingshui Xue, Haifeng Ma, Jiageng Chen, Zhu Haozhi:
The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment. ICCT 2019: 312-316 - 2017
- [c20]Hui Zhang, Xiangwei Zheng, Jie Tian, Qingshui Xue:
A Virtual Network Embedding Algorithm Based on RBF Neural Network. CSE/EUC (1) 2017: 393-396 - [c19]Zhen Li, Xiangwei Zheng, Yuang Zhang, Qingshui Xue:
Multi-Objective Virtual Network Embedding Algorithm Based on Global Resource Capacity. CSE/EUC (1) 2017: 647-650 - [c18]Jinli Zhong, Suguo Du, Lu Zhou, Haojin Zhu, Fan Cheng, Cailian Chen, Qingshui Xue:
Security Modeling and Analysis on Intra Vehicular Network. VTC Fall 2017: 1-5 - [c17]Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu:
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. WASA 2017: 124-135 - 2016
- [j3]Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao:
Multi-proxy multi-signature binding positioning protocol. Secur. Commun. Networks 9(16): 3868-3879 (2016) - [c16]Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia, Jingyu Cui:
A Traffic Based Lightweight Attack Detection Scheme for VoLTE. GLOBECOM 2016: 1-6 - 2015
- [c15]Qingshui Xue, Fengying Li, Guojian Ge, Jiachen Shen, Zhenfu Cao:
Position-based proxy signcryption. ICCC 2015: 1-6 - [c14]Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou:
Multi-proxy Multi-signature Binding Positioning Protocol. WASA 2015: 9-18 - 2014
- [c13]Qingshui Xue, Fengying Li, Zhenfu Cao:
Proxy multi-signature binding positioning protocol. ICCC 2014: 166-170 - [c12]Qingshui Xue, Fengying Li, Zhenfu Cao:
Positioning-Protocol-Based Digital Signature. WICON 2014: 167-172 - 2010
- [c11]Fengying Li, Qingshui Xue, Zhenfu Cao:
Some basic principles for proxy signature schemes based on ECDLP. CollaborateCom 2010: 1-5
2000 – 2009
- 2009
- [c10]Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327 - [c9]Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. MobiSec 2009: 58-70 - 2008
- [c8]Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao:
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. CollaborateCom 2008: 416-424 - 2007
- [c7]Fengying Li, Qingshui Xue, Zhenfu Cao:
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. ITNG 2007: 815-818 - 2005
- [j2]Haifeng Qian, Zhenfu Cao, Qingshui Xue:
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. Informatica 16(2): 261-274 (2005) - [c6]Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue:
Efficient Non-interactive Deniable Authentication Protocols. CIT 2005: 673-679 - 2004
- [j1]Haifeng Qian, Zhenfu Cao, Qingshui Xue:
A new threshold proxy signature scheme from bilinear pairings. Sci. China Ser. F Inf. Sci. 47(5): 612-622 (2004) - [c5]Qingshui Xue, Zhenfu Cao:
Improvement of Multi-Proxy Signature Scheme. CIT 2004: 450-455 - [c4]Qingshui Xue, Zhenfu Cao:
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. ISPA 2004: 715-724 - [c3]Qingshui Xue, Zhenfu Cao, Haifeng Qian:
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. PDCAT 2004: 662-665 - [c2]Qingshui Xue, Zhenfu Cao, Feilong Tang:
An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. PDPTA 2004: 901-907 - [c1]Feilong Tang, Minglu Li, Jian Cao, Qingshui Xue:
A Model that Coordinates Short-Lived and Long-Lived Transactions for Web Services. PDPTA 2004: 908-914
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-18 21:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint