default search action
Xiaofeng Chen 0001
Person information
- unicode name: 陈晓峰
- affiliation: Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- affiliation (former): Sun Yat-sen University, China
Other persons with the same name
- Xiaofeng Chen (aka: XiaoFeng Chen, Xiao-Feng Chen) — disambiguation page
- Xiaofeng Chen 0002 — Zhejiang University, Hangzhou, Zhejiang, China
- Xiaofeng Chen 0003 — Sichuan University, Department of Mathematics, Chengdu, China
- Xiaofeng Chen 0004 — State Key Laboratory of Information Security, Beijing, China
- Xiaofeng Chen 0005 — Hebei University, Electronic Information Engineering College, Baoding, China
- Xiaofeng Chen 0006 — University of Nebraska-Lincoln, NE, USA
- Xiaofeng Chen 0007 — Harbin Institute of Technology, School of Mechatronics Engineering, China
- Xiaofeng Chen 0008 — Northeastern University, Software College, Shenyang, China
- Xiaofeng Chen 0009 — Chongqing Jiaotong University, Department of Mathematics, China
- Xiaofeng Chen 0010 — Northwestern Polytechnical University, Xian, China
- Xiaofeng Chen 0011 — Western Washington University
- Xiaofeng Chen 0012 — Fuzhou University, College of Mathematics and Computer Science, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e16]Xiaofeng Chen, Xinyi Huang, Moti Yung:
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15215, Springer 2025, ISBN 978-981-97-8539-1 [contents] - [e15]Xiaofeng Chen, Xinyi Huang, Moti Yung:
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15216, Springer 2025, ISBN 978-981-97-8545-2 [contents] - 2024
- [j183]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j182]Chenyang Chen, Xiaoyu Zhang, Hongyi Qiu, Jian Lou, Zhengyang Liu, Xiaofeng Chen:
MaskArmor: Confidence masking-based defense mechanism for GNN against MIA. Inf. Sci. 669: 120579 (2024) - [j181]Siyi Lv, Yu Wei, Jingyu Jia, Xinhao Li, Tong Li, Zheli Liu, Xiaofeng Chen, Liang Guo:
New approach for efficient malicious multiparty private set intersection. Inf. Sci. 678: 120995 (2024) - [j180]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. IEEE Trans. Dependable Secur. Comput. 21(3): 1111-1126 (2024) - [j179]Jun Shen, Xiaofeng Chen, Xinyi Huang, Yang Xiang:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. IEEE Trans. Dependable Secur. Comput. 21(4): 2057-2067 (2024) - [j178]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. IEEE Trans. Dependable Secur. Comput. 21(4): 3469-3486 (2024) - [j177]Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. IEEE Trans. Dependable Secur. Comput. 21(4): 3917-3930 (2024) - [j176]Xiaoyu Zhang, Shen Lin, Chao Chen, Xiaofeng Chen:
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 4220-4235 (2024) - [j175]Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. IEEE Trans. Inf. Forensics Secur. 19: 2501-2516 (2024) - [j174]Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino:
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks. ACM Trans. Internet Things 5(3): 15:1-15:34 (2024) - [j173]Jianghong Wei, Meixia Miao, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - [c121]Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen:
SAME: Sample Reconstruction against Model Extraction Attacks. AAAI 2024: 19974-19982 - [c120]Yunling Wang, Shi-Feng Sun, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Dawu Gu:
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression. CCS 2024: 4658-4672 - [c119]Haoyu Tong, Xiaoyu Zhang, Yulin Jin, Jian Lou, Kai Wu, Xiaofeng Chen:
Balancing Generalization and Robustness in Adversarial Training via Steering through Clean and Adversarial Gradient Directions. ACM Multimedia 2024: 1014-1023 - [c118]Shen Lin, Xiaoyu Zhang, Willy Susilo, Xiaofeng Chen, Jun Liu:
GDR-GMA: Machine Unlearning via Direction-Rectified and Magnitude-Adjusted Gradients. ACM Multimedia 2024: 9087-9095 - [c117]Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus. USENIX Security Symposium 2024 - 2023
- [j172]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j171]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j170]Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j169]Jun Shen, Xiaofeng Chen, Jianghong Wei, Fuchun Guo, Willy Susilo:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j168]Saiyu Qi, Jianfeng Wang, Meixia Miao, Meng Zhang, Xiaofeng Chen:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. IEEE Trans. Dependable Secur. Comput. 20(1): 176-192 (2023) - [j167]Tao Jiang, Xu Yuan, Yuan Chen, Ke Cheng, Liangmin Wang, Xiaofeng Chen, Jianfeng Ma:
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(3): 2466-2483 (2023) - [j166]Jun Shen, Xiaofeng Chen, Zheli Liu, Willy Susilo:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - [j165]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xinyi Huang, Willy Susilo:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [c116]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c115]Yamin Li, Jianghong Wei, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions. ASIACRYPT (5) 2023: 134-165 - [c114]Shen Lin, Xiaoyu Zhang, Chenyang Chen, Xiaofeng Chen, Willy Susilo:
ERM-KTP: Knowledge-Level Machine Unlearning via Knowledge Transfer. CVPR 2023: 20147-20155 - [c113]Yulin Jin, Xiaoyu Zhang, Jian Lou, Xu Ma, Zilong Wang, Xiaofeng Chen:
Explaining Adversarial Robustness of Neural Networks from Clustering Effect Perspective. ICCV 2023: 4499-4508 - [c112]Yulin Jin, Xiaoyu Zhang, Jian Lou, Xiaofeng Chen:
ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing. ACM Multimedia 2023: 5410-5418 - [c111]Ding Wang, Yunkai Zou, Yuan-an Xiao, Siqi Ma, Xiaofeng Chen:
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. USENIX Security Symposium 2023: 983-1000 - [e14]Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen:
Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14252, Springer 2023, ISBN 978-981-99-7355-2 [contents] - [i24]Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen:
SAME: Sample Reconstruction against Model Extraction Attacks. CoRR abs/2312.10578 (2023) - [i23]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - [i22]Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study. IACR Cryptol. ePrint Arch. 2023: 1764 (2023) - 2022
- [b2]Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li:
Privacy-Preserving Machine Learning. Springer 2022, ISBN 978-981-16-9138-6, pp. 1-88 - [j164]Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen, Willy Susilo:
Lattice-based group encryptions with only one trapdoor. Sci. China Inf. Sci. 65(5): 1-18 (2022) - [j163]Yanmei Cao, Jianghong Wei, Fangguo Zhang, Yang Xiang, Xiaofeng Chen:
Efficient public-key authenticated deniable encryption schemes. Comput. Stand. Interfaces 82: 103620 (2022) - [j162]Xiaofeng Chen, Guohua Wang, Haopeng Ren, Yi Cai, Ho-fung Leung, Tao Wang:
Task-Adaptive Feature Fusion for Generalized Few-Shot Relation Classification in an Open World Environment. IEEE ACM Trans. Audio Speech Lang. Process. 30: 1003-1015 (2022) - [j161]Jian Shen, Ziyuan Gui, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1464-1475 (2022) - [j160]Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Wei Wei:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. IEEE Trans. Dependable Secur. Comput. 19(3): 1505-1517 (2022) - [j159]Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi:
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 2122-2137 (2022) - [j158]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. IEEE Trans. Dependable Secur. Comput. 19(4): 2318-2332 (2022) - [j157]Guohua Tian, Yunhan Hu, Jianghong Wei, Zheli Liu, Xinyi Huang, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [j156]Xu Ma, Xiaoqian Sun, Yuduo Wu, Zheli Liu, Xiaofeng Chen, Changyu Dong:
Differentially Private Byzantine-Robust Federated Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3690-3701 (2022) - [j155]Haoran Yuan, Xiaofeng Chen, Jin Li, Tao Jiang, Jianfeng Wang, Robert H. Deng:
Secure Cloud Data Deduplication with Efficient Re-Encryption. IEEE Trans. Serv. Comput. 15(1): 442-456 (2022) - [j154]Yunling Wang, Shifeng Sun, Jianfeng Wang, Joseph K. Liu, Xiaofeng Chen:
Achieving Searchable Encryption Scheme With Search Pattern Hidden. IEEE Trans. Serv. Comput. 15(2): 1012-1025 (2022) - [j153]Jian Shen, Tiantian Miao, Jin-Feng Lai, Xiaofeng Chen, Jin Li, Shui Yu:
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems. IEEE Trans. Serv. Comput. 15(3): 1707-1719 (2022) - [c110]Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen:
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. CCS 2022: 2825-2839 - [c109]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. ESORICS (1) 2022: 346-366 - [c108]Yi Xie, Mengdie Huang, Xiaoyu Zhang, Changyu Dong, Willy Susilo, Xiaofeng Chen:
GAME: Generative-Based Adaptive Model Extraction Attack. ESORICS (1) 2022: 570-588 - [c107]Xiaoyu Zhang, Yulin Jin, Tao Wang, Jian Lou, Xiaofeng Chen:
Purifier: Plug-and-play Backdoor Mitigation for Pre-trained Models Via Anomaly Activation Suppression. ACM Multimedia 2022: 4291-4299 - [c106]Wei Li, Xiaoyu Zhang, Shen Lin, Xinbo Ban, Xiaofeng Chen:
Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification. WISA 2022: 344-356 - [e13]Xiaofeng Chen, Jian Shen, Willy Susilo:
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings. Lecture Notes in Computer Science 13547, Springer 2022, ISBN 978-3-031-18066-8 [contents] - [e12]Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1 [contents] - [e11]Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6 [contents] - [i21]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. IACR Cryptol. ePrint Arch. 2022: 1028 (2022) - 2021
- [j152]Xu Ma, Chen Wang, Xiaofeng Chen:
Trusted data sharing with flexible access control based on blockchain. Comput. Stand. Interfaces 78: 103543 (2021) - [j151]Saiyu Qi, Youshui Lu, Wei Wei, Xiaofeng Chen:
Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT. IEEE Internet Things J. 8(4): 2886-2899 (2021) - [j150]Xiaoyu Zhang, Xiaofeng Chen, Hongyang Yan, Yang Xiang:
Privacy-preserving and verifiable online crowdsourcing with worker updates. Inf. Sci. 548: 212-232 (2021) - [j149]Jianghong Wei, Xiaofeng Chen, Xinyi Huang, Xuexian Hu, Willy Susilo:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 18(5): 2301-2315 (2021) - [j148]Lingling Xu, Xiaofeng Chen, Fangguo Zhang, Wanhua Li, Hao-Tian Wu, Shaohua Tang, Yang Xiang:
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records. IEEE Trans. Dependable Secur. Comput. 18(6): 2941-2952 (2021) - [j147]Tong Li, Jin Li, Xiaofeng Chen, Zheli Liu, Wenjing Lou, Y. Thomas Hou:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. IEEE Trans. Dependable Secur. Comput. 18(6): 2969-2982 (2021) - [j146]Saiyu Qi, Youshui Lu, Yuanqing Zheng, Yumo Li, Xiaofeng Chen:
Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain. IEEE Trans. Ind. Informatics 17(4): 2376-2387 (2021) - [j145]Xianmin Wang, Xiaohui Kuang, Jin Li, Jing Li, Xiaofeng Chen, Zheli Liu:
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching. IEEE Trans. Intell. Transp. Syst. 22(7): 4359-4366 (2021) - [j144]Xiaofeng Chen, Hui Li, Jin Li, Qian Wang, Xinyi Huang, Willy Susilo, Yang Xiang:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j143]Jianghong Wei, Xiaofeng Chen, Jianfeng Ma, Xuexian Hu, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. IEEE/ACM Trans. Netw. 29(5): 2242-2253 (2021) - [c105]Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Forward-Secure Group Encryptions from Lattices. ACISP 2021: 610-629 - [c104]Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. ASIACRYPT (4) 2021: 156-186 - [c103]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Efficient Multi-client Order-Revealing Encryption and Its Applications. ESORICS (2) 2021: 44-63 - [c102]Jianghong Wei, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Protocol with Data Auditing. ESORICS (2) 2021: 296-312 - [c101]Haoran Yuan, Xiaofeng Chen, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert H. Deng:
Efficient and Verifiable Proof of Replication with Fast Fault Localization. INFOCOM 2021: 1-10 - [i20]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications. CoRR abs/2105.05525 (2021) - [i19]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey. CoRR abs/2105.06300 (2021) - 2020
- [j142]Hui Huang, Xiaofeng Chen, Jianfeng Wang:
Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Inf. Sci. 63(3) (2020) - [j141]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Jian Shen:
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. Future Gener. Comput. Syst. 108: 1338-1349 (2020) - [j140]Chun-Hui Wu, Xiaofeng Chen, Willy Susilo:
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets. Int. J. Inf. Sec. 19(4): 453-464 (2020) - [j139]Yuexin Zhang, Xinyi Huang, Xiaofeng Chen, Leo Yu Zhang, Jun Zhang, Yang Xiang:
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle. IEEE Internet Things J. 7(2): 1061-1071 (2020) - [j138]Ruonan Chen, Yannan Li, Yong Yu, Huilin Li, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Dynamic Provable Data Possession for Smart Cities. IEEE Internet Things J. 7(5): 4143-4154 (2020) - [j137]Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo:
Blockchain-based public auditing and secure deduplication with fair arbitration. Inf. Sci. 541: 409-425 (2020) - [j136]Xu Ma, Cunmei Ji, Xiaoyu Zhang, Jianfeng Wang, Jin Li, Kuan-Ching Li, Xiaofeng Chen:
Secure multiparty learning from the aggregation of locally trained models. J. Netw. Comput. Appl. 167: 102754 (2020) - [j135]Hong Zhao, Zhi-Hui Zhan, Ying Lin, Xiaofeng Chen, Xiaonan Luo, Jie Zhang, Sam Kwong, Jun Zhang:
Local Binary Pattern-Based Adaptive Differential Evolution for Multimodal Optimization Problems. IEEE Trans. Cybern. 50(7): 3343-3357 (2020) - [j134]Xiaoyu Zhang, Xiaofeng Chen, Joseph K. Liu, Yang Xiang:
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Trans. Ind. Informatics 16(3): 2081-2090 (2020) - [j133]Karl Andersson, Xiaofeng Chen, Christian Esposito, Eric Rondeau:
Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 1). IEEE Trans. Sustain. Comput. 5(2): 160 (2020) - [j132]Karl Andersson, Xiaofeng Chen, Christian Esposito, Eric Rondeau:
Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 2). IEEE Trans. Sustain. Comput. 5(2): 235 (2020) - [j131]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, Pandi Vijayakumar:
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. IEEE Trans. Veh. Technol. 69(1): 807-817 (2020) - [c100]Haopeng Ren, Yi Cai, Xiaofeng Chen, Guohua Wang, Qing Li:
A Two-phase Prototypical Network Model for Incremental Few-shot Relation Classification. COLING 2020: 1618-1629 - [c99]Weiguo Wang, Hui Li, Yanguo Peng, Sourav S. Bhowmick, Peng Chen, Xiaofeng Chen, Jiangtao Cui:
SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud. DASFAA (3) 2020: 288-305 - [c98]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer. ESORICS (1) 2020: 611-631 - [c97]Yanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen:
New Practical Public-Key Deniable Encryption. ICICS 2020: 147-163 - [e10]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12486, Springer 2020, ISBN 978-3-030-62222-0 [contents] - [e9]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12487, Springer 2020, ISBN 978-3-030-62459-0 [contents] - [e8]Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12488, Springer 2020, ISBN 978-3-030-62462-0 [contents] - [i18]Weiguo Wang, Hui Li, Yanguo Peng, Sourav S. Bhowmick, Peng Chen, Xiaofeng Chen, Jiangtao Cui:
An Efficient Secure Dynamic Skyline Query Model. CoRR abs/2002.07511 (2020) - [i17]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version). IACR Cryptol. ePrint Arch. 2020: 1468 (2020)
2010 – 2019
- 2019
- [j130]Yunling Wang, Jianfeng Wang, Shifeng Sun, Meixia Miao, Xiaofeng Chen:
Toward Forward Secure SSE Supporting Conjunctive Keyword Search. IEEE Access 7: 142762-142772 (2019) - [j129]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Xiaoling Tao:
New efficient constructions of verifiable data streaming with accountability. Ann. des Télécommunications 74(7-8): 483-499 (2019) - [j128]Ming Zeng, Kai Zhang, Haifeng Qian, Xiaofeng Chen, Jie Chen:
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications. Comput. J. 62(4): 563-578 (2019) - [j127]Hui Huang, Kuan-Ching Li, Xiaofeng Chen:
Blockchain-based fair three-party contract signing protocol for fog computing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j126]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. Int. J. Inf. Sec. 18(2): 181-197 (2019) - [j125]Yuexin Zhang, Hong Zhao, Yang Xiang, Xinyi Huang, Xiaofeng Chen:
A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem. IEEE Internet Things J. 6(6): 10251-10260 (2019) - [j124]Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Aniello Castiglione, Xiaofeng Chen:
New publicly verifiable computation for batch matrix multiplication. Inf. Sci. 479: 664-678 (2019) - [j123]Xu Ma, Xiaofeng Chen, Xiaoyu Zhang:
Non-interactive privacy-preserving neural network prediction. Inf. Sci. 481: 507-519 (2019) - [j122]Fei Zhu, Wei Wu, Yuexin Zhang, Xiaofeng Chen:
Privacy-preserving authentication for general directed graphs in industrial IoT. Inf. Sci. 502: 218-228 (2019) - [j121]Yinyuan Zhao, Haoran Yuan, Tao Jiang, Xiaofeng Chen:
Secure distributed data geolocation scheme against location forgery attack. J. Inf. Secur. Appl. 47: 50-58 (2019) - [j120]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:
HVDB: a hierarchical verifiable database scheme with scalable updates. J. Ambient Intell. Humaniz. Comput. 10(8): 3045-3057 (2019) - [j119]Lingling Xu, Jin Li, Xiaofeng Chen, Wanhua Li, Shaohua Tang, Hao-Tian Wu:
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J. Netw. Comput. Appl. 128: 11-20 (2019) - [j118]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. J. Univers. Comput. Sci. 25(3): 222-244 (2019) - [j117]Zong-Gan Chen, Zhi-Hui Zhan, Ying Lin, Yue-Jiao Gong, Tianlong Gu, Feng Zhao, Huaqiang Yuan, Xiaofeng Chen, Qing Li, Jun Zhang:
Multiobjective Cloud Workflow Scheduling: A Multiple Populations Ant Colony System Approach. IEEE Trans. Cybern. 49(8): 2912-2926 (2019) - [j116]Xueqin Liang, Zheng Yan, Xiaofeng Chen, Laurence T. Yang, Wenjing Lou, Y. Thomas Hou:
Game Theoretical Analysis on Encrypted Cloud Data Deduplication. IEEE Trans. Ind. Informatics 15(10): 5778-5789 (2019) - [j115]Jin Li, Tong Li, Zheli Liu, Xiaofeng Chen:
Secure Deduplication System with Active Key Update and Its Application in IoT. ACM Trans. Intell. Syst. Technol. 10(6): 69:1-69:21 (2019) - [j114]Derek Wang, Tingmin Wu, Sheng Wen, Xiaofeng Chen, Yang Xiang, Wanlei Zhou:
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation. IEEE Trans. Sustain. Comput. 4(2): 178-190 (2019) - [c96]Miroslaw Kutylowski, Lukasz Krzywiecki, Xiaofeng Chen:
Rethinking Identification Protocols from the Point of View of the GDPR. CSCML 2019: 296-315 - [c95]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails. ESORICS (2) 2019: 134-150 - [c94]Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen:
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption. ESORICS (2) 2019: 304-321 - [e7]Kuan-Ching Li, Xiaofeng Chen, Willy Susilo:
Advances in Cyber Security: Principles, Techniques, and Applications. Springer 2019, ISBN 978-981-13-1482-7 [contents] - [e6]Xiaofeng Chen, Xinyi Huang, Jun Zhang:
Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings. Lecture Notes in Computer Science 11806, Springer 2019, ISBN 978-3-030-30618-2 [contents] - 2018
- [j113]Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang:
Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72: 1-12 (2018) - [j112]Hui Huang, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78: 850-858 (2018) - [j111]Ping Li, Tong Li, Heng Ye, Jin Li, Xiaofeng Chen, Yang Xiang:
Privacy-preserving machine learning with multiple data providers. Future Gener. Comput. Syst. 87: 341-350 (2018) - [j110]Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:
Comparable encryption scheme supporting multiple users in cloud computing. Int. J. High Perform. Comput. Netw. 11(1): 24-33 (2018) - [j109]Yuexin Zhang, Yang Xiang, Xinyi Huang, Xiaofeng Chen, Abdulhameed Alelaiwi:
A matrix-based cross-layer key establishment protocol for smart homes. Inf. Sci. 429: 390-405 (2018) - [j108]Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, Zhi-Hui Zhan:
Secure data uploading scheme for a smart home system. Inf. Sci. 453: 186-197 (2018) - [j107]Haoran Yuan, Xiaofeng Chen, Tao Jiang, Xiaoyu Zhang, Zheng Yan, Yang Xiang:
DedupDUM: Secure and scalable data deduplication with dynamic user management. Inf. Sci. 456: 159-173 (2018) - [j106]Xu Ma, Fangguo Zhang, Xiaofeng Chen, Jian Shen:
Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf. Sci. 459: 103-116 (2018) - [j105]Changsong Yang, Xiaofeng Chen, Yang Xiang:
Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103: 185-193 (2018) - [j104]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j103]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Jungang Lou:
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures. Peer-to-Peer Netw. Appl. 11(2): 235-251 (2018) - [j102]Xiaoyu Zhang, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan, Jin Li:
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing. Soft Comput. 22(23): 7719-7732 (2018) - [j101]Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo:
Anonymous and Traceable Group Data Sharing in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(4): 912-925 (2018) - [j100]Qian Wang, Minxin Du, Xiuying Chen, Yanjiao Chen, Pan Zhou, Xiaofeng Chen, Xinyi Huang:
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training. IEEE Trans. Knowl. Data Eng. 30(12): 2381-2393 (2018) - [c93]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c92]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CCS 2018: 1775-1787 - [c91]Haibo Tian, Xiaofeng Chen, Yong Ding, Xiaoyan Zhu, Fangguo Zhang:
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model. Inscrypt 2018: 70-85 - [c90]Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. ESORICS (2) 2018: 83-100 - [c89]Maozhen Liu, Chao Yang, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7 - [c88]Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen:
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. ICICS 2018: 445-458 - [c87]Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen:
An Almost Non-interactive Order Preserving Encryption Scheme. ISPEC 2018: 87-100 - [e5]Xiaofeng Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10726, Springer 2018, ISBN 978-3-319-75159-7 [contents] - [i16]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CoRR abs/1810.02242 (2018) - 2017
- [j99]Jianfeng Wang, Xiaofeng Chen, Jin Li, Jiaolian Zhao, Jian Shen:
Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener. Comput. Syst. 67: 266-275 (2017) - [j98]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3): 270-289 (2017) - [j97]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379: 42-61 (2017) - [j96]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Towards privacy protection and malicious behavior traceability in smart health. Pers. Ubiquitous Comput. 21(5): 815-830 (2017) - [j95]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst. J. 11(2): 439-448 (2017) - [j94]Qin Zou, Jianfeng Wang, Jun Ye, Jian Shen, Xiaofeng Chen:
Efficient and secure encrypted image search in mobile cloud computing. Soft Comput. 21(11): 2959-2969 (2017) - [j93]Baojiang Cui, Fuwei Wang, Yongle Hao, Xiaofeng Chen:
WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework. Soft Comput. 21(12): 3401-3414 (2017) - [j92]Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. ACM Trans. Embed. Comput. Syst. 16(2): 57:1-57:20 (2017) - [j91]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - [j90]Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. IEEE Trans. Inf. Forensics Secur. 12(10): 2402-2415 (2017) - [c86]Hui Huang, Kuan-Ching Li, Xiaofeng Chen:
A Fair Three-Party Contract Singing Protocol Based on Blockchain. CSS 2017: 72-85 - [c85]Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Xiaofeng Chen:
New Publicly Verifiable Computation for Batch Matrix Multiplication. GPC 2017: 53-65 - [c84]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
A client-based secure deduplication of multimedia data. ICC 2017: 1-6 - [c83]Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi:
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. ICDCS 2017: 414-424 - [c82]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Jianfeng Ma, Yang Xiang:
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization. ISPA/IUCC 2017: 1212-1216 - [c81]Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li:
TTP-free Fair Exchange of Digital Signatures with Bitcoin. ISPEC 2017: 62-81 - [c80]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. ProvSec 2017: 24-38 - 2016
- [b1]Xiaofeng Chen:
Introduction to Secure Outsourcing Computation. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01220-4, pp. 1-93 - [j89]Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaofeng Chen:
Design and analysis of secure mechanisms based on tripartite credibility for RFID systems. Comput. Stand. Interfaces 44: 110-116 (2016) - [j88]Jianfeng Wang, Xiaofeng Chen:
Efficient and Secure Storage for Outsourced Data: A Survey. Data Sci. Eng. 1(3): 178-188 (2016) - [j87]Jun Ye, Xiaofeng Chen, Jianfeng Ma:
Improved algorithm for secure outsourcing of modular exponentiations with high checkability. Int. J. Ad Hoc Ubiquitous Comput. 23(3/4): 182-191 (2016) - [j86]Zheli Liu, Dejiang Luo, Jin Li, Xiaofeng Chen, Chunfu Jia:
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2): 384-400 (2016) - [j85]Liang Liu, Xiaofeng Chen, Wenjing Lou:
Secure three-party computational protocols for triangle area. Int. J. Inf. Sec. 15(1): 1-13 (2016) - [j84]Yunling Wang, Jianfeng Wang, Xiaofeng Chen:
Secure searchable encryption: a survey. J. Commun. Inf. Networks 1(4): 52-65 (2016) - [j83]Zheli Liu, Xiaofeng Chen, Jun Yang, Chunfu Jia, Ilsun You:
New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59: 198-207 (2016) - [j82]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Efficient attribute-based data sharing in mobile clouds. Pervasive Mob. Comput. 28: 135-149 (2016) - [j81]Yinghui Zhang, Jin Li, Xiaofeng Chen, Hui Li:
Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Networks 9(14): 2397-2411 (2016) - [j80]Jianfeng Wang, Meixia Miao, Yaqian Gao, Xiaofeng Chen:
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11): 4487-4495 (2016) - [j79]Peng Chen, Jun Ye, Xiaofeng Chen:
Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput. 20(11): 4589-4596 (2016) - [j78]Tao Jiang, Xiaofeng Chen, Jianfeng Ma:
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation. IEEE Trans. Computers 65(8): 2363-2373 (2016) - [j77]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. IEEE Trans. Computers 65(10): 3184-3195 (2016) - [c79]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - [c78]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524 - [c77]Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. BWCCA 2016: 799-805 - [c76]Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. Mycrypt 2016: 252-274 - [c75]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. NSS 2016: 21-36 - [e4]Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9 [contents] - 2015
- [j76]Qiang Tang, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. Comput. J. 58(4): 724-734 (2015) - [j75]Leonard Barolli, Xiaofeng Chen, Fatos Xhafa:
Advances on cloud services and cloud computing. Concurr. Comput. Pract. Exp. 27(8): 1985-1987 (2015) - [j74]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
Towards secure and reliable cloud storage against data re-outsourcing. Future Gener. Comput. Syst. 52: 86-94 (2015) - [j73]Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng, Adama Diene, Xiaofeng Chen:
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing. Future Gener. Comput. Syst. 52: 116-124 (2015) - [j72]Yansheng Feng, Hua Ma, Xiaofeng Chen:
Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons. Intell. Autom. Soft Comput. 21(1): 51-63 (2015) - [j71]Jin Li, Xiaofeng Chen, Xinyi Huang:
New attribute-based authentication and its application in anonymous cloud access service. Int. J. Web Grid Serv. 11(1): 125-141 (2015) - [j70]Fatos Xhafa, Xiaofeng Chen, Leonard Barolli:
Editorial preface for the special issue "Advances in security, privacy and trust technologies". J. Ambient Intell. Humaniz. Comput. 6(5): 531-532 (2015) - [j69]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. J. Comput. Secur. 23(6): 659-683 (2015) - [j68]Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:
Secure deduplication storage systems supporting keyword search. J. Comput. Syst. Sci. 81(8): 1532-1541 (2015) - [j67]Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong:
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79: 18-26 (2015) - [j66]Hui Zhu, Yingfang Xue, Xiaofeng Chen, Qiang Li, Hui Li:
V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service. Mob. Inf. Syst. 2015: 841292:1-841292:9 (2015) - [j65]Fatos Xhafa, Jingwei Li, Gansen Zhao, Jin Li, Xiaofeng Chen, Duncan S. Wong:
Designing cloud-based electronic health record system with attribute-based encryption. Multim. Tools Appl. 74(10): 3441-3458 (2015) - [j64]Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen:
Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24: 129-137 (2015) - [j63]Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Secur. Commun. Networks 8(18): 3690-3700 (2015) - [j62]Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou:
Identity-Based Encryption with Outsourced Revocation in Cloud Computing. IEEE Trans. Computers 64(2): 425-437 (2015) - [j61]Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. IEEE Trans. Computers 64(11): 3293-3303 (2015) - [j60]Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. IEEE Trans. Computers 64(12): 3569-3579 (2015) - [j59]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa:
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Trans. Cloud Comput. 3(2): 195-205 (2015) - [j58]Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [j57]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Secur. Comput. 12(5): 546-556 (2015) - [j56]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j55]Fatos Xhafa, Jianglang Feng, Yinghui Zhang, Xiaofeng Chen, Jin Li:
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5): 1607-1619 (2015) - [j54]Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou:
A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans. Parallel Distributed Syst. 26(5): 1206-1216 (2015) - [c74]Baojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen:
Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems. AINA Workshops 2015: 17-21 - [c73]Jun Ye, Xiaofeng Chen, Jianfeng Ma:
An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. AINA Workshops 2015: 73-76 - [c72]Peng Chen, Jun Ye, Xiaofeng Chen:
A New Efficient Request-Based Comparable Encryption Scheme. AINA Workshops 2015: 436-439 - [c71]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c70]Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:
Request-Based Comparable Encryption Scheme with Multiple Users. BWCCA 2015: 414-416 - [c69]Yixiao Zhu, Liang Liu, Xiaofeng Chen:
Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption. BWCCA 2015: 417-421 - [c68]Jianfeng Wang, Xiaofeng Chen, Jin Li:
Verifiable Search for Dynamic Outsourced Database in Cloud Computing. BWCCA 2015: 568-571 - [c67]Qin Zou, Jianfeng Wang, Xiaofeng Chen:
Secure Encrypted Image Search in Mobile Cloud Computing. BWCCA 2015: 572-575 - [c66]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou:
Group-oriented Proofs of Storage. AsiaCCS 2015: 73-84 - [c65]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen:
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. ESORICS (2) 2015: 252-269 - [c64]Xiaofeng Chen, Defu Zhang, Xiangxiang Zeng:
A Stable Matching-Based Selection and Memory Enhanced MOEA/D for Evolutionary Dynamic Multiobjective Optimization. ICTAI 2015: 478-485 - [c63]Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen:
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. ProvSec 2015: 215-226 - 2014
- [j53]Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang:
Ticket-based handoff authentication for wireless mesh networks. Comput. Networks 73: 185-194 (2014) - [j52]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li:
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Comput. Networks 75: 192-211 (2014) - [j51]Fatos Xhafa, Xiaofeng Chen, Xinyi Huang, Vladi Kolici:
Advances in secure and intelligent data processing. Concurr. Comput. Pract. Exp. 26(5): 1021-1022 (2014) - [j50]Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and robust identity-based handoff authentication for EAP-based wireless networks. Concurr. Comput. Pract. Exp. 26(8): 1561-1573 (2014) - [j49]Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30: 98-106 (2014) - [j48]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j47]Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong:
Digital provenance: Enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37: 259-266 (2014) - [j46]Yuan Chen, Xiaofeng Chen, Hui Li:
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure. Int. J. Grid Util. Comput. 5(1): 60-70 (2014) - [j45]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. Inf. Sci. 265: 198-210 (2014) - [j44]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. KSII Trans. Internet Inf. Syst. 8(11): 4028-4049 (2014) - [j43]Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. J. Internet Serv. Inf. Secur. 4(1): 25-36 (2014) - [j42]Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause:
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18(9): 1795-1802 (2014) - [j41]Haibo Tian, Xiaofeng Chen, Willy Susilo:
Deniability and forward secrecy of one-round authenticated key exchange. J. Supercomput. 67(3): 671-690 (2014) - [j40]Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak:
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Trans. Parallel Distributed Syst. 25(2): 332-342 (2014) - [j39]Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, Wenjing Lou:
Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distributed Syst. 25(6): 1615-1625 (2014) - [j38]Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu:
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(7): 1767-1775 (2014) - [j37]Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang:
Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distributed Syst. 25(8): 2201-2210 (2014) - [j36]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9): 2386-2396 (2014) - [j35]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distributed Syst. 25(12): 3285-3294 (2014) - [c62]Liang Liu, Xiaofeng Chen, Wenjing Lou:
A Secure Three-Party Computational Protocol for Triangle Area. ACISP 2014: 82-97 - [c61]Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia:
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. ACISP 2014: 115-130 - [c60]Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou:
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. AINA 2014: 591-596 - [c59]Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli:
Secure Deduplication Storage Systems with Keyword Search. AINA 2014: 971-977 - [c58]Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen:
Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution. BWCCA 2014: 572-577 - [c57]Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen:
Secure Approximate Nearest Neighbor Search over Encrypted Data. BWCCA 2014: 578-583 - [c56]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162 - [c55]Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma:
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. ICT-EurAsia 2014: 612-621 - [c54]Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen:
An Effective Cloud-Based Active Defense System against Malicious Codes. ICT-EurAsia 2014: 690-695 - [c53]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358 - [c52]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273 - [e3]Leonard Barolli, Fatos Xhafa, Xiaofeng Chen, Makoto Ikeda:
Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2014, Guangdong, China, November 8-10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4173-5 [contents] - 2013
- [j34]Jin Li, Xiaofeng Chen:
Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing. Comput. Informatics 32(4): 723-738 (2013) - [j33]Haibo Tian, Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Selectively unforgeable but existentially forgeable signature schemes and applications. Sci. China Inf. Sci. 56(1): 1-14 (2013) - [j32]Yinghui Zhang, Xiaofeng Chen, Hui Li:
Key-Evolving Hierarchical ID-Based Signcryption. Comput. J. 56(10): 1228-1248 (2013) - [j31]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - [j30]Fei Yan, Xiaofeng Chen, Yinghui Zhang:
Efficient online/offline signcryption without key exposure. Int. J. Grid Util. Comput. 4(1): 85-93 (2013) - [j29]Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu:
Security Analysis of a Suite of Deniable Authentication Protocols. Int. J. Netw. Secur. 15(5): 384-389 (2013) - [j28]Jun Ye, Xiaofeng Chen, Jianfeng Ma:
Constructing Verifiable Random Number in Finite Field. J. Internet Serv. Inf. Secur. 3(3/4): 106-115 (2013) - [j27]Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing. J. Univers. Comput. Sci. 19(16): 2349-2367 (2013) - [j26]Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5-6): 1289-1300 (2013) - [c51]Zheli Liu, Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia:
New Privacy-Preserving Location Sharing System for Mobile Online Social Networks. 3PGCIC 2013: 214-218 - [c50]Qiang Tang, Xiaofeng Chen:
Towards asymmetric searchable encryption with message recovery and flexible search authorization. AsiaCCS 2013: 253-264 - [c49]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. AsiaCCS 2013: 511-516 - [c48]Jin Li, Dongqing Xie, Xiaofeng Chen:
Server-Aided Hierarchical Identity-Based Encryption. EIDWT 2013: 643-647 - [c47]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ESORICS 2013: 592-609 - [c46]Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu:
Secure and Verifiable Outsourcing of Sequence Comparisons. ICT-EurAsia 2013: 243-252 - [c45]Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. ICT-EurAsia 2013: 373-382 - [c44]Hui Zhu, Yingfang Xue, Yun Zhang, Xiaofeng Chen, Hui Li, Ximeng Liu:
V-MLR: A Multilevel Security Model for Virtualization. INCoS 2013: 9-16 - [c43]Hui Zhu, Siyu Chen, Lexiang Zhu, Hui Li, Xiaofeng Chen:
RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree. INCoS 2013: 17-22 - [c42]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. INCoS 2013: 38-45 - [c41]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong:
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. INCoS 2013: 93-98 - 2012
- [j25]Chun-Hui Wu, Xiaofeng Chen, Qin Li, Dongyang Long:
Efficient ID-based non-malleable trapdoor commitment. Comput. Electr. Eng. 38(6): 1647-1657 (2012) - [j24]Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong:
Generic security-amplifying methods of ordinary digital signatures. Inf. Sci. 201: 128-139 (2012) - [j23]Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. J. Internet Serv. Inf. Secur. 2(1/2): 49-58 (2012) - [j22]Yuanjie Zhao, Xiaofeng Chen, Hua Ma, Qiang Tang, Hui Zhu:
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 72-81 (2012) - [j21]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012) - [j20]Yinghui Zhang, Xiaofeng Chen, H. Li, J. Cao:
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur. Commun. Networks 5(10): 1121-1130 (2012) - [j19]Xiaofeng Chen, Jin Li, Willy Susilo:
Efficient Fair Conditional Payments for Outsourcing Computations. IEEE Trans. Inf. Forensics Secur. 7(6): 1687-1694 (2012) - [c40]Haibo Tian, Xiaofeng Chen, Jin Li:
A Short Non-delegatable Strong Designated Verifier Signature. ACISP 2012: 261-279 - [c39]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556 - [c38]Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen:
Outsourcing Encryption of Attribute-Based Encryption with MapReduce. ICICS 2012: 191-201 - [c37]Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability. IMIS 2012: 81-88 - [c36]Yuan Chen, Xiaofeng Chen, Hui Li:
DCCA-Secure Public-Key Encryptions from Hybrid Paradigms. INCoS 2012: 264-269 - [c35]Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. NSS 2012: 180-191 - [c34]Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu:
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. NSS 2012: 490-502 - [e2]Fatos Xhafa, Leonard Barolli, Florin Pop, Xiaofeng Chen, Valentin Cristea:
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012. IEEE 2012, ISBN 978-1-4673-2279-9 [contents] - [i15]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo:
Secure Outsourced Attribute-Based Signatures. IACR Cryptol. ePrint Arch. 2012: 605 (2012) - [i14]Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma:
Refine the Concept of Public Key Encryption with Delegated Search. IACR Cryptol. ePrint Arch. 2012: 654 (2012) - 2011
- [j18]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. Comput. Electr. Eng. 37(4): 614-623 (2011) - [j17]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - [j16]Xiaofeng Chen:
Provable Security. J. Internet Serv. Inf. Secur. 1(2/3): 1-3 (2011) - [j15]Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li:
Identity-based trapdoor mercurial commitments and applications. Theor. Comput. Sci. 412(39): 5498-5512 (2011) - [c33]Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie:
Multi-authority ciphertext-policy attribute-based encryption with accountability. AsiaCCS 2011: 386-390 - [c32]Haibo Tian, Xiaofeng Chen, Zhengtao Jiang:
Non-interactive Deniable Authentication Protocols. Inscrypt 2011: 142-159 - [c31]Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du:
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. ICISC 2011: 219-234 - [e1]Xavier Boyen, Xiaofeng Chen:
Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings. Lecture Notes in Computer Science 6980, Springer 2011, ISBN 978-3-642-24315-8 [contents] - 2010
- [j14]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
Efficient Online/Offline Signcryption Scheme. Intell. Autom. Soft Comput. 16(3): 449-459 (2010) - [c30]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. ACISP 2010: 200-215 - [c29]Xiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding:
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. Inscrypt 2010: 415-426 - [c28]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang:
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. CloudCom 2010: 89-96 - [c27]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311
2000 – 2009
- 2009
- [j13]Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu:
Identity-based Universal Designated Verifier Signature Proof System. Int. J. Netw. Secur. 8(1): 52-58 (2009) - [j12]Haibo Tian, Xiaofeng Chen, Yong Ding:
Analysis of Two Types Deniable Authentication Protocols. Int. J. Netw. Secur. 9(3): 242-246 (2009) - [j11]Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. Inf. Process. Lett. 109(15): 846-849 (2009) - [j10]Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim:
The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009) - [c26]Hua Liu, Xiaofeng Chen, Changren Zhou, Hong Li:
Basic Properties of Calcium Phosphate Cement Containing Chitosan in its Liquid Phase. BMEI 2009: 1-3 - [c25]Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen:
ID-Based Adaptive Oblivious Transfer. WISA 2009: 133-147 - [i13]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems. IACR Cryptol. ePrint Arch. 2009: 35 (2009) - [i12]Xiaofeng Chen, Haibo Tian, Fangguo Zhang:
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring. IACR Cryptol. ePrint Arch. 2009: 319 (2009) - [i11]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme Without Key Exposure. IACR Cryptol. ePrint Arch. 2009: 400 (2009) - 2008
- [j9]Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo:
A New and Efficient Signature on Commitment Values. Int. J. Netw. Secur. 7(1): 100-105 (2008) - [j8]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
A New Type of Designated Confirmer Signatures for a Group of Individuals. Int. J. Netw. Secur. 7(2): 293-300 (2008) - [j7]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) - [j6]Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. J. Comput. Sci. Technol. 23(2): 265-269 (2008) - [c24]Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Efficient designated confirmer signature from bilinear pairings. AsiaCCS 2008: 363-368 - [c23]Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344 - 2007
- [j5]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based restrictive partially blind signatures and applications. J. Syst. Softw. 80(2): 164-171 (2007) - [c22]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 - [c21]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
Society-oriented Designated Confirmer Signatures. ICNC (5) 2007: 707-712 - [c20]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
ID-based Ring Proxy Signatures. ISIT 2007: 1031-1035 - [c19]Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ProvSec 2007: 208-217 - [i10]Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature. IACR Cryptol. ePrint Arch. 2007: 225 (2007) - 2006
- [c18]Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang:
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. CIS 2006: 545-555 - [c17]Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang:
Generalization of the Selective-ID Security Model for HIBS Protocols. CIS 2006: 894-902 - [c16]Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo:
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 - [c15]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 - [i9]Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. IACR Cryptol. ePrint Arch. 2006: 236 (2006) - 2005
- [j4]Xiaofeng Chen, Fangguo Zhang, Baodian Wei:
Comment on the Public Key Substitution Attacks. Int. J. Netw. Secur. 1(3): 168-172 (2005) - [j3]Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis of Huang-Chang partially blind signature scheme. J. Syst. Softw. 76(3): 323-325 (2005) - [c14]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures. CIS (2) 2005: 117-124 - [c13]Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 - [c12]Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 - [c11]Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421 - [i8]Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. IACR Cryptol. ePrint Arch. 2005: 103 (2005) - [i7]Fangguo Zhang, Xiaofeng Chen:
Attack on Okamoto et al.'s New Short Signature Schemes. IACR Cryptol. ePrint Arch. 2005: 240 (2005) - [i6]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based Restrictive Partially Blind Signatures and Applications. IACR Cryptol. ePrint Arch. 2005: 319 (2005) - [i5]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 386 (2005) - 2004
- [j2]Fangguo Zhang, Xiaofeng Chen:
Attack on an ID-based authenticated group key agreement scheme from PKC 2004. Inf. Process. Lett. 91(4): 191-193 (2004) - [c10]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings. ACNS 2004: 135-148 - [c9]Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang:
Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389 - [c8]Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim:
New ID-Based Threshold Signature Scheme from Bilinear Pairings. INDOCRYPT 2004: 371-383 - [c7]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing Without Key Exposure. ISC 2004: 87-98 - [c6]Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang:
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341 - [i4]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing without Key Exposure. IACR Cryptol. ePrint Arch. 2004: 38 (2004) - 2003
- [c5]Changjie Wang, Xiaofeng Chen, Yumin Wang:
An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. AINA 2003: 194-197 - [c4]Xiaofeng Chen, Fei Feng, Yumin Wang:
New Key Improvements and Its Application to XTR System. AINA 2003: 561-564 - [c3]Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings. ICICS 2003: 249-259 - [c2]Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. ICISC 2003: 259-273 - [c1]Jianhong Zhang, Xiaofeng Chen, Yumin Wang:
Security analysis of the improved group signature. ITW 2003: 171-174 - [i3]Xiaofeng Chen, Fangguo Zhang, Yumin Wang:
A New Approach to Prevent Blackmailing in E-Cash. IACR Cryptol. ePrint Arch. 2003: 55 (2003) - [i2]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
A New ID-based Group Signature Scheme from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2003: 116 (2003) - [i1]Fangguo Zhang, Xiaofeng Chen:
Attack on Two ID-based Authenticated Group Key Agreement Schemes. IACR Cryptol. ePrint Arch. 2003: 259 (2003) - 2002
- [j1]Xiaofeng Chen, Changjie Wang, Yumin Wang:
Fair Electronic Cash Based on Double Signatur. J. Comput. Sci. Technol. 17(6): 830-835 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint