The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Kefei Chen" ( http://dblp.L3S.de/Authors/Kefei_Chen )

  Author page on DBLP  Author page in RDF  Community of Kefei Chen in ASPL-2

Publication years (Num. hits)
1995-2004 (25) 2005 (21) 2006 (21) 2007 (21) 2008 (16) 2009-2010 (22) 2011-2012 (22) 2013-2014 (17) 2015-2016 (17) 2017-2018 (23) 2019 (11)
Publication types (Num. hits)
article(123) inproceedings(85) phdthesis(1) proceedings(7)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 58 occurrences of 43 keywords

Results
Found 217 publication records. Showing 216 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jining Zhao, Chunxiang Xu, Kefei Chen Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen Fully homomorphic encryption based on the ring learning with rounding problem. Search on Bibsonomy IET Information Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long 0001 A new VRSA-based pairing-free certificateless signature scheme for fog computing. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fei Li 0006, Wei Gao 0007, Guilin Wang, Kefei Chen, Chunming Tang Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash. Search on Bibsonomy Frontiers of IT & EE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Huige Wang, Yuan Zhang 0006, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang Functional broadcast encryption with applications to data sharing for cloud storage. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jining Zhao, Chunxiang Xu, Kefei Chen Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. Search on Bibsonomy TIIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lixue Sun, Chunxiang Xu, Yuan Zhang 0006, Kefei Chen An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yu Zhang, Li Yu, Qi-Ping Su, Zhe Sun, Fuqun Wang, Xiao-Qiang Xu, Qingjun Xu, Jin-Shuang Jin, Kefei Chen, Chui-Ping Yang A framework for quantum homomorphic encryption with experimental demonstration. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Xuankai Wang, Mi Wen, Jinguo Li, Zipeng Fu, Rongxing Lu, Kefei Chen Adversarial attack against scene recognition system for unmanned vehicles. Search on Bibsonomy ACM TUR-C The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. Search on Bibsonomy Cryptography The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long 0001 Access control encryption with efficient verifiable sanitized decryption. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jining Zhao, Chunxiang Xu, Kefei Chen A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. Search on Bibsonomy TIIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Baodong Qin, Ziyuan Hu LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiangxue Li, Yu Yu 0001, Guannan Sun, Kefei Chen Connected Vehicles' Security from the Perspective of the In-Vehicle Network. Search on Bibsonomy IEEE Network The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fucai Luo, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen LWR-Based Fully Homomorphic Encryption, Revisited. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Yu Long 0001, Junyao Ye, Liangliang Wang A new randomized message-locked encryption in the standard model. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang Efficient identity-based threshold decryption scheme from bilinear pairings. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen, Jin Li 0002 Insight of the protection for data security under selective opening attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qi Xie, Zhixiong Tang, Kefei Chen Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Search on Bibsonomy Computers & Electrical Engineering The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gang Han, Yu Yu 0001, Xiangxue Li, Kefei Chen, Hui Li Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens. Search on Bibsonomy Computer Standards & Interfaces The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen A new construction on randomized message-locked encryption in the standard model via UCEs. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Liangliang Wang, Kefei Chen, Yu Long 0001, Huige Wang An efficient pairing-free certificateless signature scheme for resource-limited systems. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Debiao He, Ding Wang 0002, Qi Xie, Kefei Chen Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything. Search on Bibsonomy Security and Communication Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang 0001 Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. Search on Bibsonomy Informatica, Lith. Acad. Sci. The full citation details ... 2017 DBLP  BibTeX  RDF
1Kefei Chen, Dongdai Lin, Moti Yung (eds.) Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long 0001 An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Liangliang Wang, Kefei Chen, Yu Long 0001, Huige Wang Cryptanalysis of a certificateless aggregate signature scheme. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long 0001 Fuzzy certificateless signature. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Baodong Qin, Liangliang Wang Certificateless encryption secure against selective opening attack. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lingbo Wei, Chi Zhang 0001, Yanmin Gong, Yuguang Fang, Kefei Chen A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity. Search on Bibsonomy GLOBECOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Baodong Qin, Shengli Liu, Kefei Chen Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. Search on Bibsonomy IET Information Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Search on Bibsonomy Applied Mathematics and Computer Science The full citation details ... 2015 DBLP  BibTeX  RDF
1Qiang Li, Xiangxue Li, Xuejia Lai, Kefei Chen Optimal assignment schemes for general access structures based on linear programming. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhengan Huang, Shengli Liu, Kefei Chen n-Evasive all-but-many lossy trapdoor function and its constructions. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng, Qixiang Mei Efficient revocable identity-based encryption from multilinear maps. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen Non-malleability under Selective Opening Attacks: Implication and Separation. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Xueli Wang, Kefei Chen Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited. Search on Bibsonomy Comput. J. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen Non-malleability Under Selective Opening Attacks: Implication and Separation. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liangliang Wang, Kefei Chen, Yu Long 0001, Xianping Mao, Huige Wang A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings. Search on Bibsonomy INCoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fei Li 0006, Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang Efficient identity-based threshold signature scheme from bilinear pairings in standard model. Search on Bibsonomy IJIPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shengli Liu, Fangguo Zhang, Kefei Chen Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jianhong Chen, Yu Long 0001, Kefei Chen, Jie Guo Attribute-based key-insulated signature and its applications. Search on Bibsonomy Inf. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng 0001, Kefei Chen PWG: Progressive Weight-Growth Algorithm for LDPC Codes. Search on Bibsonomy IEICE Transactions The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Min-Rong Chen, Kefei Chen Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu Proofs of Retrievability Based on MRD Codes. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xianping Mao, Kefei Chen, Liangliang Wang, Yu Long 0001 On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme. Search on Bibsonomy INCoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuhua Wu, Kefei Chen, Qiong Pu, Yuefei Zhu Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shuhua Wu, Kefei Chen, Yuefei Zhu Enhancements of a three-party password-based authenticated key exchange protocol. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2013 DBLP  BibTeX  RDF
1Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu Proofs of Data Possession and Retrievability Based on MRD Codes. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Naomi Benger, Manuel Charlemagne, Kefei Chen A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao (eds.) Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013 Search on Bibsonomy AsiaPKC@AsiaCCS The full citation details ... 2013 DBLP  BibTeX  RDF
1Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng (eds.) 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  BibTeX  RDF
1Baodong Qin, Shengli Liu, Kefei Chen, Manuel Charlemagne Leakage-resilient lossy trapdoor functions and public-key encryption. Search on Bibsonomy AsiaPKC@AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen Expressive search on encrypted data. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zheng Huang, Weidong Kou, Kefei Chen Secure and Oblivious Information Hiding in Binary Image. Search on Bibsonomy CSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010. Search on Bibsonomy INCoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Longbin Lai, Linfeng Shen, Yanfei Zheng, Kefei Chen, Jing Zhang Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment. Search on Bibsonomy IJCAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongtao Wang, Kefei Chen, Yu Long 0001, Zhaohui Liu Accountable authority key policy attribute-based encryption. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuhua Wu, Kefei Chen, Yuefei Zhu A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety. Search on Bibsonomy J. Medical Systems The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuhua Wu, Kefei Chen An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. Search on Bibsonomy J. Medical Systems The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Xueli Wang, Kefei Chen Efficient identity-based threshold signature scheme from bilinear pairings in the standard model. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang Efficient identity-based threshold decryption scheme from bilinear pairings. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Qiang Li, Xiangxue Li, Dong Zheng 0001, Kefei Chen Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Qiang Li, Xiangxue Li, Dong Zheng 0001, Zheng Huang, Kefei Chen On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long 0001, Zhongmei Wan Identity-Based Key-Insulated Signcryption. Search on Bibsonomy Informatica, Lith. Acad. Sci. The full citation details ... 2012 DBLP  BibTeX  RDF
1Shengli Liu, Fangguo Zhang, Kefei Chen Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xuhua Zhou, Xuhua Ding, Kefei Chen A Generic Construction of Accountable Decryption and Its Applications. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jingjing Wang, Kefei Chen, Shixiong Zhu Annihilators of Fast Discrete Fourier Spectra Attacks. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wei Gao 0007, Kefei Chen, Guilin Wang, Xueli Wang Designated Condition One-Time Signatures. Search on Bibsonomy IDCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shengli Liu, Yu Long 0001, Kefei Chen Key updating technique in identity-based encryption. Search on Bibsonomy Inf. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Weidong Kou, Kefei Chen Self-generated-certificate public key encryption without pairing and its application. Search on Bibsonomy Inf. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long 0001, Kefei Chen Restrictive partially blind signature for resource-constrained information systems. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zheng Huang, Qiang Li, Dong Zheng 0001, Kefei Chen, Xiangxue Li YI Cloud: Improving user privacy with secret key recovery in cloud storage. Search on Bibsonomy SOSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xuhua Zhou, Xuhua Ding, Kefei Chen Lightweight Delegated Subset Test with Privacy Protection. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shengli Liu, Kefei Chen Homomorphic Linear Authentication Schemes for Proofs of Retrievability. Search on Bibsonomy INCoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiangxue Li, Weidong Qiu, Dong Zheng 0001, Kefei Chen, Jianhua Li Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. Search on Bibsonomy IEEE Trans. Industrial Electronics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zheng Gong, Yu Long 0001, Xuan Hong, Kefei Chen Practical Certificateless Aggregate Signatures from Bilinear Maps. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2010 DBLP  BibTeX  RDF
1Yu Long 0001, Kefei Chen Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Search on Bibsonomy Inf. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Search on Bibsonomy Inf. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jian Weng, Min-Rong Chen, Kefei Chen, Robert H. Deng Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. Search on Bibsonomy IEICE Transactions The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yongguo Liu, Hua Yan, Kefei Chen A Genetic Algorithm Based Clustering Approach with Tabu Operation and K-Means Operation. Search on Bibsonomy J. Intelligent Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao 0001 CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao 0001 CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen Towards Provable Security for Data Transmission Protocols in Sensor Network. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2009 DBLP  BibTeX  RDF
1Wei Han, Kefei Chen, Dong Zheng 0001 Receipt-Freeness for Groth e-Voting Schemes. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 216 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license