PFLM: Privacy-preserving federated learning with membership proof C Jiang, C Xu, Y Zhang Information Sciences 576, 288-311, 2021 | 67 | 2021 |
SR-PEKS: Subversion-resistant public key encryption with keyword search C Jiang, C Xu, Z Zhang, K Chen IEEE Transactions on Cloud Computing 11 (3), 3168-3183, 2023 | 19 | 2023 |
On the security of an ECC-based authentication scheme for Internet of Drones M Zhang, C Xu, S Li, C Jiang IEEE Systems Journal 16 (4), 6425-6428, 2022 | 19 | 2022 |
Two-factor authenticated key exchange from biometrics with low entropy rates C Jiang, C Xu, Y Han, Z Zhang, K Chen IEEE Transactions on Information Forensics and Security, 2024 | 11 | 2024 |
ttPAKE: Typo tolerance password-authenticated key exchange Y Han, C Xu, S Li, C Jiang, K Chen Journal of Information Security and Applications 79, 103658, 2023 | 6 | 2023 |
GAIN: Decentralized privacy-preserving federated learning C Jiang, C Xu, C Cao, K Chen Journal of Information Security and Applications 78, 103615, 2023 | 6 | 2023 |
Device-enhanced secure cloud storage with keyword searchable encryption and deduplication C Jiang, C Xu, G Yang European Symposium on Research in Computer Security, 396-413, 2024 | 5 | 2024 |
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy Z Zhang, C Xu, C Jiang, K Chen IEEE Transactions on Dependable and Secure Computing, 2023 | 5 | 2023 |
Security analysis of a path validation scheme with constant-size proof Y Wu, C Jiang, C Xu, K Chen IEEE Transactions on Information Forensics and Security 16, 4246-4248, 2021 | 3 | 2021 |
Blockchain-based immunization against kleptographic attacks C Jiang, C Xu, J Chen, K Chen Science China Information Sciences 67 (7), 1-12, 2024 | 2 | 2024 |
LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE C Cao, C Xu, C Jiang, Z Zhang, X Dong, K Chen IEEE Transactions on Dependable and Secure Computing, 2024 | 2 | 2024 |
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things C Jiang, C Xu, K Chen International Conference on Information Security and Cryptology, 389-393, 2023 | 2 | 2023 |
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things against Perpetual Leakage C Jiang, C Xu, X Dong, K Chen, G Yang IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
A portable blind cloud storage scheme against compromised servers Z Liu, C Jiang, C Xu Journal of Systems Architecture 146, 103037, 2024 | 1 | 2024 |
Lattice-Based Anonymous Signcryption For Smart Grid C Chenchen, X Chunxiang, J Changsong, H Yunxia 2022 19th International Computer Conference on Wavelet Active Media …, 2022 | 1 | 2022 |
Eighth Power Residue Double Circulant Self-Dual Codes C Jiang, Y Sun, X Liang International Journal of Network Security 22 (5), 736-742, 2020 | 1 | 2020 |
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication C Jiang, C Xu, G Yang, Z Zhang, J Chen IEEE Transactions on Information Forensics and Security, 2025 | | 2025 |
PCSE: Privacy-Preserving Collaborative Searchable Encryption for Group Data Sharing in Cloud Computing Y Xu, H Cheng, X Liu, C Jiang, X Zhang, M Wang IEEE Transactions on Mobile Computing, 2025 | | 2025 |
AugSSO: Secure Threshold Single-Sign-On Authentication With Popular Password Collection C Jiang, C Xu, G Yang IEEE Transactions on Mobile Computing, 2025 | | 2025 |
Privacy-Preserving Single-Sign-On With Fine-Grained Access Control for IoT Devices Z Zhang, C Xu, MHA Au, C Jiang IEEE Transactions on Mobile Computing, 2024 | | 2024 |