Følg
"xiangxue li"
"xiangxue li"
Verifisert e-postadresse på cs.ecnu.edu.cn
Tittel
Sitert av
Sitert av
År
Certificateless signature and proxy signature schemes from bilinear pairings
X Li, K Chen, L Sun
Lithuanian Mathematical Journal 45, 76-83, 2005
2402005
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
X Li, W Qiu, D Zheng, K Chen, J Li
IEEE Transactions on Industrial Electronics 57 (2), 793-800, 2009
1662009
Cryptanalysis of a certificateless signcryption scheme in the standard model
J Weng, G Yao, RH Deng, MR Chen, X Li
Information Sciences 181 (3), 661-667, 2011
902011
Identity based proxy-signcryption scheme from pairings
X Li, K Chen
IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004
902004
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
X Li, K Chen
Applied Mathematics and Computation 169 (1), 437-450, 2005
792005
Simulatability and security of certificateless threshold signatures
L Wang, Z Cao, X Li, H Qian
Information Sciences 177 (6), 1382-1394, 2007
622007
Connected vehicles' security from the perspective of the in-vehicle network
X Li, Y Yu, G Sun, K Chen
IEEE Network 32 (3), 58-63, 2018
612018
Identity-based key-insulated signature with secure key-updates
J Weng, S Liu, K Chen, X Li
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006 …, 2006
532006
Code-based Ring Signature Scheme.
D Zheng, X Li, K Chen
Int. J. Netw. Secur. 5 (2), 154-157, 2007
512007
Anonymity for bitcoin from secure escrow address
Q Wang, X Li, Y Yu
IEEE Access 6, 12336-12341, 2017
502017
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
X Li, K Chen, S Li
International Conference on Parallel and Distributed Computing: Applications …, 2004
462004
CLKS: Certificateless keyword search on encrypted data
Q Zheng, X Li, A Azgin
International Conference on Network and System Security, 239-253, 2015
432015
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
X Li, H Qian, J Weng, Y Yu
Mathematical and Computer Modelling 57 (3-4), 503-511, 2013
372013
Internet of things meets vehicles: Sheltering in-vehicle network through lightweight machine learning
J Xiao, H Wu, X Li
Symmetry 11 (11), 1388, 2019
332019
Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework
J Xiao, L Yang, F Zhong, H Chen, X Li
Applied Intelligence 53 (3), 3183-3206, 2023
302023
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J Weng, X Li, K Chen, S Liu
J. Inf. Sci. Eng. 24 (4), 1143-1157, 2008
292008
Vuldigger: A just-in-time and cost-aware tool for digging vulnerability-contributing changes
L Yang, X Li, Y Yu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
272017
Collision resistant hashing from sub-exponential learning parity with noise
Y Yu, J Zhang, J Weng, C Guo, X Li
International Conference on the Theory and Application of Cryptology and …, 2019
252019
Analysis of speedup and communication/computation ratio in multiprocessor systems
X Li, M Malek
Proceedings. Real-Time Systems Symposium, 282,283,284,285,286,287,288-282 …, 1988
231988
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
212016
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20