Certificateless signature and proxy signature schemes from bilinear pairings X Li, K Chen, L Sun Lithuanian Mathematical Journal 45, 76-83, 2005 | 240 | 2005 |
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards X Li, W Qiu, D Zheng, K Chen, J Li IEEE Transactions on Industrial Electronics 57 (2), 793-800, 2009 | 166 | 2009 |
Cryptanalysis of a certificateless signcryption scheme in the standard model J Weng, G Yao, RH Deng, MR Chen, X Li Information Sciences 181 (3), 661-667, 2011 | 90 | 2011 |
Identity based proxy-signcryption scheme from pairings X Li, K Chen IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004 | 90 | 2004 |
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings X Li, K Chen Applied Mathematics and Computation 169 (1), 437-450, 2005 | 79 | 2005 |
Simulatability and security of certificateless threshold signatures L Wang, Z Cao, X Li, H Qian Information Sciences 177 (6), 1382-1394, 2007 | 62 | 2007 |
Connected vehicles' security from the perspective of the in-vehicle network X Li, Y Yu, G Sun, K Chen IEEE Network 32 (3), 58-63, 2018 | 61 | 2018 |
Identity-based key-insulated signature with secure key-updates J Weng, S Liu, K Chen, X Li Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006 …, 2006 | 53 | 2006 |
Code-based Ring Signature Scheme. D Zheng, X Li, K Chen Int. J. Netw. Secur. 5 (2), 154-157, 2007 | 51 | 2007 |
Anonymity for bitcoin from secure escrow address Q Wang, X Li, Y Yu IEEE Access 6, 12336-12341, 2017 | 50 | 2017 |
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings X Li, K Chen, S Li International Conference on Parallel and Distributed Computing: Applications …, 2004 | 46 | 2004 |
CLKS: Certificateless keyword search on encrypted data Q Zheng, X Li, A Azgin International Conference on Network and System Security, 239-253, 2015 | 43 | 2015 |
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model X Li, H Qian, J Weng, Y Yu Mathematical and Computer Modelling 57 (3-4), 503-511, 2013 | 37 | 2013 |
Internet of things meets vehicles: Sheltering in-vehicle network through lightweight machine learning J Xiao, H Wu, X Li Symmetry 11 (11), 1388, 2019 | 33 | 2019 |
Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework J Xiao, L Yang, F Zhong, H Chen, X Li Applied Intelligence 53 (3), 3183-3206, 2023 | 30 | 2023 |
Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J Weng, X Li, K Chen, S Liu J. Inf. Sci. Eng. 24 (4), 1143-1157, 2008 | 29 | 2008 |
Vuldigger: A just-in-time and cost-aware tool for digging vulnerability-contributing changes L Yang, X Li, Y Yu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 27 | 2017 |
Collision resistant hashing from sub-exponential learning parity with noise Y Yu, J Zhang, J Weng, C Guo, X Li International Conference on the Theory and Application of Cryptology and …, 2019 | 25 | 2019 |
Analysis of speedup and communication/computation ratio in multiprocessor systems X Li, M Malek Proceedings. Real-Time Systems Symposium, 282,283,284,285,286,287,288-282 …, 1988 | 23 | 1988 |
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 21 | 2016 |