学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 陈晓峰的留言板

My current citations and h-index on Google Scholar
 ttMy DBLP My DBLP My DBLP My DBLP
 

 


2016

  • Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang,Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9. 
  • Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou, Verifiable Computation over Large Database with Incremental Updates. IEEE transactions on Computers, 65(10): 3184-3195, 2016.
  • Tao Jiang, Xiaofeng Chen, Jianfeng Ma,Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation. IEEE transactions on Computers, 65(8): 2363-2373, 2016.
  • Jianfeng Wang, Meixia Miao, Yaqian Gao, Xiaofeng Chen, Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11): 4487-4495 (2016)
  • Peng Chen, Jun Ye, Xiaofeng Chen, Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput. 20(11): 4589-4596 (2016)
  • Jun Ye, Xiaofeng Chen, Jianfeng Ma, Improved algorithm for secure outsourcing of modular exponentiations with high checkability. IJAHUC 23(3/4): 182-191 (2016)
  • Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaofeng Chen,Design and analysis of secure mechanisms based on tripartite credibility for RFID systems. Computer Standards & Interfaces 44: 110-116 (2016).
  • Liang Liu, Xiaofeng Chen, Wenjing Lou,Secure three-party computational protocols for triangle area. Int. J. Inf. Sec. 15(1): 1-13 (2016).
  • Zheli Liu, Xiaofeng Chen, Jun Yang, Chunfu Jia, Ilsun You,New order preserving encryption model for outsourced databases in cloud environments. J. Network and Computer Applications 59: 198-207 (2016).
  • Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li,Efficient attribute-based data sharing in mobile clouds. Pervasive and Mobile Computing 28: 135-149 (2016).
  • Yinghui Zhang, Jin Li, Xiaofeng Chen, Hui Li, Anonymous attribute-based proxy re-encryption for access control in cloud computing. Security and Communication Networks 9(14): 2397-2411 (2016). 
  • Jianfeng Wang, Xiaofeng Chen, Efficient and Secure Storage for Outsourced Data: A Survey. Data Science and Engineering 1(3): 178-188 (2016).
  • Zheli Liu, Dejiang Luo, Jin Li, Xiaofeng Chen, Chunfu Jia,N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2): 384-400 (2016).
  • Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou,Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375.
  • Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li,Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524.
  • Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski, Multi-device Anonymous Authentication. NSS 2016: 21-36.

 

2015

  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou, New Publicly Verifiable Databases with Efficient Updates. IEEE Transactions on Dependable and Secure Computing, 12(5): 546-556, 2015.
  • Xiaofeng, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations. IEEE Transactions on Information and Forensics Security, 10(1), 69-78, 2015.
  • Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang, Efficient Algorithms for Secure Outsourcing of Bilinear Pairings, Theoretical Computer Science, 562: 112-121, 2015.
  • Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang, Verifiable Auditing for Outsourced Database in Cloud Computing, IEEE Transactions on Computers, 64(11): 3293-3303, 2015.
  • Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, and Yang Xiang, Secure Distributed Deduplication Systems with Improved Reliability. IEEE Transactions on Computers, 64(12): 3569-3579, 2015.
  • Jin Li, Xiao Tan, Xiaofeng Chen, Duncan Wong, Fatos Xhafa. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Transactions on Cloud Computing, 3(2): 195-205, 2015.  
  • Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou: A Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216, 2015.
  • Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia and Wenjing Lou. Identity-based Encryption with Outsourced Revocation in Cloud Computing. IEEE Transactions on Computers, 64(2): 425-437, 2015.
  • Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, and Joseph K. Liu, Towards secure and reliable cloud storage against data re-outsourcing, Future Generation Computer Systems, Vol. 52, 2015, pp. 86-94.
  • Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou,New access control systems based on outsourced attribute-based encryption1. Journal of Computer Security, 23(6): 659-683 (2015).
  • Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli,Secure deduplication storage systems supporting keyword search. J. Comput. Syst. Sci. 81(8): 1532-1541 (2015).
  • Jin Li, Xiaofeng Chen, Xinyi Huang: New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1), 125-141, 2015.
  • Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen,Secure multi-server-aided data deduplication in cloud computing. Pervasive and Mobile Computing 24: 129-137 (2015).
  • Hui Zhu, Yingfang Xue, Xiaofeng Chen, Qiang Li, Hui Li,V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service. Mobile Information Systems 2015: 841292:1-841292:9 (2015).
  • Qiang Tang, Hua Ma, Xiaofeng Chen, Extend the Concept of Public Key Encryption with Delegated Search. The Computer Journal, 58(4): 724-734 (2015).
  • Yansheng Feng, Hua Ma, Xiaofeng Chen, Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons. Intelligent Automation & Soft Computing, 21(1): 51-63 (2015).
  • Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong, L-EncDB: A lightweight fr[ant]amework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79: 18-26 (2015).
  • Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng, Adama Diene, Xiaofeng Chen,Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing. Future Generation Comp. Syst. 52: 116-124 (2015).
  • Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski,A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124.
  • Jun Ye, Xiaofeng Chen, Jianfeng Ma, An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. AINA Workshops 2015: 73-76
  • Peng Chen, Jun Ye, Xiaofeng Chen, A New Efficient Request-Based Comparable Encryption Scheme. AINA Workshops 2015: 436-439.
  • Qin Zou, Jianfeng Wang, Xiaofeng Chen,Secure Encrypted Image Search in Mobile Cloud Computing. BWCCA 2015: 572-575.
  • Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou, Group-oriented Proofs of Storage. ASIACCS 2015: 73-84.
  • Baojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen, Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems. AINA Workshops 2015: 17-21.
  • Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen, Request-Based Comparable Encryption Scheme with Multiple Users. BWCCA 2015: 414-416.
  • Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen,Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. ProvSec 2015: 215-226.
  • Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen,Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. ESORICS (2) 2015: 252-269.

 

2014

  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations,IEEE Transactions on Parallel and Distributed Systems, 25(9), 2386-2396, 2014.
  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan Wong. Secure Outsourced Attribute-based Signatures. IEEE Transactions on Parallel and Distributed Systems, 25(12): 3285-3294, 2014.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim, Identity-based chameleon hashing and signatures without key exposure, Information Sciences, 265: 198-210, 2014.
  • Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou, Verifiable Computation over Large Database with Incremental Updates, ESORICS 2014, LNCS 8712, 148–162, Springer-Verlag, 2014.
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong: New and efficient conditional e-payment systems with transferability. Future Generation Comp. Syst. 37: 252-258 (2014).
  • Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak: Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Trans. Parallel Distrib. Syst. 25(2): 332-342 (2014).
  • Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, Wenjing Lou: Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distrib. Syst. 25(6): 1615-1625 (2014).
  • Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu: Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 25(7): 1767-1775 (2014).
  • Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang, Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distrib. Syst. 25(8): 2201-2210 (2014).
  • Haibo Tian, Xiaofeng Chen, Willy Susilo: Deniability and forward secrecy of one-round authenticated key exchange. The Journal of Supercomputing 67(3): 671-690 (2014).
  • Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li,Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Computer Networks 75: 192-211 (2014).
  • Fatos Xhafa, Xiaofeng Chen, Xinyi Huang, Vladi Kolici,Advances in secure and intelligent data processing. Concurrency and Computation: Practice and Experience 26(5): 1021-1022 (2014).
  • Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li,Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. TIIS 8(11): 4028-4049 (2014).
  • Leonard Barolli, Fatos Xhafa, Xiaofeng Chen, Makoto Ikeda,Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2014, Guangdong, China, November 8-10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4173-5.
  • Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang,Ticket-based handoff authentication for wireless mesh networks. Computer Networks 73: 185-194 (2014).
  • Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen,Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution. BWCCA 2014: 572-577.
  • Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen,Secure Approximate Nearest Neighbor Search over Encrypted Data. BWCCA 2014: 578-583.
  • Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia: Privacy-preserving data utilization in hybrid clouds. Future Generation Comp. Syst. 30: 98-106 (2014).
  • Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan: Efficient and robust identity-based handoff authentication for EAP-based wireless networks. Concurrency and Computation: Practice and Experience 26(8): 1561-1573 (2014).
  • Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong: Digital provenance: Enabling secure data forensics in cloud computing. Future Generation Comp. Syst. 37: 259-266 (2014).
  • Yuan Chen, Xiaofeng Chen, Hui Li, More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure, IJGUC 5(1): 60-70 (2014).
  • Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause, An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18(9): 1795-1802 (2014).
  • Liang Liu, Xiaofeng Chen, Wenjing Lou: A Secure Three-Party Computational Protocol for Triangle Area. ACISP 2014: 82-97.
  • Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia: TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. ACISP 2014: 115-130.
  • Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou: Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. AINA 2014: 591-596.
  • Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli: Secure Deduplication Storage Systems with Keyword Search. AINA 2014: 971-977.
  • Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma: M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. ICT-EurAsia 2014: 612-621.
  • Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen: An Effective Cloud-Based Active Defense System against Malicious Codes. ICT-EurAsia 2014: 690-695.
  • Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu: TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358.
  • Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li,Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273.

 

2013

  • Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou, Fine-Grained Access Control System based on Outsourced Attribute-based Encryption, ESORICS 2013, LNCS 8134, 592-609, Springer-Verlag, 2013.
  • Qiang Tang and Xiaofeng Chen, Towards Asymmetric Searchable Encryption with Message Recovery and Flexible Search Authorization, ASIACCS, 253-264, 2013.
  • Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong and Hui Li, Anonymous Attribute-Based Encryption Supporting Efficient Decryption Test, ASIACCS, 511-516, 2013.
  • Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, and Xiaofeng Chen, Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing, Computer Sciences and Information Systems, Vol. 10, No. 2, 667-684, 2013.
  • Jin Li, Xiaofeng Chen, Efficient Multi-user Keyword Search Over Encrypted Data in Cloud Computing, Computing and Informatics, 32(4), 723-738, 2013.
  • Haibo Tian, Fangguo Zhang, Xiaofeng Chen, and Baodian Wei, Selectively unforgeable but existentially forgeable signature schemes and applications, Science in China : Information Sciences, Vol. 56, No. 1, 107-200, 2013.
  • Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen, An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing, J. UCS 19(16): 2349-2367, 2013.
  • Haibo Tian, Xiaofeng Chen, Fangguo Zhang, and Baodian Wei, Zhengtao Jiang, Yi Liu, A non-delegatable strong designated verifier signature in ID-based setting for mobile environment, Mathematical and Computer Modelling, 58(5-6), 1289-1300, 2013.
  • Fei Yan, Xiaofeng Chen, Yinghui Zhang, Efficient On-line/Off-line Signcrypiton Without Key Exposure, International Journal of Grid and Utility Computing,4(1), 85-93,2013.
  • Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, An Efficient Proof of Retrievability with Public Auditing in Cloud Computing, INCoS 2013: 93-98
  • Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li, FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation, INCoS 2013: 38-45
  • Hui Zhu, Siyu Chen, Lexiang Zhu, Hui Li, Xiaofeng Chen, RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree, INCoS 2013: 17-22
  • Hui Zhu, Yingfang Xue, Yun Zhang, Xiaofeng Chen, Hui Li, Ximeng Liu, V-MLR: A Multilevel Security Model for Virtualization, INCoS 2013: 9-16
  • Zheli Liu, Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, New Privacy-Preserving Location Sharing System for Mobile Online Social Networks,3PGCIC 2013: 214-218
  • Jin Li, Dongqing Xie, Xiaofeng Chen, Server-Aided Hierarchical Identity-Based Encryption, EIDWT 2013: 643-647
  • Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen, New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, Asian Conference on Availability, Reliability and Security, LNCS 7804, Springer, 373–382, 2013.
  • Yinghui Zhang, Xiaofeng Chen, Hui Li, Key-Evolving Hierarchical ID-Based Signcryption, The Computer Journal, 56(10), 1228-1248, 2013.
  • Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu, Security Analysis of a Suite of Deniable Authentication Protocols, I. J. Network Security 15(5): 384-389 (2013)
  • Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu, Secure and Verifiable Outsourcing of Sequence Comparisons, Asian Conference on Availability, Reliability and Security, LNCS 7804, Springer, 243–252, 2013.

 

2012

  • Xiaofeng Chen, Jin Li, Willy Susilo, Efficient Fair Conditional Payments for Outsourcing Computations, IEEE Transactions on Information Forensics and Security, 7(6),1687-1694, 2012.
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, ESORICS 2012, LNCS 7459, 541–556, Springer-Verlag, 2012.
  • Chunhui Wu, Xiaofeng Chen, Dongyang Long, Efficient ID-based Non-Malleable Trapdoor Commitment, Computers and Electrical Engineering, 38(6), 1647-1657, 2012.
  • Yuanjie Zhao, Xiaofeng Chen, Hua Ma, Qiang Tang, Hui Zhu, A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3 (1/2), 72-81, 2012.
  • Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, A Verifiable Fuzzy Keyword Search Over Encrypted Data, Journal of Internet Services and Information Security, 2 (1/2), 49-58, 2012.
  • Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, and Xiaofeng Chen, A New Efficient Verifiable Fuzzy Keyword Search Scheme, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(3), 61-71, 2012.
  • Haibo Tian, Xiaofeng Chen and Jin Li, A Short Non-delegatable Strong Designated Verifier Signature, ACISP 2012, LNCS 7372, 247-260, Springer-Verlag, 2012.
  • Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu, An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability, IMIS 2012, 88-88, IEEE, 2012.
  • Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong, Generic security-amplifying methods of ordinary digital signatures, Information Sciences, Elsevier, Vol.201, 128-139, 2012.
  • Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia and Zheli Liu, Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud , NSS 2012, LNCS 7645, Springer, 490-502, 2012.
  • Jingwei Li, Chunfu Jia, Jin Li, and Xiaofeng Chen, Outsourcing Encryption of Attribute-based Encryption with MapReduce, The 14th Interenation Conference on Information Security, LNCS 7618, Springer, 191–201, 2012.
  • Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, and Jiaxiang Quan, Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks, NSS 2012, LNCS 7645, Springer,180–191, 2012.
  • Yinghui Zhang, Xiaofeng Chen, Hui Li, and Jin Cao, Secure and Efficient Identity-Based Handoff Authentication Schemes, Security and Communication Networks, 5(10), 1121-1130, John Wiley & Sons, 2012.

 

2011

  • Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li, Identity-Based Trapdoor Mercurial Commitment and Applications, Theoretical Computer Science, 412(39),5498-5512, 2011.
  • Xiaofeng Chen, Fangguo  Zhang, Haibo  Tian, Baodian  Wei, Kwangjo  Kim, Discrete Logarithm Based Chameleon Hashing and Signatures Without Key Exposure,Computers and Electrical Engineering, 37(4), 614-623, 2011.
  • Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim: New receipt-free voting scheme using double-trapdoor commitment, Information Sciences, Elsevier, 181(8), 1493-1502, 2011.
  • Jin Li, Qiong Huang, Xiaofeng Chen and Sherman S. Chow, Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability, ASIACCS 2011, 386-390, 2011.
  • Haibo Tian, Xiaofeng Chen, Zhengtao Jiang. Non-interactive Deniable Authentication Protocols, accepted by 7th China International Conference on Information Security and Cryptology (InsCrypt2011), LNCS 7537, Springer, 142-159, 2011.
  • Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du. Non-delegatable Strong Designated Verifier Signature on Elliptic Curves, accepted by 14th Annual International Conference on Information Security and Cryptology (ICISC 2011), Springer, LNCS 7259, 219–234, 2012.
  • Yang Zhan, Xiaofeng Chen, Haibo Tian, Yumin Wang, Identity-based Key-exposure Free Chameleon Hashing Based on the RSA Assumption, Journal of Computational Information Systems, 7(2), 350-358, 2011.
  • Yuding Liu, Hang Li, and Xiaofeng Chen, Identity-Based Trapdoor Mercurial Commitment under the RSA Assumption, Chinacrypt 2011, 206-214, 2011.

 

2010

  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim,Identity-Based Chameleon Hash Scheme Without Key Exposure, 15th Australasian Conference on Information Security and Privacy (ACISP 2010) ,  LNCS 6168, Springer, 200-215, 2010.
  • Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Kwangjo Kim,Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy,14th Financial Cryptography and Data Security (FC 2010), LNCS 6052, Springer, 304-311, 2010.
  • Baodian Wei, Fangguo Zhang, and Xiaofeng Chen, Efficient Online/Offline Signcryption Scheme, Intelligent Automation and Soft Computing, 16(3), 449-459, 2010.
  • Xiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding, Comments and Improvements on Key-exposure Free Chameleon Hashing Based on Factoring, Inscrypt 2010, LNCS 6584, Springer, 415-426, 2010.
  • Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing, IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), 89-96, 2010.
  •  

 

2009

  • Fangguo Zhang, Xiaofeng Chen, Cryptanalysis and Improvement of an ID-based Ad-hoc Anonymous Identification Scheme at CT-RSA 05, Information Processing Letters, 109(15), 846-849, 2009.
  • Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, and Yi Mu, Identity-Based Universal Designated Verifier Signature Proof, International Journal of Network Security, 8(1), 52–58, 2009.
  • Jiqiang Lv, Kui Ren, Xiaofeng Chen and Kwangjo Kim, The Ring Authenticated Encryption: How to provide a clue wisely, Information Sciences, 179(1-2), 161-168, 2009.
  • Chunhui Wu,Xiaofeng Chen,A New Efficient On-line/Off-line Threshold Signature Scheme,Chinese Journal of Electronics, 18(2), 321-324, 2009.
  • Baodian Wei, Fangguo Zhang, Xiaofeng Chen, Haibo Tian, Some Properties of Algebraic Structures of RSA-like Systems, World Congress on Software Engineering, 440-445, IEEE Computer Society, 2009.
  • Haibo Tian, Xiaofeng Chen, and Yong Ding, Analysis of Two Types Deniable Authentication Protocols, International Journal of Network Security, 9(3), 242–246, 2009.
  • Fangguo Zhang, Xingwen Zhao and Xiaofeng Chen, ID-Based Adaptive Oblivious Transfer, The 10th International Workshop on Information Security Applications (WISA 2009), LNCS 5932, 133-147, 2009.
  • Chunhui Wu,Xiaofeng Chen,Dongyang Long, Yi Mu, and Willy Susilo, A New Secure Digital-Copyrighted Content Distribution Scheme, Journal of Computational Information Systems, 4(5), 2343-2349, 2009.
  • 张方国,陈晓峰,基于身份的密码体制的研究综述, 中国密码发展报告, 1-31, 2009。
  • 陈国敏,陈晓峰,一个安全的广义指定验证者签名证明系统,《电子与信息学报》, 31(2), 489-492, 2009。

 

2008

  • Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim,Efficient generic on-line/off-line (threshold) signatures without key exposure, Information Sciences, 178(21), 4192-4203, 2008.
  • Chunhui Wu, Yuqing Xing, Xiaofeng Chen, Dongyang Long, Hyunrok Lee, and Kwangjo Kim, Generic On-line/Off-line Aggregate Signatures, ICESS 08, 107-112, IEEE Computer Society Press, 2008.
  • Guomin Chen, Chunhui Wu, Wei Han, Xiaofeng Chen, Hyunrok Lee, and Kwangjo Kim, A New Receipt-Free Voting Scheme Based on Linkable Ring Signature for Designated Verifiers, ICESS 08, 18-23, IEEE Computer Society Press, 2008.
  • Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, A New and Efficient Signature on Commitment Values, International Journal of Network Security, 7(1), 101-106, 2008.
  • Baodian Wei, Fangguo Zhang, Xiaofeng Chen, Ring Proxy Signatures, Journal of Electronics, 25(1), 108-114, 2008.
  • Baodian Wei, Fangguo Zhang and Xiaofeng Chen, A New Type of Designated Confirmer Signatures for a Group of Individuals, International Journal of Network Security, 7(2), 293-300, 2008.
  • Shengli Liu, Xiaofeng Chen, and Fangguo Zhang, On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme, Journal of Computer Science and Technology, 23(2), 265-269, 2008.
  • Fangguo Zhang, Xiaofeng Chen, and Baodian Wei, Efficient Designated Confirmer Signature from Bilinear Pairings, AsiaCCS, 363-368, 2008.
  • Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, A Deniable Authentation Key Agreement Protocol, Chinacrypt, 406-415, 2008.
  • Wei Han, Tao Hao, Dong Zheng, Kefei Chen, and Xiaofeng Chen, A Tamper-Evident Voting Machine Resistant to Covert Channels, ProvSec Conference, LNCS 5324, 335–344, Springer-Verlag, 2008.

 

 2007

  • Xiaofeng Chen, Fangguo Zhang, and Shengli Liu, ID-based Restrictive Partially Blind Signatures and Applications, The Journal of Systems and Software, 80(2), 164–171, 2007.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo and Yi Mu Efficient Generic On-line/Off-line Signatures Without Key Exposure, Applied Cryptography and Network Security 07, LNCS 4521, 18-30, Springer-Verlag, 2007.
  • Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Baodian Wei, Byoungcheon Lee, Hyunrok Lee and Kwangjo Kim, New Receipt-free Voting Scheme Using Double-trapdoor Commitment, The 8th International Workshop on Information Security Applications, 395-409, 2007.
  • Baodian Wei, Xiaofeng Chen, Fangguo Zhang, and Jia Liu, Two New ID-Based Proxy Ring Signature Schemes, Journal of Computational Information Systems, 3(1), 81-88, 2007.
  • Baodian Wei, Fangguo Zhang, Xiaofeng Chen, ID-based Ring Proxy Signatures, International Symposium on Information Theory 07, 1031-1035,IEEE Computer Society, 2007.
  • Baodian Wei, Fangguo Zhang, Xiaofeng Chen, Society-oriented Designated Confirmer Signatures, International Conference on Natural Computation 07, Vol V, 707-712, IEEE Computer Society, 2007.
  • Chunhui Wu, Xiaofeng Chen, Fangguo Zhang, Hyunrok Lee, and Kwangjo Kim, Remarks on Receipt-free Auction/Voting Schemes Using Commitment, Chinacrypt 07, 272-282, Science Press, 2007.
  • Jin Li, Kwangjo Kim, Fangguo Zhang and Xiaofeng Chen, Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature, International Conference on Provable Security 07, LNCS 4784, 208-217, Springer-Verlag, 2007.

 

2006

  • Xiaofeng Chen, Fangguo Zhang, ID-based group-oriented signatures from pairings, Chinese Journal of Electronics, 15(1), 12-16, 2006.
  • Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, A New ID-Based Group Signature Scheme from Bilinear Pairings,Journal of Electronics, 23(6), 892-900, 2006.
  • Xiaofeng Chen, Fangguo Zhang, Yi Mu, and Willy Susilo, Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings,Financial Cryptography and Data Security 06, LNCS 4107, 251-265, Springer-Verlag, 2006.
  • Fangguo zhang, Xiaofeng Chen, Willy Susilo and Yi Mu, A New Signature Scheme Without Random Oracles from Bilinear Pairings, VietCrypt 2006, LNCS 4341, 67-80, Springer- Verlag, 2006.
  • Jin Li, Xiaofeng Chen, Fangguo Zhang, and Yanming Wang, Generalization of the Selective-ID Security Model for HIBS Protocols, International Conference on Computational Intelligence and Security 06, LNAI 4456, 894-902, Springer-Verlag, 2007.
  • Jin Li, Xiaofeng Chen, Tsz Hon Yuen, and Yanming Wang, Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant, International Conference on Computational Intelligence and Security 06, LNAI 4456, 545-555, Springer-Verlag, 2007.

 

2005

  • Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen and Yumin Wang, t-Out-of-n String/Bit Oblivious Transfers: Revisited, Information Security Practice and Experience Conference 2005, LNCS 3439, 410–421, Springer-Verlag, 2005.
  • Fangguo Zhang and Xiaofeng Chen, Cryptanalysis of Huang–Chang partially blind signature scheme,The Journal of Systems and Software, 76(3), 323-325, 2005.
  • Fangguo Zhang, Xiaofeng Chen and Baodian Wei, Cryptanalysis on Two Blind Signature Schemes,CCICS’05, 116-123, Xi’an, China, Science Press, 2005
  • Xiaofeng Chen, Fangguo Zhang, and Baodian Wei, Comment on the public key substitution attacks, International Journal of Network Security, 1(3), 168-172, 2005
  • Fangguo Zhang, Willy Susilo, Yi Mu, and Xiaofeng Chen, Identity-based Universal Designated Verifier Signatures,The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005), LNCS 3823, 825–834, Springer-Verlag, 2005.
  • Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang and Xiaofeng Chen, A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World, The 2nd international Symposium on Ubiquitous Intelligence and Smart Worlds (UISW2005), LNCS 3823, 480–489, Springer-Verlag, 2005.
  • Xiaofeng Chen, Fangguo Zhang, and Shengli Liu, ID-based Restrictive Partially Blind Signatures, International Conference on Computational Intelligence and Security, Part II, LNAI 3802, 117-124, Springer-Verlag, 2005. 

 

2004

  • Xiaofeng Chen, Fangguo Zhang and Kwangjo Kim, Limited verifier signature from bilinear Pairings, Applied Cryptography and Network Security 04, LNCS 3089, 135-148, Springer-Verlag, 2004.
  • Xiaofeng Chen, Fangguo Zhang and Kwangjo Kim,Chameleon Hashing without Key Exposure, Information Security Conference 04, LNCS 3225, 135-148, Springer-Verlag, 2004.
  • Xiaofeng Chen, Fangguo Zhang and Kwangjo Kim, New ID-based threshold signature scheme from bilinear pairings, Indocrypt 04, LNCS 3348, 371-383, Springer-Verlag, 2004.
  • Xiaofeng Chen and Fangguo Zhang, A Novel ID-based Signature Scheme from Bilinear Pairings, International Conference on Computer Communications 04, 551-555, Beijing, 2004.
  • Xiaofeng Chen, Fangguo Zhang and Yumin Wang, A New Approach to Prevent Blackmailing in E-Cash, Chinacrypt’04, 272-282, Wuxi, Science Press, 2004
  • Qianhong Wu, Changjie Wang, Xiaofeng Chen and Yumin Wang, Publicly Verifiable Auctions with Minimal Leakage, 28th Annual International Computer Software and Applications Conference, 384-389, Hongkong, IEEE Computer Society Press, 2004
  • Qianhong Wu, Xiaofeng Chen, Changjie Wang and Yumin Wang, Shared-key Signature and Its Application to Anonymous Authentication in Ad Hoc Group, Information Security Conference 04, LNCS 3225, 330-341, Springer-Verlag, 2004.
  • Fangguo Zhang and Xiaofeng Chen, Attack on an ID-based Authenticated Group Key Agreement Scheme from PKC 2004, Information Processing Letters. 91(4), 191-193, 2004.
  • Jiqiang Lv, Kui Ren, Xiaofeng Chen and Kwangjo Kim, Ring Authenticated Encryption: A New Type of Authenticated Encryption, SCIS 04, 1179-1184, Sendi, Japan, 2004.
  • Ping Wang, Xiaofeng Chen and Kwangjo Kim, On the Security of Zhang-Wu-Wang's Forward-Secure Group Signature Scheme in ICICS'03, CISC 2004, Korea.
  • 陈晓峰,王继林,王育民, 无强迫的最优合同签署方案,《电子学报》, 32(3), 404-407, 2004。
  • 陈晓峰,王继林,王育民, 基于广义 XTR 体制的签名方案, 《电子与信息学报》, 26(4), 562-567, 2004。
  • 陈晓峰,王育民, 公钥密码体制研究及进展,《通信学报》, 25(8), 146-155, 2004。 

 

2003

  • Xiaofeng Chen, Byoungcheon Lee and Kwangjo Kim, Receipt-free electronic auction schemes using homomorphic encryption, ICISC’03, LNCS 2971, 259-273, Springer-Verlag, 2003.
  • Xiaofeng Chen, Fei Feng and Yumin Wang, New key improvements and its application for XTR system, The International Conference on Advanced Information Networking and Applications, Xi’an, IEEE Computer Society Press, 561-564, 2003.
  • Chen xiaofeng, Wang jilin, Wang yumin, Fair Electronic Cash Based on Fingerprinting, Chinese 3rd information and communication security conference, Wuhan, Science Press, 2003.
  • Wang Changjie, Chen Xiaofeng and Wang Yumin, An Agent-based Multi rounds Online Auction Protocol with Sealed Bids, The International Conference on Advanced Information Networking and Applications, Xi’an, IEEE Computer Society Press, 194-197, 2003.
  • Jianhong Zhang, Xiaofeng Chen and Yumin Wang, Security analysis of the improved group signature, Proceeding of 2003 IEEE Information Theory Workshop, 171-174, France, 2003.
  • Yan Xie, Fangguo Zhang, Xiaofeng Chen and Kwangjo Kim, ID-based Distributed `Magic Ink' Signature, ICICS'03, LNCS 2836, 249-259, Springer-Verlag, 2003.
  • 陈晓峰,王育民,张文鹏,一个类似于Dedekind 和的四次均值公式,《西北大学学报》, 33(2), 129-132, 2003。
  • 陈晓峰,王育民,电子拍卖研究现状与进展,《通信学报》,23(12), 73-81, 2003。
  • 陈晓峰,高虎明,王育民,基于XTR体制的盲签名方案,《电子与信息学报》,25(6), 851-854, 2003。 
  • 陈晓峰,王育民,基于匿名通讯信道的安全电子投票方案,《电子学报》 ,31(3), 390-393, 2003。 
  • 陈晓峰, 王继林, 王育民, 基于不完全信任模型的无收据的电子投票,《计算机学报》,26(5), 557-561, 2003。 
  • 陈晓峰,伍前红, 王育民,基于多方安全计算的密钥协商,《西安电子科技大学学报》, 30(4), 477-481, 2003。 
  • 高虎明,陈晓峰,王育民,一个新的 (t, N-2) 弹性的 Mix net,《计算机学报》,26(10), 1366-1371, 2003。 
  • 王继林,陈晓峰,王育民,一种新的电子拍卖方案,《电子学报》, 31(10), 1578-1579, 2003。 
  • 王继林,陈晓峰,王育民,安全电子拍卖的研究与进展 ,《西安电子科技大学学报》,30(1),20-25,2003。 
  • 韩玮, 冯飞, 陈晓峰, 王育民, 基于PKI系统的数字时间认证方案, 《计算机学报》, 26(10), 1355-1360, 2003。 
     

 

2002

  • Xiaofeng Cheng, Changjie Wang, Yumin Wang, Fair Electronic Cash Based on Double Signature, Journal of Computer Science and Technology, 17(6), 830-835, 2002.
  • Xiaofeng Chen, Huming Gao, Yumin Wang, An Anonymous Auction Protocol with Randomly Sealed Bids, Chinese Journal of Electronics, 11(4), 499-501, 2002.
  • Xiaofeng Cheng, Zhang fangguo, Jilin Wang, Yumin Wang, Anonymous fingerprinting Based on Electronic Cash, Chinese Journal of Electronics, 12(1), 50-52, 2003.
    The first version of this paper is also published in Chinese 4th information hiding conference, Dalian, China Machine Press, 84-90, 2002
  • Fangguo Zhang, Xiaofeng Chen, Yumin Wang, A Practical Anonymity Controlled E-Cash Scheme based on ECC, Chinacrypt'02, ShanDong, Publishing House of Electronics Industry, 382-389, 2002.
  • 陈晓峰,毛剑,王育民, 一种新的Vickrey安全拍卖协议,《电子学报》, 30(4),471-472,2002。 
  • 陈晓峰,张方国,王育民,一种改进的密封式标价拍卖协议,《电子与信息学报》, 24(7), 997-999, 2002。 
  • 陈晓峰,王育民,基于不可信赖托管者的公平电子现金,《电子与信息学报》, 24(11), 1566-1572, 2002。 
  • 陈晓峰,毛剑,王育民,基于指纹的公平电子现金, 《西安电子科技大学学报》, 29(5), 643-647, 2002。 
  • 高虎明, 陈晓峰, 王育民, 一个对eCashTM改进的实用电子现金系统, 《计算机学报》, 25(10), 1099-1103, 2002。
  • 张方国,陈晓峰,王育民,椭圆曲线离散对数的攻击现状,《西安电子科技大学学报》, 29(3), 398-403, 2002。 
  • 毛剑,陈晓峰,王育民, 一种改进的具有隐私保护的数字产品匿名网上交易方案,《西安电子科技大学学报》, 29(5), 632-634, 2002。 
  • 李志慧,李瑞虎, 陈晓峰,最大线性正形置换的刻画与计数,《工程数学学报》, 19(4) , 101-105 , 2002。 

 

2001

  • Xiaofeng Chen, Jian Mao, Yumin Wang, Secure Vickrey Auction Protocol, Chinese 2nd information and communication security conference, Shanghai, Science Press, 209-214, 2001.
  • 陈晓峰,张文鹏,关于Dirichlet-L函数的四次加权均值公式,《西北大学学报》, 31(1), 5-8, 2001。

 

2000

  • 陈晓峰,张文鹏,一个类似于Dedekind 和的均值公式,《数学年刊》A辑,21(6), 715-722, 2000。 
  • 陈晓峰,关于Dirichlet-L函数的二次加权均值公式,《西安科技学院学报》, 20(4), 380-384, 2000。 

Xiaofeng Chen, Jian Mao, Yumin Wang, Secure Vickrey Auction Protocol, Chinese 2nd information and communication security conference, Shanghai, Science Pres

版权声明:未经西安电子科技大学以及个人主页教师本人许可不得复制,转载传播本主页内容或用于任何商业用途,如需转载请征得主页所有者同意,并附上主页链接.
西安电子科技大学个人主页 站点地图 | | 陈晓峰的留言板 | 更新日期 :2017-09-14 | |
Copyright © 2011-2016 西安电子科技大学 版权所有 陕ICP备021284(05016169) Powered by 信息化建设处 & 电院网络中心