The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaofeng Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Limited Verifier Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:135-148 [Conf]
  2. Xiaofeng Chen, Fei Feng, Yumin Wang
    New Key Improvements and Its Application to XTR System. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:561-564 [Conf]
  3. Changjie Wang, Xiaofeng Chen, Yumin Wang
    An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:194-197 [Conf]
  4. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-Based Restrictive Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:117-124 [Conf]
  5. Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang
    Publicly Verifiable Auctions with Minimal Leakage. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:384-389 [Conf]
  6. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
    A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:480-489 [Conf]
  7. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
    Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:825-834 [Conf]
  8. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
    Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:251-265 [Conf]
  9. Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
    ID-Based Distributed "Magic Ink" Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:249-259 [Conf]
  10. Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:259-273 [Conf]
  11. Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
    New ID-Based Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:371-383 [Conf]
  12. Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang
    t-Out-of-n String/Bit Oblivious Transfers Revisited. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:410-421 [Conf]
  13. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Chameleon Hashing Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:87-98 [Conf]
  14. Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang
    Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:330-341 [Conf]
  15. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
    A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:67-80 [Conf]
  16. Fangguo Zhang, Xiaofeng Chen
    Attack on an ID-based authenticated group key agreement scheme from PKC 2004. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:91, n:4, pp:191-193 [Journal]
  17. Xiaofeng Chen, Changjie Wang, Yumin Wang
    Fair Electronic Cash Based on Double Signatur. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:830-835 [Journal]
  18. Fangguo Zhang, Xiaofeng Chen
    Cryptanalysis of Huang-Chang partially blind signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:3, pp:323-325 [Journal]
  19. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-based restrictive partially blind signatures and applications. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:164-171 [Journal]
  20. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
    Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:18-30 [Conf]
  21. Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang
    Generalization of the Selective-ID Security Model for HIBS Protocols. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:894-902 [Conf]
  22. Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang
    Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:545-555 [Conf]
  23. Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen
    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:208-217 [Conf]

  24. Efficient designated confirmer signature from bilinear pairings. [Citation Graph (, )][DBLP]


  25. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP]


  26. A novel model of IDS based on automatic clustering number determination. [Citation Graph (, )][DBLP]


  27. Multistability of Delayed Neural Networks with Discontinuous Activations. [Citation Graph (, )][DBLP]


  28. ID-Based Adaptive Oblivious Transfer. [Citation Graph (, )][DBLP]


  29. A Tamper-Evident Voting Machine Resistant to Covert Channels. [Citation Graph (, )][DBLP]


  30. Basic Properties of Calcium Phosphate Cement Containing Chitosan in its Liquid Phase. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002