|
Search the dblp DataBase
Kefei Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xiangxue Li, Kefei Chen
Identity Based Proxy-Signcryption Scheme from Pairings. [Citation Graph (0, 0)][DBLP] IEEE SCC, 2004, pp:494-497 [Conf]
- Libin Wang, Kefei Chen
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:154-165 [Conf]
- Yongguo Liu, Yan Liu, Kefei Chen
Clustering with Noising Method. [Citation Graph (0, 0)][DBLP] ADMA, 2005, pp:209-216 [Conf]
- Zheng Dong, Huang Zheng, Kefei Chen, Weidong Kou
ID-Based Proxy Blind Signature. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:380-383 [Conf]
- Zhenjie Huang, Kefei Chen, Yumin Wang
Efficient Identity-Based Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:120-133 [Conf]
- Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen
A Novel Clustering Technique Based on Improved Noising Method. [Citation Graph (0, 0)][DBLP] CIARP, 2005, pp:81-92 [Conf]
- Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
Identity-Based Key-Insulated Signature with Secure Key-Updates. [Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:13-26 [Conf]
- Zheng Gong, Xiangxue Li, Kefei Chen
Efficient Partially Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP] COCOON, 2006, pp:378-386 [Conf]
- Kefei Chen
A New Identification Algorithm. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:244-249 [Conf]
- Zheng Huang, Kefei Chen
Electronic Payment in Mobile Environment. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:413-417 [Conf]
- Xianfeng Zhao, Weinong Wang, Kefei Chen
On the Noninvertibility of Adaptive Digital Watermarking. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:347-351 [Conf]
- Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. [Citation Graph (0, 0)][DBLP] Discovery Science, 2005, pp:380-382 [Conf]
- Xiaoyun Wang, Lizhen Yang, Kefei Chen
SDD: Secure Distributed Diffusion Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:205-214 [Conf]
- Yongguo Liu, Libin Wang, Kefei Chen
A Tabu Search Based Method for Minimum Sum of Squares Clustering. [Citation Graph (0, 0)][DBLP] ICAPR (1), 2005, pp:248-256 [Conf]
- Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu
Identity Based Conference Key Distribution Scheme from Parings. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:845-852 [Conf]
- Xiaoyun Wang, Kefei Chen
An efficient proxy signature scheme in home network DRM. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:191-196 [Conf]
- Wei Wei, Xuhua Ding, Kefei Chen
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:269-279 [Conf]
- Longjun Zhang, Han Wei, Zheng Dong, Kefei Chen
A Security Solution of WLAN Based on Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:422-427 [Conf]
- Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:409-423 [Conf]
- Feiyu Lei, Wen Chen, Kefei Chen
A Non-committing Encryption Scheme Based on Quadratic Residue. [Citation Graph (0, 0)][DBLP] ISCIS, 2006, pp:972-980 [Conf]
- Xiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li
Proxy Structured Multisignature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:705-714 [Conf]
- Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen
An Authentication Protocol for Pervasive Computing. [Citation Graph (0, 0)][DBLP] ISPA, 2005, pp:553-563 [Conf]
- Ling Dong, Kefei Chen
A Practical Clumped-Tree Multicast Encryption Scheme. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:165-176 [Conf]
- Shengli Liu, Kefei Chen, Weidong Qiu
Identity-Based Threshold Decryption Revisited. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:329-343 [Conf]
- Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:359-372 [Conf]
- Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:233-243 [Conf]
- Weidong Qiu, Kefei Chen, Dawu Gu
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:177-190 [Conf]
- Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen
A Hybrid Tabu Search Based Clustering Algorithm. [Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:186-192 [Conf]
- Qing Yang, Kefei Chen
Digital Image Authentication Based on Turbo Codes. [Citation Graph (0, 0)][DBLP] MIPS, 2004, pp:276-286 [Conf]
- Xiangxue Li, Kefei Chen, Shiqun Li
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:591-595 [Conf]
- Ruishan Zhang, Kefei Chen
An Efficient Asynchronous Proactive RSA Scheme. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:376-380 [Conf]
- Yongguo Liu, Jun Peng, Kefei Chen, Yi Zhang
An Improved Hybrid Genetic Clustering Algorithm. [Citation Graph (0, 0)][DBLP] SETN, 2006, pp:192-202 [Conf]
- Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:48-56 [Conf]
- Xianfeng Zhao, Weinong Wang, Kefei Chen
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. [Citation Graph (0, 0)][DBLP] WAIM, 2002, pp:430-440 [Conf]
- Xianfeng Zhao, Weinong Wang, Kefei Chen
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. [Citation Graph (0, 0)][DBLP] WAIM, 2003, pp:483-494 [Conf]
- Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. [Citation Graph (0, 0)][DBLP] ICSNC, 2006, pp:29- [Conf]
- Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
Enforcing Trust in Pervasive Computing with Trusted Computing Technology. [Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:195-209 [Conf]
- Ke-Fei Chen, Sheng Zhong
Attacks on the (enhanced) Yang-Shieh authentication. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal]
- Ruishan Zhang, Kefei Chen
Improvements on the WTLS protocol to avoid denial of service attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:76-82 [Journal]
- Libin Wang, Kefei Chen
Comments on an access control model in semantic grid. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2006, v:22, n:1-2, pp:3-5 [Journal]
- Libin Wang, Kefei Chen
Comments on a theorem on grid access control. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2006, v:22, n:4, pp:381-384 [Journal]
- Zheng Dong, Kefei Chen, Jinyuan You
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:749-756 [Journal]
- Yongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang
A genetic clustering method for intrusion detection. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2004, v:37, n:5, pp:927-942 [Journal]
- Yuan Luo, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen
Some new characters on the wire-tap channel of type II. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1222-1229 [Journal]
- Yu Long, Zhenfu Cao, Kefei Chen
A dynamic threshold commercial key escrow scheme based on conic. [Citation Graph (0, 0)][DBLP] Applied Mathematics and Computation, 2005, v:171, n:2, pp:972-982 [Journal]
- Xiangxue Li, Dong Zheng, Kefei Chen
Efficient Blind Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP] CDVE, 2007, pp:423-425 [Conf]
- Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
Identity-Based Key-Insulated Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:470-480 [Conf]
- Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
Undeniable Mobile Billing Schemes. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:338-345 [Conf]
- Xiangxue Li, Dong Zheng, Kefei Chen
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP] ICA3PP, 2007, pp:95-106 [Conf]
- Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. [Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:288-294 [Conf]
- Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen
Efficient Authenticated Encryption Schemes with Public Verifiability [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- Yu Long, Kefei Chen, Shengli Liu
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:519-534 [Journal]
- Zhenjie Huang, Kefei Chen, Yumin Wang
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2006, v:17, n:3, pp:347-362 [Journal]
- Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:3, pp:375-394 [Journal]
- Yu Long, Kefei Chen, Shengli Liu
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. [Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2007, v:33, n:3, pp:166-176 [Journal]
A game controller based on multiple sensors. [Citation Graph (, )][DBLP]
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. [Citation Graph (, )][DBLP]
Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP]
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. [Citation Graph (, )][DBLP]
A Secure Time Synchronization Protocol for Sensor Network. [Citation Graph (, )][DBLP]
Efficient Partially Blind Signature from LFSR. [Citation Graph (, )][DBLP]
Two Certificateless Aggregate Signatures From Bilinear Maps. [Citation Graph (, )][DBLP]
Protocol Engineering Principles for Cryptographic Protocols Design. [Citation Graph (, )][DBLP]
A Tamper-Evident Voting Machine Resistant to Covert Channels. [Citation Graph (, )][DBLP]
Efficient Secure Multiparty Computation Protocol in Asynchronous Network. [Citation Graph (, )][DBLP]
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. [Citation Graph (, )][DBLP]
Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP]
New Upper Bounds on Sizes of Permutation Arrays [Citation Graph (, )][DBLP]
New Lower Bounds on Sizes of Permutation Arrays [Citation Graph (, )][DBLP]
New Constructions of Permutation Arrays [Citation Graph (, )][DBLP]
MOHCS: Towards Mining Overlapping Highly Connected Subgraphs [Citation Graph (, )][DBLP]
A synthetic indifferentiability analysis of some block-cipher-based hash functions. [Citation Graph (, )][DBLP]
Search in 0.009secs, Finished in 0.012secs
|