The SCEAS System
Navigation Menu

Search the dblp DataBase


Kefei Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiangxue Li, Kefei Chen
    Identity Based Proxy-Signcryption Scheme from Pairings. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:494-497 [Conf]
  2. Libin Wang, Kefei Chen
    A Typed Theory for Access Control and Information Flow Control in Mobile Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:154-165 [Conf]
  3. Yongguo Liu, Yan Liu, Kefei Chen
    Clustering with Noising Method. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:209-216 [Conf]
  4. Zheng Dong, Huang Zheng, Kefei Chen, Weidong Kou
    ID-Based Proxy Blind Signature. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:380-383 [Conf]
  5. Zhenjie Huang, Kefei Chen, Yumin Wang
    Efficient Identity-Based Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:120-133 [Conf]
  6. Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen
    A Novel Clustering Technique Based on Improved Noising Method. [Citation Graph (0, 0)][DBLP]
    CIARP, 2005, pp:81-92 [Conf]
  7. Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
    Identity-Based Key-Insulated Signature with Secure Key-Updates. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:13-26 [Conf]
  8. Zheng Gong, Xiangxue Li, Kefei Chen
    Efficient Partially Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP]
    COCOON, 2006, pp:378-386 [Conf]
  9. Kefei Chen
    A New Identification Algorithm. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:244-249 [Conf]
  10. Zheng Huang, Kefei Chen
    Electronic Payment in Mobile Environment. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:413-417 [Conf]
  11. Xianfeng Zhao, Weinong Wang, Kefei Chen
    On the Noninvertibility of Adaptive Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:347-351 [Conf]
  12. Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen
    A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. [Citation Graph (0, 0)][DBLP]
    Discovery Science, 2005, pp:380-382 [Conf]
  13. Xiaoyun Wang, Lizhen Yang, Kefei Chen
    SDD: Secure Distributed Diffusion Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:205-214 [Conf]
  14. Yongguo Liu, Libin Wang, Kefei Chen
    A Tabu Search Based Method for Minimum Sum of Squares Clustering. [Citation Graph (0, 0)][DBLP]
    ICAPR (1), 2005, pp:248-256 [Conf]
  15. Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu
    Identity Based Conference Key Distribution Scheme from Parings. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:845-852 [Conf]
  16. Xiaoyun Wang, Kefei Chen
    An efficient proxy signature scheme in home network DRM. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:191-196 [Conf]
  17. Wei Wei, Xuhua Ding, Kefei Chen
    Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:269-279 [Conf]
  18. Longjun Zhang, Han Wei, Zheng Dong, Kefei Chen
    A Security Solution of WLAN Based on Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:422-427 [Conf]
  19. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
    Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:409-423 [Conf]
  20. Feiyu Lei, Wen Chen, Kefei Chen
    A Non-committing Encryption Scheme Based on Quadratic Residue. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:972-980 [Conf]
  21. Xiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li
    Proxy Structured Multisignature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:705-714 [Conf]
  22. Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen
    An Authentication Protocol for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:553-563 [Conf]
  23. Ling Dong, Kefei Chen
    A Practical Clumped-Tree Multicast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:165-176 [Conf]
  24. Shengli Liu, Kefei Chen, Weidong Qiu
    Identity-Based Threshold Decryption Revisited. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:329-343 [Conf]
  25. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
    Rights Protection for Data Cubes. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:359-372 [Conf]
  26. Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
    Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:233-243 [Conf]
  27. Weidong Qiu, Kefei Chen, Dawu Gu
    A New Offline Privacy Protecting E-cash System with Revokable Anonymity. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:177-190 [Conf]
  28. Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen
    A Hybrid Tabu Search Based Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:186-192 [Conf]
  29. Qing Yang, Kefei Chen
    Digital Image Authentication Based on Turbo Codes. [Citation Graph (0, 0)][DBLP]
    MIPS, 2004, pp:276-286 [Conf]
  30. Xiangxue Li, Kefei Chen, Shiqun Li
    Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:591-595 [Conf]
  31. Ruishan Zhang, Kefei Chen
    An Efficient Asynchronous Proactive RSA Scheme. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:376-380 [Conf]
  32. Yongguo Liu, Jun Peng, Kefei Chen, Yi Zhang
    An Improved Hybrid Genetic Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    SETN, 2006, pp:192-202 [Conf]
  33. Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
    Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:48-56 [Conf]
  34. Xianfeng Zhao, Weinong Wang, Kefei Chen
    Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    WAIM, 2002, pp:430-440 [Conf]
  35. Xianfeng Zhao, Weinong Wang, Kefei Chen
    Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. [Citation Graph (0, 0)][DBLP]
    WAIM, 2003, pp:483-494 [Conf]
  36. Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen
    A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:29- [Conf]
  37. Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
    Enforcing Trust in Pervasive Computing with Trusted Computing Technology. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:195-209 [Conf]
  38. Ke-Fei Chen, Sheng Zhong
    Attacks on the (enhanced) Yang-Shieh authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal]
  39. Ruishan Zhang, Kefei Chen
    Improvements on the WTLS protocol to avoid denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:76-82 [Journal]
  40. Libin Wang, Kefei Chen
    Comments on an access control model in semantic grid. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2006, v:22, n:1-2, pp:3-5 [Journal]
  41. Libin Wang, Kefei Chen
    Comments on a theorem on grid access control. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2006, v:22, n:4, pp:381-384 [Journal]
  42. Zheng Dong, Kefei Chen, Jinyuan You
    Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:749-756 [Journal]
  43. Yongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang
    A genetic clustering method for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2004, v:37, n:5, pp:927-942 [Journal]
  44. Yuan Luo, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen
    Some new characters on the wire-tap channel of type II. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1222-1229 [Journal]
  45. Yu Long, Zhenfu Cao, Kefei Chen
    A dynamic threshold commercial key escrow scheme based on conic. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:2, pp:972-982 [Journal]
  46. Xiangxue Li, Dong Zheng, Kefei Chen
    Efficient Blind Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP]
    CDVE, 2007, pp:423-425 [Conf]
  47. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
    Identity-Based Key-Insulated Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:470-480 [Conf]
  48. Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
    Undeniable Mobile Billing Schemes. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:338-345 [Conf]
  49. Xiangxue Li, Dong Zheng, Kefei Chen
    Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2007, pp:95-106 [Conf]
  50. Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen
    A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:288-294 [Conf]
  51. Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen
    Efficient Authenticated Encryption Schemes with Public Verifiability [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  52. Yu Long, Kefei Chen, Shengli Liu
    Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:519-534 [Journal]
  53. Zhenjie Huang, Kefei Chen, Yumin Wang
    Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:3, pp:347-362 [Journal]
  54. Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang
    Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:3, pp:375-394 [Journal]
  55. Yu Long, Kefei Chen, Shengli Liu
    ID-based threshold decryption secure against adaptive chosen-ciphertext attack. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2007, v:33, n:3, pp:166-176 [Journal]

  56. A game controller based on multiple sensors. [Citation Graph (, )][DBLP]

  57. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]

  58. Identity-Based Threshold Key-Insulated Encryption without Random Oracles. [Citation Graph (, )][DBLP]

  59. Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP]

  60. A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. [Citation Graph (, )][DBLP]

  61. A Secure Time Synchronization Protocol for Sensor Network. [Citation Graph (, )][DBLP]

  62. Efficient Partially Blind Signature from LFSR. [Citation Graph (, )][DBLP]

  63. Two Certificateless Aggregate Signatures From Bilinear Maps. [Citation Graph (, )][DBLP]

  64. Protocol Engineering Principles for Cryptographic Protocols Design. [Citation Graph (, )][DBLP]

  65. A Tamper-Evident Voting Machine Resistant to Covert Channels. [Citation Graph (, )][DBLP]

  66. Efficient Secure Multiparty Computation Protocol in Asynchronous Network. [Citation Graph (, )][DBLP]

  67. A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. [Citation Graph (, )][DBLP]

  68. Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP]

  69. New Upper Bounds on Sizes of Permutation Arrays [Citation Graph (, )][DBLP]

  70. New Lower Bounds on Sizes of Permutation Arrays [Citation Graph (, )][DBLP]

  71. New Constructions of Permutation Arrays [Citation Graph (, )][DBLP]

  72. MOHCS: Towards Mining Overlapping Highly Connected Subgraphs [Citation Graph (, )][DBLP]

  73. A synthetic indifferentiability analysis of some block-cipher-based hash functions. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.009secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002