The SCEAS System
| |||||||

## Search the dblp DataBase
Kefei Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xiangxue Li, Kefei Chen
**Identity Based Proxy-Signcryption Scheme from Pairings.**[Citation Graph (0, 0)][DBLP] IEEE SCC, 2004, pp:494-497 [Conf] - Libin Wang, Kefei Chen
**A Typed Theory for Access Control and Information Flow Control in Mobile Systems.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:154-165 [Conf] - Yongguo Liu, Yan Liu, Kefei Chen
**Clustering with Noising Method.**[Citation Graph (0, 0)][DBLP] ADMA, 2005, pp:209-216 [Conf] - Zheng Dong, Huang Zheng, Kefei Chen, Weidong Kou
**ID-Based Proxy Blind Signature.**[Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:380-383 [Conf] - Zhenjie Huang, Kefei Chen, Yumin Wang
**Efficient Identity-Based Signatures and Blind Signatures.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:120-133 [Conf] - Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen
**A Novel Clustering Technique Based on Improved Noising Method.**[Citation Graph (0, 0)][DBLP] CIARP, 2005, pp:81-92 [Conf] - Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
**Identity-Based Key-Insulated Signature with Secure Key-Updates.**[Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:13-26 [Conf] - Zheng Gong, Xiangxue Li, Kefei Chen
**Efficient Partially Blind Signature Scheme with Provable Security.**[Citation Graph (0, 0)][DBLP] COCOON, 2006, pp:378-386 [Conf] - Kefei Chen
**A New Identification Algorithm.**[Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:244-249 [Conf] - Zheng Huang, Kefei Chen
**Electronic Payment in Mobile Environment.**[Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:413-417 [Conf] - Xianfeng Zhao, Weinong Wang, Kefei Chen
**On the Noninvertibility of Adaptive Digital Watermarking.**[Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:347-351 [Conf] - Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen
**A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.**[Citation Graph (0, 0)][DBLP] Discovery Science, 2005, pp:380-382 [Conf] - Xiaoyun Wang, Lizhen Yang, Kefei Chen
**SDD: Secure Distributed Diffusion Protocol for Sensor Networks.**[Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:205-214 [Conf] - Yongguo Liu, Libin Wang, Kefei Chen
**A Tabu Search Based Method for Minimum Sum of Squares Clustering.**[Citation Graph (0, 0)][DBLP] ICAPR (1), 2005, pp:248-256 [Conf] - Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu
**Identity Based Conference Key Distribution Scheme from Parings.**[Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:845-852 [Conf] - Xiaoyun Wang, Kefei Chen
**An efficient proxy signature scheme in home network DRM.**[Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:191-196 [Conf] - Wei Wei, Xuhua Ding, Kefei Chen
**Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.**[Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:269-279 [Conf] - Longjun Zhang, Han Wei, Zheng Dong, Kefei Chen
**A Security Solution of WLAN Based on Public Key Cryptosystem.**[Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:422-427 [Conf] - Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
**Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:409-423 [Conf] - Feiyu Lei, Wen Chen, Kefei Chen
**A Non-committing Encryption Scheme Based on Quadratic Residue.**[Citation Graph (0, 0)][DBLP] ISCIS, 2006, pp:972-980 [Conf] - Xiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li
**Proxy Structured Multisignature Scheme from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:705-714 [Conf] - Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen
**An Authentication Protocol for Pervasive Computing.**[Citation Graph (0, 0)][DBLP] ISPA, 2005, pp:553-563 [Conf] - Ling Dong, Kefei Chen
**A Practical Clumped-Tree Multicast Encryption Scheme.**[Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:165-176 [Conf] - Shengli Liu, Kefei Chen, Weidong Qiu
**Identity-Based Threshold Decryption Revisited.**[Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:329-343 [Conf] - Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen
**Rights Protection for Data Cubes.**[Citation Graph (0, 0)][DBLP] ISC, 2006, pp:359-372 [Conf] - Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
**Efficient and Proactive Threshold Signcryption.**[Citation Graph (0, 0)][DBLP] ISC, 2005, pp:233-243 [Conf] - Weidong Qiu, Kefei Chen, Dawu Gu
**A New Offline Privacy Protecting E-cash System with Revokable Anonymity.**[Citation Graph (0, 0)][DBLP] ISC, 2002, pp:177-190 [Conf] - Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen
**A Hybrid Tabu Search Based Clustering Algorithm.**[Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:186-192 [Conf] - Qing Yang, Kefei Chen
**Digital Image Authentication Based on Turbo Codes.**[Citation Graph (0, 0)][DBLP] MIPS, 2004, pp:276-286 [Conf] - Xiangxue Li, Kefei Chen, Shiqun Li
**Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings.**[Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:591-595 [Conf] - Ruishan Zhang, Kefei Chen
**An Efficient Asynchronous Proactive RSA Scheme.**[Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:376-380 [Conf] - Yongguo Liu, Jun Peng, Kefei Chen, Yi Zhang
**An Improved Hybrid Genetic Clustering Algorithm.**[Citation Graph (0, 0)][DBLP] SETN, 2006, pp:192-202 [Conf] - Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
**Transitive Signatures Based on Bilinear Maps.**[Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:48-56 [Conf] - Xianfeng Zhao, Weinong Wang, Kefei Chen
**Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.**[Citation Graph (0, 0)][DBLP] WAIM, 2002, pp:430-440 [Conf] - Xianfeng Zhao, Weinong Wang, Kefei Chen
**Multimedia Tampering Localization Based on the Perturbation in Reverse Processing.**[Citation Graph (0, 0)][DBLP] WAIM, 2003, pp:483-494 [Conf] - Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen
**A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.**[Citation Graph (0, 0)][DBLP] ICSNC, 2006, pp:29- [Conf] - Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
**Enforcing Trust in Pervasive Computing with Trusted Computing Technology.**[Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:195-209 [Conf] - Ke-Fei Chen, Sheng Zhong
**Attacks on the (enhanced) Yang-Shieh authentication.**[Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal] - Ruishan Zhang, Kefei Chen
**Improvements on the WTLS protocol to avoid denial of service attacks.**[Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:76-82 [Journal] - Libin Wang, Kefei Chen
**Comments on an access control model in semantic grid.**[Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2006, v:22, n:1-2, pp:3-5 [Journal] - Libin Wang, Kefei Chen
**Comments on a theorem on grid access control.**[Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2006, v:22, n:4, pp:381-384 [Journal] - Zheng Dong, Kefei Chen, Jinyuan You
**Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.**[Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:749-756 [Journal] - Yongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang
**A genetic clustering method for intrusion detection.**[Citation Graph (0, 0)][DBLP] Pattern Recognition, 2004, v:37, n:5, pp:927-942 [Journal] - Yuan Luo, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen
**Some new characters on the wire-tap channel of type II.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1222-1229 [Journal] - Yu Long, Zhenfu Cao, Kefei Chen
**A dynamic threshold commercial key escrow scheme based on conic.**[Citation Graph (0, 0)][DBLP] Applied Mathematics and Computation, 2005, v:171, n:2, pp:972-982 [Journal] - Xiangxue Li, Dong Zheng, Kefei Chen
**Efficient Blind Signatures from Linear Feedback Shift Register.**[Citation Graph (0, 0)][DBLP] CDVE, 2007, pp:423-425 [Conf] - Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
**Identity-Based Key-Insulated Signature Without Random Oracles.**[Citation Graph (0, 0)][DBLP] CIS, 2006, pp:470-480 [Conf] - Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
**Undeniable Mobile Billing Schemes.**[Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:338-345 [Conf] - Xiangxue Li, Dong Zheng, Kefei Chen
**Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.**[Citation Graph (0, 0)][DBLP] ICA3PP, 2007, pp:95-106 [Conf] - Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen
**A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.**[Citation Graph (0, 0)][DBLP] PAISI, 2007, pp:288-294 [Conf] - Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen
**Efficient Authenticated Encryption Schemes with Public Verifiability**[Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal] - Yu Long, Kefei Chen, Shengli Liu
**Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.**[Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:519-534 [Journal] - Zhenjie Huang, Kefei Chen, Yumin Wang
**Provably Secure Convertible User Designating Confirmer Partially Blind Signatures.**[Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2006, v:17, n:3, pp:347-362 [Journal] - Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang
**Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.**[Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:3, pp:375-394 [Journal] - Yu Long, Kefei Chen, Shengli Liu
**ID-based threshold decryption secure against adaptive chosen-ciphertext attack.**[Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2007, v:33, n:3, pp:166-176 [Journal] **A game controller based on multiple sensors.**[Citation Graph (, )][DBLP]**Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.**[Citation Graph (, )][DBLP]**Identity-Based Threshold Key-Insulated Encryption without Random Oracles.**[Citation Graph (, )][DBLP]**Linkable Ring Signatures from Linear Feedback Shift Register.**[Citation Graph (, )][DBLP]**A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.**[Citation Graph (, )][DBLP]**A Secure Time Synchronization Protocol for Sensor Network.**[Citation Graph (, )][DBLP]**Efficient Partially Blind Signature from LFSR.**[Citation Graph (, )][DBLP]**Two Certificateless Aggregate Signatures From Bilinear Maps.**[Citation Graph (, )][DBLP]**Protocol Engineering Principles for Cryptographic Protocols Design.**[Citation Graph (, )][DBLP]**A Tamper-Evident Voting Machine Resistant to Covert Channels.**[Citation Graph (, )][DBLP]**Efficient Secure Multiparty Computation Protocol in Asynchronous Network.**[Citation Graph (, )][DBLP]**A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.**[Citation Graph (, )][DBLP]**Bitwise Higher Order Differential Cryptanalysis.**[Citation Graph (, )][DBLP]**New Upper Bounds on Sizes of Permutation Arrays**[Citation Graph (, )][DBLP]**New Lower Bounds on Sizes of Permutation Arrays**[Citation Graph (, )][DBLP]**New Constructions of Permutation Arrays**[Citation Graph (, )][DBLP]**MOHCS: Towards Mining Overlapping Highly Connected Subgraphs**[Citation Graph (, )][DBLP]**A synthetic indifferentiability analysis of some block-cipher-based hash functions.**[Citation Graph (, )][DBLP]
Search in 0.025secs, Finished in 0.028secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |