Search

Your search keyword '"Kefei Chen"' showing total 20 results

Search Constraints

Start Over You searched for: Author "Kefei Chen" Remove constraint Author: "Kefei Chen" Database Supplemental Index Remove constraint Database: Supplemental Index
20 results on '"Kefei Chen"'

Search Results

1. Efficient First-Price Sealed-Bid Auction Scheme.

2. Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.

Catalog

Books, media, physical & digital resources

3. A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.

4. Improvement of Adaptive Threshold RSA.

5. Efficient Identity-Based Signatures and Blind Signatures.

6. A Novel Clustering Technique Based on Improved Noising Method.

7. A Tabu Search Based Method for Minimum Sum of Squares Clustering.

8. An Authentication Protocol for Pervasive Computing.

9. A Hybrid Tabu Search Based Clustering Algorithm.

10. Efficient and Proactive Threshold Signcryption.

11. Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.

12. SDD: Secure Directed Diffusion Protocol for Sensor Networks.

13. Proxy Structured Multisignature Scheme from Bilinear Pairings.

14. A New Offiine Privacy Protecting E-cash System with Revokable Anonymity.

15. Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol.

16. Homomorphic linear authentication schemes from а-ASU2 functions for proofs of retrievability.

18. Transitive Signature Scheme from LFSR.

19. A Generic Construction for Intrusion-Resilient Signatures from Linear Feedback Shift Register.

20. Identity-Based Parallel Key-Insulated Signature: Framework and Construction.