Search

Your search keyword '"Kefei Chen"' showing total 111 results

Search Constraints

Start Over You searched for: Author "Kefei Chen" Remove constraint Author: "Kefei Chen" Topic computer.software_genre Remove constraint Topic: computer.software_genre
111 results on '"Kefei Chen"'

Search Results

1. Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems

2. Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET

3. Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization

4. A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era

5. Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks

6. Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions

7. On the Security of Verifiable Searchable Encryption Schemes

8. Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation

9. Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy

10. Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors

11. CLE against SOA with Better Data Security Storage to Cloud 5G

12. Access control encryption with efficient verifiable sanitized decryption

13. Connected Vehicles' Security from the Perspective of the In-Vehicle Network

14. Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing

15. Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens

16. Insight of the protection for data security under selective opening attacks

17. Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model

18. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks

19. Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC

20. A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update

21. Adversarial attack against scene recognition system for unmanned vehicles

22. Certificateless encryption secure against selective opening attack

23. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption

24. Novel approach to the analysis of spatially-varying treatment effects in on-farm experiments

25. On the Security of a Key Agreement and Key Protection Scheme

26. Attribute-Based Parallel Key-Insulated Signature

27. Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited

28. Sequential Aggregate Signatures and Multisignatures in the Plain Public Key Model

29. Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

30. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF

31. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation

32. A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+

33. Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing

34. Attribute-based key-insulated signature and its applications

35. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext

36. Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption

37. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

38. A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity

39. A new construction on randomized message-locked encryption in the standard model via UCEs

40. Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation

41. Accountable authority key policy attribute-based encryption

42. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme

43. Identity-Based Key-Insulated Signcryption

44. An efficient threshold key-insulated signature scheme

45. Identity-based key-insulated proxy signature without random oracles

46. Self-generated-certificate public key encryption without pairing and its application

47. Key updating technique in identity-based encryption

48. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles

49. Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards

50. Democratic group signatures with collective traceability

Catalog

Books, media, physical & digital resources