Xiaofeng Chen
Xiaofeng Chen
Professor, Xidian University, China
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Secure deduplication with efficient and reliable convergent key management
J Li, X Chen, M Li, J Li, PPC Lee, W Lou
IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013
6552013
A hybrid cloud approach for secure authorized deduplication
J Li, YK Li, X Chen, PPC Lee, W Lou
IEEE Transactions on Parallel and Distributed Systems 26 (5), 1206-1216, 2014
4532014
New algorithms for secure outsourcing of modular exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013
4532013
Nosema ceranae is a long-present and wide-spread microsporidian infection of the European honey bee (Apis mellifera) in the United States
Y Chen, JD Evans, IB Smith, JS Pettis
Journal of invertebrate pathology 97 (2), 186-188, 2008
4332008
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4152013
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
IEEE Transactions on computers 64 (2), 425-437, 2013
3782013
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
3282018
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
2752015
Certificateless remote anonymous authentication schemes for wirelessbody area networks
J Liu, Z Zhang, X Chen, KS Kwak
IEEE Transactions on parallel and distributed systems 25 (2), 332-342, 2013
2362013
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
2252017
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
2162014
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2022017
A New ID-based Group Signature Scheme from Bilinear Pairings.
X Chen, F Zhang, K Kim
IACR Cryptol. ePrint Arch. 2003, 116, 2003
1952003
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
1862014
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1822011
Fine-grained access control system based on outsourced attribute-based encryption
J Li, X Chen, J Li, C Jia, J Ma, W Lou
European Symposium on Research in Computer Security, 592-609, 2013
1772013
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
1642017
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1642015
Public integrity auditing for shared dynamic cloud data with group user revocation
T Jiang, X Chen, J Ma
IEEE Transactions on Computers 65 (8), 2363-2373, 2015
1552015
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1342015
系统目前无法执行此操作,请稍后再试。
文章 1–20