Xiao-feng Chen
#148,749
Most Influential Person Now
Xiao-feng Chen's AcademicInfluence.com Rankings
Xiao-feng Chencomputer-science Degrees
Computer Science
#7665
World Rank
#8069
Historical Rank
Information Security
#21
World Rank
#21
Historical Rank
Database
#4718
World Rank
#4901
Historical Rank

Download Badge
Computer Science
Xiao-feng Chen's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Xiao-feng Chen Influential?
(Suggest an Edit or Addition)Xiao-feng Chen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Secure Deduplication with Efficient and Reliable Convergent Key Management (2014) (681)
- A Hybrid Cloud Approach for Secure Authorized Deduplication (2015) (495)
- Securely Outsourcing Attribute-Based Encryption with Checkability (2014) (460)
- Secure attribute-based data sharing for resource-limited users in cloud computing (2018) (436)
- New Algorithms for Secure Outsourcing of Modular Exponentiations (2012) (406)
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing (2015) (343)
- An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data (2017) (300)
- Verifiable Computation over Large Database with Incremental Updates (2014) (296)
- Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks (2014) (269)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (2017) (260)
- New Publicly Verifiable Databases with Efficient Updates (2015) (225)
- Anonymous and Traceable Group Data Sharing in Cloud Computing (2018) (217)
- New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations (2015) (205)
- Multi-authority ciphertext-policy attribute-based encryption with accountability (2011) (186)
- L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing (2015) (180)
- Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption (2013) (155)
- Secure Distributed Deduplication Systems with Improved Reliability (2015) (152)
- Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation (2016) (140)
- Verifiable Auditing for Outsourced Database in Cloud Computing (2015) (134)
- Multi-authority fine-grained access control with accountability and its application in cloud (2018) (125)
- Anonymous attribute-based encryption supporting efficient decryption test (2013) (123)
- Efficient Fair Conditional Payments for Outsourcing Computations (2012) (122)
- Secure Outsourced Attribute-Based Signatures (2014) (121)
- A New ID-based Group Signature Scheme from Bilinear Pairings (2003) (114)
- Efficient verifiable fuzzy keyword search over encrypted data in cloud computing (2013) (109)
- Outsourcing Encryption of Attribute-Based Encryption with MapReduce (2012) (107)
- Blockchain-based publicly verifiable data deletion scheme for cloud storage (2018) (107)
- New order preserving encryption model for outsourced databases in cloud environments (2016) (101)
- Chameleon Hashing Without Key Exposure (2004) (100)
- Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing (2010) (95)
- Bitcoin-based fair payments for outsourcing computations of fog devices (2018) (91)
- Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems (2014) (90)
- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure (2007) (90)
- OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices (2015) (89)
- Secure data uploading scheme for a smart home system (2018) (87)
- An efficient PHR service system supporting fuzzy keyword search and fine-grained access control (2014) (82)
- Secure and Efficient Cloud Data Deduplication With Randomized Tag (2017) (81)
- Privacy preserving multi-party computation delegation for deep learning in cloud computing (2018) (78)
- Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks (2017) (77)
- ID-based restrictive partially blind signatures and applications (2007) (73)
- Towards achieving flexible and verifiable search for outsourced database in cloud computing (2017) (71)
- Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud (2012) (71)
- Efficient algorithms for secure outsourcing of bilinear pairings (2015) (70)
- Privacy-preserving machine learning with multiple data providers (2018) (70)
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security (2006) (68)
- Secure deduplication storage systems supporting keyword search (2015) (63)
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (2014) (62)
- Identity-based chameleon hashing and signatures without key exposure (2014) (61)
- Secure multi-server-aided data deduplication in cloud computing (2015) (61)
- Designing cloud-based electronic health record system with attribute-based encryption (2015) (59)
- Anonymous attribute-based proxy re-encryption for access control in cloud computing (2016) (59)
- A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World (2005) (57)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (2008) (54)
- Privacy-aware attribute-based PHR sharing with user accountability in cloud computing (2015) (53)
- Efficient attribute-based data sharing in mobile clouds (2016) (53)
- PatternListener: Cracking Android Pattern Lock Using Acoustic Signals (2018) (52)
- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing (2014) (52)
- New ID-Based Threshold Signature Scheme from Bilinear Pairings (2004) (50)
- Secure searchable encryption: a survey (2016) (49)
- Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption (2003) (48)
- DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT (2020) (47)
- A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search (2012) (47)
- New Publicly Verifiable Computation for Batch Matrix Multiplication (2017) (47)
- RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud (2019) (46)
- Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs (2020) (45)
- NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning (2020) (44)
- Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT (2021) (44)
- Attack on an ID-based authenticated group key agreement scheme from PKC 2004 (2004) (44)
- Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training (2018) (43)
- Towards secure and reliable cloud storage against data re-outsourcing (2015) (41)
- Non-interactive privacy-preserving neural network prediction (2019) (40)
- An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing (2013) (40)
- Blockchain-based multiple groups data sharing with anonymity and traceability (2019) (39)
- Identity-Based Chameleon Hash Scheme without Key Exposure (2010) (38)
- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation (2013) (37)
- Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks (2014) (37)
- Blockchain-Based Dynamic Provable Data Possession for Smart Cities (2020) (37)
- Digital provenance: Enabling secure data forensics in cloud computing (2014) (36)
- Blockchain-based public auditing and secure deduplication with fair arbitration (2020) (36)
- An Efficient Proof of Retrievability with Public Auditing in Cloud Computing (2013) (36)
- Attack on Two ID-based Authenticated Group Key Agreement Schemes (2003) (36)
- DedupDUM: Secure and scalable data deduplication with dynamic user management (2018) (35)
- ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings (2003) (33)
- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption (2019) (33)
- TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage (2014) (32)
- Privacy-preserving data utilization in hybrid clouds (2014) (32)
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature (2007) (32)
- N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks (2016) (30)
- Identity-Based Universal Designated Verifier Signatures (2005) (30)
- New receipt-free voting scheme using double-trapdoor commitment (2011) (30)
- A New Signature Scheme Without Random Oracles from Bilinear Pairings (2006) (29)
- Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain (2021) (29)
- Ticket-based handoff authentication for wireless mesh networks (2014) (29)
- MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks (2014) (29)
- A New Efficient Verifiable Fuzzy Keyword Search Scheme (2012) (27)
- Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing (2014) (27)
- Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks (2012) (27)
- Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database (2018) (27)
- Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant (2006) (26)
- Discrete logarithm based chameleon hashing and signatures without key exposure (2011) (26)
- New Privacy-Preserving Location Sharing System for Mobile Online Social Networks (2013) (26)
- Efficient and secure encrypted image search in mobile cloud computing (2017) (25)
- FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation (2013) (24)
- Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 (2009) (24)
- New and efficient conditional e-payment systems with transferability (2014) (23)
- Secure three-party computational protocols for triangle area (2016) (23)
- Towards privacy protection and malicious behavior traceability in smart health (2017) (23)
- Protecting Mobile Health Records in Cloud Computing (2017) (23)
- A New Short Signature Scheme Without Random Oracles from Bilinear Pairings (2005) (23)
- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings (2006) (22)
- A matrix-based cross-layer key establishment protocol for smart homes (2018) (21)
- An Improved Algorithm for Secure Outsourcing of Modular Exponentiations (2015) (21)
- Secure Cloud Data Deduplication with Efficient Re-Encryption (2019) (21)
- Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key (2015) (21)
- Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing (2013) (20)
- Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption (2017) (19)
- Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage (2021) (19)
- Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing (2016) (18)
- Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming (2014) (18)
- Towards asymmetric searchable encryption with message recovery and flexible search authorization (2013) (18)
- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails (2019) (18)
- Privacy-preserving authentication for general directed graphs in industrial IoT (2019) (17)
- Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things (2019) (17)
- Blockchain‐based fair three‐party contract signing protocol for fog computing (2019) (17)
- A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data (2012) (17)
- New attribute-based authentication and its application in anonymous cloud access service (2015) (16)
- Oblivious Transfer for Privacy-Preserving in VANET’s Feature Matching (2021) (16)
- Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing (2018) (16)
- Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach (2015) (16)
- Trusted data sharing with flexible access control based on blockchain (2021) (16)
- Achieving Searchable Encryption Scheme With Search Pattern Hidden (2022) (15)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (2016) (15)
- Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems (2009) (15)
- Efficient and Secure Storage for Outsourced Data: A Survey (2016) (15)
- Limited Verifier Signature from Bilinear Pairings (2004) (15)
- Generic security-amplifying methods of ordinary digital signatures (2008) (15)
- A New Receipt-Free Voting Scheme Based on Linkable Ring Signature for Designated Verifiers (2008) (15)
- Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution (2022) (15)
- Efficient designated confirmer signature from bilinear pairings (2008) (15)
- Privacy-preserving and verifiable online crowdsourcing with worker updates (2021) (14)
- Advances on cloud services and cloud computing (2015) (14)
- Secure Deduplication Storage Systems with Keyword Search (2014) (14)
- Publicly Verifiable Databases With All Efficient Updating Operations (2020) (14)
- Non-delegatable Strong Designated Verifier Signature on Elliptic Curves (2011) (13)
- A short non-delegatable strong designated verifier signature (2012) (13)
- Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring (2010) (13)
- Cryptanalysis of Huang-Chang partially blind signature scheme (2005) (13)
- Efficient online/offline signcryption without key exposure (2013) (13)
- HVDB: a hierarchical verifiable database scheme with scalable updates (2019) (13)
- A New Approach to Prevent Blackmailing in E-Cash (2003) (12)
- Group-oriented Proofs of Storage (2015) (12)
- Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks (2022) (12)
- Introduction to Secure Outsourcing Computation (2016) (12)
- A non-delegatable strong designated verifier signature in ID-based setting for mobile environment (2013) (12)
- New ID-based group signature from pairings (2006) (11)
- TrDup: enhancing secure data deduplication with user traceability in cloud computing (2017) (11)
- Ring Authenticated Encryption: A New Type of Authenticated Encryption (2004) (11)
- Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy (2022) (11)
- Identity-based Universal Designated Verifier Signature Proof System (2009) (11)
- Efficient request-based comparable encryption scheme based on sliding window method (2016) (11)
- SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems (2018) (11)
- ID-Based Restrictive Partially Blind Signatures (2005) (10)
- Efficient and robust identity‐based handoff authentication for EAP‐based wireless networks (2014) (10)
- A Fair Three-Party Contract Singing Protocol Based on Blockchain (2017) (10)
- Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures (2018) (10)
- Towards Efficient Fully Randomized Message-Locked Encryption (2016) (10)
- Game Theoretical Analysis on Encrypted Cloud Data Deduplication (2019) (10)
- Non-interactive Deniable Authentication Protocols (2011) (10)
- Differentially Private Byzantine-robust Federated Learning (2022) (10)
- Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons (2015) (9)
- A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications (2018) (9)
- Secure Deduplication System with Active Key Update and Its Application in IoT (2019) (9)
- Analysis of Two Types Deniable Authentication Protocols (2009) (9)
- Extend the Concept of Public Key Encryption with Delegated Search (2015) (9)
- A New Secure Data Deduplication Approach Supporting User Traceability (2015) (9)
- ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records (2021) (9)
- A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle (2020) (8)
- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy (2010) (8)
- Multi-device anonymous authentication (2016) (8)
- New efficient constructions of verifiable data streaming with accountability (2019) (8)
- An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction (2021) (8)
- Secure Encrypted Image Search in Mobile Cloud Computing (2015) (7)
- SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud (2020) (7)
- Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images (2020) (7)
- Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data (2018) (7)
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption (2013) (7)
- Key-Evolving Hierarchical ID-Based Signcryption (2013) (6)
- Secure Approximate Nearest Neighbor Search over Encrypted Data (2014) (6)
- A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem (2019) (6)
- Toward Forward Secure SSE Supporting Conjunctive Keyword Search (2019) (6)
- A client-based secure deduplication of multimedia data (2017) (6)
- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group (2004) (6)
- A New and Efficient Signature on Commitment Values (2008) (6)
- Identity-based trapdoor mercurial commitments and applications (2011) (5)
- On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature (2007) (5)
- Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain (2017) (5)
- The ring authenticated encryption scheme - How to provide a clue wisely (2009) (5)
- Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging (2021) (5)
- ID-based Ring Proxy Signatures (2007) (5)
- A New Type of Designated Confirmer Signatures for a Group of Individuals (2008) (5)
- AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model (2018) (5)
- Essentials of Blockchain Technology (2019) (5)
- Secure Outsourced Attribute-based Encryption (2012) (5)
- Ring proxy signatures (2008) (5)
- Security Analysis of a Suite of Deniable Authentication Protocols (2013) (4)
- Secure Cloud Auditing with Efficient Ownership Transfer (2020) (4)
- V-MLR: A Multilevel Security Model for Virtualization (2013) (4)
- More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure (2014) (4)
- Design and analysis of secure mechanisms based on tripartite credibility for RFID systems (2016) (4)
- Verifiable Search for Dynamic Outsourced Database in Cloud Computing (2015) (4)
- Security analysis of the improved group signature (2003) (4)
- Efficient ID-based non-malleable trapdoor commitment (2012) (4)
- Deniability and forward secrecy of one-round authenticated key exchange (2014) (4)
- Yet Another Short Signatures Without Random Oracles from Bilinear Pairings (2005) (4)
- A New Efficient Request-Based Comparable Encryption Scheme (2015) (4)
- Secure distributed data geolocation scheme against location forgery attack (2019) (4)
- Secure and Verifiable Outsourcing of Sequence Comparisons (2013) (3)
- Advances in Cyber Security: Principles, Techniques, and Applications (2019) (3)
- t-Out-of-n String/Bit Oblivious Transfers Revisited (2005) (3)
- Refine the Concept of Public Key Encryption with Delegated Search (2012) (3)
- ID-Based Adaptive Oblivious Transfer (2009) (3)
- Comparable encryption scheme supporting multiple users in cloud computing (2018) (3)
- WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework (2017) (3)
- New key improvements and its application to XTR system (2003) (3)
- Forgeability of Wang-Tang-Li’s ID-Based Restrictive Partially Blind Signature Scheme (2008) (3)
- Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution (2014) (3)
- An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability (2012) (3)
- Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing (2015) (3)
- An Almost Non-interactive Order Preserving Encryption Scheme (2018) (2)
- ID-Based Distributed "Magic Ink" Signature from Pairings (2003) (2)
- Efficient public-key authenticated deniable encryption schemes (2022) (2)
- Optimal Verifiable Data Streaming Protocol with Data Auditing (2021) (2)
- Request-Based Comparable Encryption Scheme with Multiple Users (2015) (2)
- An Efficient Secure Dynamic Skyline Query Model (2020) (2)
- Server-Aided Hierarchical Identity-Based Encryption (2013) (2)
- Research on Searchable Symmetric Encryption (2020) (2)
- Selectively unforgeable but existentially forgeable signature schemes and applications (2013) (2)
- RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree (2013) (2)
- An Effective Cloud-Based Active Defense System against Malicious Codes (2014) (2)
- TTP-free Fair Exchange of Digital Signatures with Bitcoin (2017) (2)
- Comment on the Public Key Substitution Attacks (2005) (2)
- TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support (2023) (2)
- FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage (2022) (2)
- A Survey on Secure Outsourced Deep Learning (2021) (2)
- Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring (2009) (2)
- An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids (2003) (2)
- Distributed information flow verification for secure service composition in smart sensor network (2016) (2)
- Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems (2015) (1)
- A New Signature Scheme without Random Oracles and Its Applications ? (2006) (1)
- Improved algorithm for secure outsourcing of modular exponentiations with high checkability (2016) (1)
- Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond (2022) (1)
- Efficient request-based comparable encryption scheme based on sliding window method (2015) (1)
- Designing cloud-based electronic health record system with attribute-based encryption (2014) (1)
- Multi-device anonymous authentication (2018) (1)
- Publicly Verifiable Auctions with Minimal Leakage (2004) (1)
- ID-based group-oriented proxy signature and blind signature from pairings (2006) (1)
- Secure three-party computational protocols for triangle area (2014) (1)
- Generic On-line/Off-line Aggregate Signatures (2008) (1)
- STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation (2019) (1)
- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy (2021) (1)
- Constructing Verifiable Random Number in Finite Field (2013) (1)
- Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (2016) (1)
- Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption (2015) (1)
- IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems (2022) (1)
- CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types (2022) (1)
- New Practical Public-Key Deniable Encryption (2020) (1)
- Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 1) (2020) (1)
- Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information (2015) (1)
- New access control systems based on outsourced attribute-based encryption (2015) (1)
- V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service (2015) (1)
- Fair electronic cash based on double signatures (2002) (1)
- Efficient Online/Offline Signcryption Scheme (2010) (1)
- Society-oriented Designated Confirmer Signatures (2007) (1)
- Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing (2018) (1)
- Cloud Storage Servers Clients Third Party Auditor Cloud Service Provider Data Auditing Delegation Public Data Auditing Outsource Data (2014) (0)
- Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures (2016) (0)
- An efficient PHR service system supporting fuzzy keyword search and fine-grained access control (2013) (0)
- Location-Sensitive Data Sharing in Mobile Cloud Computing (2016) (0)
- Lattice-based group encryptions with only one trapdoor (2022) (0)
- Intensive Convergence Encryption for Secure Deduplication in Cloud (2016) (0)
- A deniable authenticated key agreement protocol (2008) (0)
- HVDB: a hierarchical verifiable database scheme with scalable updates (2018) (0)
- Secure Cloud Auditing with Efficient Ownership Transfer (Full Version) (2020) (0)
- M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet (2014) (0)
- Designing Security Method for Cloud Environment Using Attribute Based Signature (2015) (0)
- Privacy-aware attribute-based PHR sharing with user accountability in cloud computing (2014) (0)
- A Tamper-Evident Voting Machine Resistant to Covert Channels (2008) (0)
- Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing (2015) (0)
- Protecting Electronic Signatures in Case of Key Leakage (2016) (0)
- DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems (2022) (0)
- Efficient and secure encrypted image search in mobile cloud computing (2016) (0)
- Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems (2023) (0)
- Concise ID-based mercurial functional commitments and applications to zero-knowledge sets (2019) (0)
- Some Properties of Algebraic Structures of RSA-like Systems (2009) (0)
- IMIS 2008 message from the workshop organizers MUE 2008 (2008) (0)
- Advances in secure and intelligent data processing (2014) (0)
- Editorial preface for the special issue “Advances in security, privacy and trust technologies” (2015) (0)
- ID-based Chameleon Hash Scheme and Signature Without Key Escrow (2010) (0)
- Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing (2018) (0)
- DCCA-Secure Public-Key Encryptions from Hybrid Paradigms (2012) (0)
- Rethinking Identification Protocols from the Point of View of the GDPR (2019) (0)
- Efficient Multi-client Order-Revealing Encryption and Its Applications (2021) (0)
- 王-汤-李的基于身份的受限部分盲签名的可伪造性 (2008) (0)
- Generalization of the Selective-ID Security Model for HIBS Protocols (2006) (0)
- Efficient Authentication Schemes for AODV and DSR (2007) (0)
- Attack on Okamoto et al.'s New Short Signature Schemes (2005) (0)
- Research on the Model of the Survivable Storage System (SSS) and Its Architecture (2012) (0)
- New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead (2022) (0)
- New efficient constructions of verifiable data streaming with accountability (2019) (0)
- Efficient and Secure Storage for Outsourced Data: A Survey (2016) (0)
- Efficient and Verifiable Proof of Replication with Fast Fault Localization (2021) (0)
- Editor’s note: Special Issue on Security and Privacy for Big Data Storage in the Cloud (2018) (0)
- An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications (2021) (0)
- Towards privacy protection and malicious behavior traceability in smart health (2017) (0)
- Privacy-Preserving Machine Learning (2022) (0)
- A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing (2020) (0)
- Forward-Secure Group Encryptions from Lattices (2021) (0)
- A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization (2017) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Xiao-feng Chen?
Xiao-feng Chen is affiliated with the following schools: