2009 |
83 | EE | Mi Wen,
Ling Dong,
Yanfei Zheng,
Kefei Chen:
Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng. 25(1): 319-333 (2009) |
82 | EE | Wei Han,
Kefei Chen,
Dong Zheng:
Receipt-Freeness for Groth e-Voting Schemes.
J. Inf. Sci. Eng. 25(2): 517-530 (2009) |
2008 |
81 | | Joonsang Baek,
Feng Bao,
Kefei Chen,
Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Springer 2008 |
80 | EE | Robert H. Deng,
Jian Weng,
Shengli Liu,
Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
CANS 2008: 1-17 |
79 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Dong Zheng,
Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
CT-RSA 2008: 203-220 |
78 | EE | Wei Han,
Tao Hao,
Dong Zheng,
Kefei Chen,
Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels.
ProvSec 2008: 335-344 |
77 | EE | Lizhen Yang,
Ling Dong,
Kefei Chen:
New Upper Bounds on Sizes of Permutation Arrays
CoRR abs/0801.3983: (2008) |
76 | EE | Lizhen Yang,
Kefei Chen,
Luo Yuan:
New Lower Bounds on Sizes of Permutation Arrays
CoRR abs/0801.3986: (2008) |
75 | EE | Lizhen Yang,
Kefei Chen,
Luo Yuan:
New Constructions of Permutation Arrays
CoRR abs/0801.3987: (2008) |
74 | EE | Xiahong Lin,
Lin Gao,
Kefei Chen,
David K. Y. Chiu:
MOHCS: Towards Mining Overlapping Highly Connected Subgraphs
CoRR abs/0806.3215: (2008) |
73 | EE | Zheng Gong,
Xuejia Lai,
Kefei Chen:
A synthetic indifferentiability analysis of some block-cipher-based hash functions.
Des. Codes Cryptography 48(3): 293-305 (2008) |
72 | EE | Yongguo Liu,
Zhang Yi,
Hong Wu,
Mao Ye,
Kefei Chen:
A tabu search approach for the minimum sum-of-squares clustering problem.
Inf. Sci. 178(12): 2680-2704 (2008) |
71 | EE | Jian Weng,
Xiangxue Li,
Kefei Chen,
Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) |
70 | EE | Zheng Gong,
Xiangxue Li,
Dong Zheng,
Kefei Chen:
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng. 24(5): 1347-1360 (2008) |
2007 |
69 | EE | Xiangxue Li,
Dong Zheng,
Kefei Chen:
Efficient Blind Signatures from Linear Feedback Shift Register.
CDVE 2007: 423-425 |
68 | EE | Dong Zheng,
Xiangxue Li,
Kefei Chen,
Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register.
EUC Workshops 2007: 716-727 |
67 | EE | Shiqun Li,
Guilin Wang,
Jianying Zhou,
Kefei Chen:
Undeniable Mobile Billing Schemes.
EuroPKI 2007: 338-345 |
66 | EE | Xiangxue Li,
Dong Zheng,
Kefei Chen:
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
ICA3PP 2007: 95-106 |
65 | EE | Shengli Liu,
Kefei Chen,
Weidong Qiu:
Identity-Based Threshold Decryption Revisited.
ISPEC 2007: 329-343 |
64 | EE | Mi Wen,
Ling Dong,
Yanfei Zheng,
Kefei Chen:
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
PAISI 2007: 288-294 |
63 | EE | Hui Li,
Yanfei Zheng,
Mi Wen,
Kefei Chen:
A Secure Time Synchronization Protocol for Sensor Network.
PAKDD Workshops 2007: 515-526 |
62 | EE | Mi Wen,
Yanfei Zheng,
Hui Li,
Kefei Chen:
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
PAKDD Workshops 2007: 608-620 |
61 | EE | Zheng Gong,
Yu Long,
Kefei Chen:
Efficient Partially Blind Signature from LFSR.
SNPD (2) 2007: 717-722 |
60 | EE | Zheng Gong,
Yu Long,
Xuan Hong,
Kefei Chen:
Two Certificateless Aggregate Signatures From Bilinear Maps.
SNPD (3) 2007: 188-193 |
59 | EE | Ling Dong,
Kefei Chen,
Mi Wen,
Yanfei Zheng:
Protocol Engineering Principles for Cryptographic Protocols Design.
SNPD (3) 2007: 641-646 |
58 | EE | Yu Long,
Kefei Chen,
Shengli Liu:
ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Computers & Electrical Engineering 33(3): 166-176 (2007) |
57 | EE | Yu Long,
Kefei Chen:
Certificateless threshold cryptosystem secure against chosen-ciphertext attack.
Inf. Sci. 177(24): 5620-5637 (2007) |
56 | EE | Zhenjie Huang,
Kefei Chen,
Xuanzhi Lin,
Rufen Huang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
Informatica, Lith. Acad. Sci. 18(3): 375-394 (2007) |
55 | EE | Jian Weng,
Shengli Liu,
Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Science in China Series F: Information Sciences 50(3): 318-323 (2007) |
2006 |
54 | | Kefei Chen,
Robert H. Deng,
Xuejia Lai,
Jianying Zhou:
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Springer 2006 |
53 | | Xuejia Lai,
Kefei Chen:
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
Springer 2006 |
52 | | David Pointcheval,
Yi Mu,
Kefei Chen:
Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
Springer 2006 |
51 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles.
CIS 2006: 470-480 |
50 | EE | Zheng Gong,
Xiangxue Li,
Kefei Chen:
Efficient Partially Blind Signature Scheme with Provable Security.
COCOON 2006: 378-386 |
49 | EE | Shiqun Li,
Shane Balfe,
Jianying Zhou,
Kefei Chen:
Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
CRITIS 2006: 195-209 |
48 | EE | Hui Li,
Kefei Chen,
Yanfei Zheng,
Mi Wen:
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
ICSNC 2006: 29 |
47 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
INDOCRYPT 2006: 409-423 |
46 | EE | Jie Guo,
Yingjiu Li,
Robert H. Deng,
Kefei Chen:
Rights Protection for Data Cubes.
ISC 2006: 359-372 |
45 | EE | Feiyu Lei,
Wen Chen,
Kefei Chen:
A Non-committing Encryption Scheme Based on Quadratic Residue.
ISCIS 2006: 972-980 |
44 | EE | Ling Dong,
Kefei Chen:
A Practical Clumped-Tree Multicast Encryption Scheme.
ISPEC 2006: 165-176 |
43 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates.
Inscrypt 2006: 13-26 |
42 | EE | Yongguo Liu,
Jun Peng,
Kefei Chen,
Yi Zhang:
An Improved Hybrid Genetic Clustering Algorithm.
SETN 2006: 192-202 |
41 | EE | Libin Wang,
Kefei Chen:
Comments on an access control model in semantic grid.
Future Generation Comp. Syst. 22(1-2): 3-5 (2006) |
40 | EE | Libin Wang,
Kefei Chen:
Comments on a theorem on grid access control.
Future Generation Comp. Syst. 22(4): 381-384 (2006) |
39 | EE | Zhenjie Huang,
Kefei Chen,
Yumin Wang:
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures.
Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006) |
38 | EE | Yu Long,
Kefei Chen,
Shengli Liu:
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, Lith. Acad. Sci. 17(4): 519-534 (2006) |
2005 |
37 | EE | Yongguo Liu,
Yan Liu,
Kefei Chen:
Clustering with Noising Method.
ADMA 2005: 209-216 |
36 | EE | Zhenjie Huang,
Kefei Chen,
Yumin Wang:
Efficient Identity-Based Signatures and Blind Signatures.
CANS 2005: 120-133 |
35 | EE | Yongguo Liu,
Wei Zhang,
Dong Zheng,
Kefei Chen:
A Novel Clustering Technique Based on Improved Noising Method.
CIARP 2005: 81-92 |
34 | EE | Yongguo Liu,
Dong Zheng,
Shiqun Li,
Libin Wang,
Kefei Chen:
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Discovery Science 2005: 380-382 |
33 | EE | Yongguo Liu,
Libin Wang,
Kefei Chen:
A Tabu Search Based Method for Minimum Sum of Squares Clustering.
ICAPR (1) 2005: 248-256 |
32 | EE | Shiqun Li,
Kefei Chen,
Xiangxue Li,
Rongxing Lu:
Identity Based Conference Key Distribution Scheme from Parings.
ICCNMC 2005: 845-852 |
31 | | Xiaoyun Wang,
Kefei Chen:
An efficient proxy signature scheme in home network DRM.
ICETE 2005: 191-196 |
30 | EE | Wei Wei,
Xuhua Ding,
Kefei Chen:
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
ICICS 2005: 269-279 |
29 | EE | Longjun Zhang,
Han Wei,
Dong Zheng,
Kefei Chen:
A Security Solution of WLAN Based on Public Key Cryptosystem.
ICPADS (2) 2005: 422-427 |
28 | EE | Changshe Ma,
Kefei Chen,
Dong Zheng,
Shengli Liu:
Efficient and Proactive Threshold Signcryption.
ISC 2005: 233-243 |
27 | EE | Shiqun Li,
Jianying Zhou,
Xiangxue Li,
Kefei Chen:
An Authentication Protocol for Pervasive Computing.
ISPA 2005: 553-563 |
26 | EE | Yongguo Liu,
Yan Liu,
Libin Wang,
Kefei Chen:
A Hybrid Tabu Search Based Clustering Algorithm.
KES (2) 2005: 186-192 |
25 | EE | Ruishan Zhang,
Kefei Chen:
An Efficient Asynchronous Proactive RSA Scheme.
PDCAT 2005: 376-380 |
24 | | Changshe Ma,
Kefei Chen,
Shengli Liu,
Dong Zheng:
Transitive Signatures Based on Bilinear Maps.
WOSIS 2005: 48-56 |
23 | EE | Weidong Qiu,
Kefei Chen:
Identity oriented signature scheme based on quadratic residues.
Applied Mathematics and Computation 168(1): 235-242 (2005) |
22 | EE | Xiangxue Li,
Kefei Chen:
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.
Applied Mathematics and Computation 169(1): 437-450 (2005) |
21 | EE | Yu Long,
Zhenfu Cao,
Kefei Chen:
A dynamic threshold commercial key escrow scheme based on conic.
Applied Mathematics and Computation 171(2): 972-982 (2005) |
20 | EE | Guilin Wang,
Feng Bao,
Changshe Ma,
Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability
CoRR abs/cs/0504019: (2005) |
19 | EE | Ruishan Zhang,
Kefei Chen:
Improvements on the WTLS protocol to avoid denial of service attacks.
Computers & Security 24(1): 76-82 (2005) |
18 | EE | Luo Yuan,
Chaichana Mitrpant,
A. J. Han Vinck,
Kefei Chen:
Some new characters on the wire-tap channel of type II.
IEEE Transactions on Information Theory 51(3): 1222-1229 (2005) |
2004 |
17 | EE | Dong Zheng,
Huang Zheng,
Kefei Chen,
Weidong Kou:
ID-Based Proxy Blind Signature.
AINA (2) 2004: 380-383 |
16 | EE | Xiaoyun Wang,
Lizhen Yang,
Kefei Chen:
SDD: Secure Distributed Diffusion Protocol for Sensor Networks.
ESAS 2004: 205-214 |
15 | EE | Xiangxue Li,
Kefei Chen:
Identity Based Proxy-Signcryption Scheme from Pairings.
IEEE SCC 2004: 494-497 |
14 | EE | Xiangxue Li,
Kefei Chen,
Longjun Zhang,
Shiqun Li:
Proxy Structured Multisignature Scheme from Bilinear Pairings.
ISPA 2004: 705-714 |
13 | EE | Qing Yang,
Kefei Chen:
Digital Image Authentication Based on Turbo Codes.
MIPS 2004: 276-286 |
12 | EE | Xiangxue Li,
Kefei Chen,
Shiqun Li:
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings.
PDCAT 2004: 591-595 |
11 | EE | Shengli Liu,
Fang-Guo Zhang,
Kefei Chen:
Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol. 19(2): 169-176 (2004) |
10 | EE | Yongguo Liu,
Kefei Chen,
Xiaofeng Liao,
Wei Zhang:
A genetic clustering method for intrusion detection.
Pattern Recognition 37(5): 927-942 (2004) |
2003 |
9 | EE | Libin Wang,
Kefei Chen:
A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
ACISP 2003: 154-165 |
8 | EE | Xianfeng Zhao,
Weinong Wang,
Kefei Chen:
On the Noninvertibility of Adaptive Digital Watermarking.
DEXA Workshops 2003: 347-351 |
7 | EE | Xianfeng Zhao,
Weinong Wang,
Kefei Chen:
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing.
WAIM 2003: 483-494 |
6 | EE | Kefei Chen,
Sheng Zhong:
Attacks on the (enhanced) Yang-Shieh authentication.
Computers & Security 22(8): 725-727 (2003) |
2002 |
5 | EE | Zheng Huang,
Kefei Chen:
Electronic Payment in Mobile Environment.
DEXA Workshops 2002: 413-417 |
4 | EE | Weidong Qiu,
Kefei Chen,
Dawu Gu:
A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
ISC 2002: 177-190 |
3 | EE | Xianfeng Zhao,
Weinong Wang,
Kefei Chen:
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
WAIM 2002: 430-440 |
2 | EE | Dong Zheng,
Kefei Chen,
Jinyuan You:
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol. 17(6): 749-756 (2002) |
1995 |
1 | | Kefei Chen:
A New Identification Algorithm.
Cryptography: Policy and Algorithms 1995: 244-249 |