2009 | ||
---|---|---|
83 | EE | Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen: Towards Provable Security for Data Transmission Protocols in Sensor Network. J. Inf. Sci. Eng. 25(1): 319-333 (2009) |
82 | EE | Wei Han, Kefei Chen, Dong Zheng: Receipt-Freeness for Groth e-Voting Schemes. J. Inf. Sci. Eng. 25(2): 517-530 (2009) |
2008 | ||
81 | Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Springer 2008 | |
80 | EE | Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 |
79 | EE | Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220 |
78 | EE | Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen: A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344 |
77 | EE | Lizhen Yang, Ling Dong, Kefei Chen: New Upper Bounds on Sizes of Permutation Arrays CoRR abs/0801.3983: (2008) |
76 | EE | Lizhen Yang, Kefei Chen, Luo Yuan: New Lower Bounds on Sizes of Permutation Arrays CoRR abs/0801.3986: (2008) |
75 | EE | Lizhen Yang, Kefei Chen, Luo Yuan: New Constructions of Permutation Arrays CoRR abs/0801.3987: (2008) |
74 | EE | Xiahong Lin, Lin Gao, Kefei Chen, David K. Y. Chiu: MOHCS: Towards Mining Overlapping Highly Connected Subgraphs CoRR abs/0806.3215: (2008) |
73 | EE | Zheng Gong, Xuejia Lai, Kefei Chen: A synthetic indifferentiability analysis of some block-cipher-based hash functions. Des. Codes Cryptography 48(3): 293-305 (2008) |
72 | EE | Yongguo Liu, Zhang Yi, Hong Wu, Mao Ye, Kefei Chen: A tabu search approach for the minimum sum-of-squares clustering problem. Inf. Sci. 178(12): 2680-2704 (2008) |
71 | EE | Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu: Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) |
70 | EE | Zheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen: A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. J. Inf. Sci. Eng. 24(5): 1347-1360 (2008) |
2007 | ||
69 | EE | Xiangxue Li, Dong Zheng, Kefei Chen: Efficient Blind Signatures from Linear Feedback Shift Register. CDVE 2007: 423-425 |
68 | EE | Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li: Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727 |
67 | EE | Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345 |
66 | EE | Xiangxue Li, Dong Zheng, Kefei Chen: Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ICA3PP 2007: 95-106 |
65 | EE | Shengli Liu, Kefei Chen, Weidong Qiu: Identity-Based Threshold Decryption Revisited. ISPEC 2007: 329-343 |
64 | EE | Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen: A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. PAISI 2007: 288-294 |
63 | EE | Hui Li, Yanfei Zheng, Mi Wen, Kefei Chen: A Secure Time Synchronization Protocol for Sensor Network. PAKDD Workshops 2007: 515-526 |
62 | EE | Mi Wen, Yanfei Zheng, Hui Li, Kefei Chen: A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. PAKDD Workshops 2007: 608-620 |
61 | EE | Zheng Gong, Yu Long, Kefei Chen: Efficient Partially Blind Signature from LFSR. SNPD (2) 2007: 717-722 |
60 | EE | Zheng Gong, Yu Long, Xuan Hong, Kefei Chen: Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD (3) 2007: 188-193 |
59 | EE | Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng: Protocol Engineering Principles for Cryptographic Protocols Design. SNPD (3) 2007: 641-646 |
58 | EE | Yu Long, Kefei Chen, Shengli Liu: ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Computers & Electrical Engineering 33(3): 166-176 (2007) |
57 | EE | Yu Long, Kefei Chen: Certificateless threshold cryptosystem secure against chosen-ciphertext attack. Inf. Sci. 177(24): 5620-5637 (2007) |
56 | EE | Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang: Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. Informatica, Lith. Acad. Sci. 18(3): 375-394 (2007) |
55 | EE | Jian Weng, Shengli Liu, Kefei Chen: Pirate decoder for the broadcast encryption schemes from Crypto 2005. Science in China Series F: Information Sciences 50(3): 318-323 (2007) |
2006 | ||
54 | Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006 | |
53 | Xuejia Lai, Kefei Chen: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings Springer 2006 | |
52 | David Pointcheval, Yi Mu, Kefei Chen: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings Springer 2006 | |
51 | EE | Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480 |
50 | EE | Zheng Gong, Xiangxue Li, Kefei Chen: Efficient Partially Blind Signature Scheme with Provable Security. COCOON 2006: 378-386 |
49 | EE | Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209 |
48 | EE | Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen: A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. ICSNC 2006: 29 |
47 | EE | Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423 |
46 | EE | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372 |
45 | EE | Feiyu Lei, Wen Chen, Kefei Chen: A Non-committing Encryption Scheme Based on Quadratic Residue. ISCIS 2006: 972-980 |
44 | EE | Ling Dong, Kefei Chen: A Practical Clumped-Tree Multicast Encryption Scheme. ISPEC 2006: 165-176 |
43 | EE | Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li: Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26 |
42 | EE | Yongguo Liu, Jun Peng, Kefei Chen, Yi Zhang: An Improved Hybrid Genetic Clustering Algorithm. SETN 2006: 192-202 |
41 | EE | Libin Wang, Kefei Chen: Comments on an access control model in semantic grid. Future Generation Comp. Syst. 22(1-2): 3-5 (2006) |
40 | EE | Libin Wang, Kefei Chen: Comments on a theorem on grid access control. Future Generation Comp. Syst. 22(4): 381-384 (2006) |
39 | EE | Zhenjie Huang, Kefei Chen, Yumin Wang: Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006) |
38 | EE | Yu Long, Kefei Chen, Shengli Liu: Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. Informatica, Lith. Acad. Sci. 17(4): 519-534 (2006) |
2005 | ||
37 | EE | Yongguo Liu, Yan Liu, Kefei Chen: Clustering with Noising Method. ADMA 2005: 209-216 |
36 | EE | Zhenjie Huang, Kefei Chen, Yumin Wang: Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133 |
35 | EE | Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen: A Novel Clustering Technique Based on Improved Noising Method. CIARP 2005: 81-92 |
34 | EE | Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen: A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. Discovery Science 2005: 380-382 |
33 | EE | Yongguo Liu, Libin Wang, Kefei Chen: A Tabu Search Based Method for Minimum Sum of Squares Clustering. ICAPR (1) 2005: 248-256 |
32 | EE | Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu: Identity Based Conference Key Distribution Scheme from Parings. ICCNMC 2005: 845-852 |
31 | Xiaoyun Wang, Kefei Chen: An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196 | |
30 | EE | Wei Wei, Xuhua Ding, Kefei Chen: Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. ICICS 2005: 269-279 |
29 | EE | Longjun Zhang, Han Wei, Dong Zheng, Kefei Chen: A Security Solution of WLAN Based on Public Key Cryptosystem. ICPADS (2) 2005: 422-427 |
28 | EE | Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu: Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243 |
27 | EE | Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563 |
26 | EE | Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen: A Hybrid Tabu Search Based Clustering Algorithm. KES (2) 2005: 186-192 |
25 | EE | Ruishan Zhang, Kefei Chen: An Efficient Asynchronous Proactive RSA Scheme. PDCAT 2005: 376-380 |
24 | Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng: Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56 | |
23 | EE | Weidong Qiu, Kefei Chen: Identity oriented signature scheme based on quadratic residues. Applied Mathematics and Computation 168(1): 235-242 (2005) |
22 | EE | Xiangxue Li, Kefei Chen: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation 169(1): 437-450 (2005) |
21 | EE | Yu Long, Zhenfu Cao, Kefei Chen: A dynamic threshold commercial key escrow scheme based on conic. Applied Mathematics and Computation 171(2): 972-982 (2005) |
20 | EE | Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen: Efficient Authenticated Encryption Schemes with Public Verifiability CoRR abs/cs/0504019: (2005) |
19 | EE | Ruishan Zhang, Kefei Chen: Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security 24(1): 76-82 (2005) |
18 | EE | Luo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen: Some new characters on the wire-tap channel of type II. IEEE Transactions on Information Theory 51(3): 1222-1229 (2005) |
2004 | ||
17 | EE | Dong Zheng, Huang Zheng, Kefei Chen, Weidong Kou: ID-Based Proxy Blind Signature. AINA (2) 2004: 380-383 |
16 | EE | Xiaoyun Wang, Lizhen Yang, Kefei Chen: SDD: Secure Distributed Diffusion Protocol for Sensor Networks. ESAS 2004: 205-214 |
15 | EE | Xiangxue Li, Kefei Chen: Identity Based Proxy-Signcryption Scheme from Pairings. IEEE SCC 2004: 494-497 |
14 | EE | Xiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li: Proxy Structured Multisignature Scheme from Bilinear Pairings. ISPA 2004: 705-714 |
13 | EE | Qing Yang, Kefei Chen: Digital Image Authentication Based on Turbo Codes. MIPS 2004: 276-286 |
12 | EE | Xiangxue Li, Kefei Chen, Shiqun Li: Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. PDCAT 2004: 591-595 |
11 | EE | Shengli Liu, Fang-Guo Zhang, Kefei Chen: Authenticating Tripartite Key Agreement Protocol with Pairings. J. Comput. Sci. Technol. 19(2): 169-176 (2004) |
10 | EE | Yongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang: A genetic clustering method for intrusion detection. Pattern Recognition 37(5): 927-942 (2004) |
2003 | ||
9 | EE | Libin Wang, Kefei Chen: A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ACISP 2003: 154-165 |
8 | EE | Xianfeng Zhao, Weinong Wang, Kefei Chen: On the Noninvertibility of Adaptive Digital Watermarking. DEXA Workshops 2003: 347-351 |
7 | EE | Xianfeng Zhao, Weinong Wang, Kefei Chen: Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. WAIM 2003: 483-494 |
6 | EE | Kefei Chen, Sheng Zhong: Attacks on the (enhanced) Yang-Shieh authentication. Computers & Security 22(8): 725-727 (2003) |
2002 | ||
5 | EE | Zheng Huang, Kefei Chen: Electronic Payment in Mobile Environment. DEXA Workshops 2002: 413-417 |
4 | EE | Weidong Qiu, Kefei Chen, Dawu Gu: A New Offline Privacy Protecting E-cash System with Revokable Anonymity. ISC 2002: 177-190 |
3 | EE | Xianfeng Zhao, Weinong Wang, Kefei Chen: Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. WAIM 2002: 430-440 |
2 | EE | Dong Zheng, Kefei Chen, Jinyuan You: Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. J. Comput. Sci. Technol. 17(6): 749-756 (2002) |
1995 | ||
1 | Kefei Chen: A New Identification Algorithm. Cryptography: Policy and Algorithms 1995: 244-249 |