dblp.uni-trier.dewww.uni-trier.de

Kefei Chen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
83EEMi Wen, Ling Dong, Yanfei Zheng, Kefei Chen: Towards Provable Security for Data Transmission Protocols in Sensor Network. J. Inf. Sci. Eng. 25(1): 319-333 (2009)
82EEWei Han, Kefei Chen, Dong Zheng: Receipt-Freeness for Groth e-Voting Schemes. J. Inf. Sci. Eng. 25(2): 517-530 (2009)
2008
81 Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Springer 2008
80EERobert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17
79EEJian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220
78EEWei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen: A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344
77EELizhen Yang, Ling Dong, Kefei Chen: New Upper Bounds on Sizes of Permutation Arrays CoRR abs/0801.3983: (2008)
76EELizhen Yang, Kefei Chen, Luo Yuan: New Lower Bounds on Sizes of Permutation Arrays CoRR abs/0801.3986: (2008)
75EELizhen Yang, Kefei Chen, Luo Yuan: New Constructions of Permutation Arrays CoRR abs/0801.3987: (2008)
74EEXiahong Lin, Lin Gao, Kefei Chen, David K. Y. Chiu: MOHCS: Towards Mining Overlapping Highly Connected Subgraphs CoRR abs/0806.3215: (2008)
73EEZheng Gong, Xuejia Lai, Kefei Chen: A synthetic indifferentiability analysis of some block-cipher-based hash functions. Des. Codes Cryptography 48(3): 293-305 (2008)
72EEYongguo Liu, Zhang Yi, Hong Wu, Mao Ye, Kefei Chen: A tabu search approach for the minimum sum-of-squares clustering problem. Inf. Sci. 178(12): 2680-2704 (2008)
71EEJian Weng, Xiangxue Li, Kefei Chen, Shengli Liu: Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008)
70EEZheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen: A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. J. Inf. Sci. Eng. 24(5): 1347-1360 (2008)
2007
69EEXiangxue Li, Dong Zheng, Kefei Chen: Efficient Blind Signatures from Linear Feedback Shift Register. CDVE 2007: 423-425
68EEDong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li: Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727
67EEShiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345
66EEXiangxue Li, Dong Zheng, Kefei Chen: Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ICA3PP 2007: 95-106
65EEShengli Liu, Kefei Chen, Weidong Qiu: Identity-Based Threshold Decryption Revisited. ISPEC 2007: 329-343
64EEMi Wen, Ling Dong, Yanfei Zheng, Kefei Chen: A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. PAISI 2007: 288-294
63EEHui Li, Yanfei Zheng, Mi Wen, Kefei Chen: A Secure Time Synchronization Protocol for Sensor Network. PAKDD Workshops 2007: 515-526
62EEMi Wen, Yanfei Zheng, Hui Li, Kefei Chen: A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. PAKDD Workshops 2007: 608-620
61EEZheng Gong, Yu Long, Kefei Chen: Efficient Partially Blind Signature from LFSR. SNPD (2) 2007: 717-722
60EEZheng Gong, Yu Long, Xuan Hong, Kefei Chen: Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD (3) 2007: 188-193
59EELing Dong, Kefei Chen, Mi Wen, Yanfei Zheng: Protocol Engineering Principles for Cryptographic Protocols Design. SNPD (3) 2007: 641-646
58EEYu Long, Kefei Chen, Shengli Liu: ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Computers & Electrical Engineering 33(3): 166-176 (2007)
57EEYu Long, Kefei Chen: Certificateless threshold cryptosystem secure against chosen-ciphertext attack. Inf. Sci. 177(24): 5620-5637 (2007)
56EEZhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang: Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. Informatica, Lith. Acad. Sci. 18(3): 375-394 (2007)
55EEJian Weng, Shengli Liu, Kefei Chen: Pirate decoder for the broadcast encryption schemes from Crypto 2005. Science in China Series F: Information Sciences 50(3): 318-323 (2007)
2006
54 Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006
53 Xuejia Lai, Kefei Chen: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings Springer 2006
52 David Pointcheval, Yi Mu, Kefei Chen: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings Springer 2006
51EEJian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480
50EEZheng Gong, Xiangxue Li, Kefei Chen: Efficient Partially Blind Signature Scheme with Provable Security. COCOON 2006: 378-386
49EEShiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209
48EEHui Li, Kefei Chen, Yanfei Zheng, Mi Wen: A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. ICSNC 2006: 29
47EEJian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423
46EEJie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372
45EEFeiyu Lei, Wen Chen, Kefei Chen: A Non-committing Encryption Scheme Based on Quadratic Residue. ISCIS 2006: 972-980
44EELing Dong, Kefei Chen: A Practical Clumped-Tree Multicast Encryption Scheme. ISPEC 2006: 165-176
43EEJian Weng, Shengli Liu, Kefei Chen, Xiangxue Li: Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26
42EEYongguo Liu, Jun Peng, Kefei Chen, Yi Zhang: An Improved Hybrid Genetic Clustering Algorithm. SETN 2006: 192-202
41EELibin Wang, Kefei Chen: Comments on an access control model in semantic grid. Future Generation Comp. Syst. 22(1-2): 3-5 (2006)
40EELibin Wang, Kefei Chen: Comments on a theorem on grid access control. Future Generation Comp. Syst. 22(4): 381-384 (2006)
39EEZhenjie Huang, Kefei Chen, Yumin Wang: Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006)
38EEYu Long, Kefei Chen, Shengli Liu: Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. Informatica, Lith. Acad. Sci. 17(4): 519-534 (2006)
2005
37EEYongguo Liu, Yan Liu, Kefei Chen: Clustering with Noising Method. ADMA 2005: 209-216
36EEZhenjie Huang, Kefei Chen, Yumin Wang: Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133
35EEYongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen: A Novel Clustering Technique Based on Improved Noising Method. CIARP 2005: 81-92
34EEYongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen: A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. Discovery Science 2005: 380-382
33EEYongguo Liu, Libin Wang, Kefei Chen: A Tabu Search Based Method for Minimum Sum of Squares Clustering. ICAPR (1) 2005: 248-256
32EEShiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu: Identity Based Conference Key Distribution Scheme from Parings. ICCNMC 2005: 845-852
31 Xiaoyun Wang, Kefei Chen: An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196
30EEWei Wei, Xuhua Ding, Kefei Chen: Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. ICICS 2005: 269-279
29EELongjun Zhang, Han Wei, Dong Zheng, Kefei Chen: A Security Solution of WLAN Based on Public Key Cryptosystem. ICPADS (2) 2005: 422-427
28EEChangshe Ma, Kefei Chen, Dong Zheng, Shengli Liu: Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243
27EEShiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563
26EEYongguo Liu, Yan Liu, Libin Wang, Kefei Chen: A Hybrid Tabu Search Based Clustering Algorithm. KES (2) 2005: 186-192
25EERuishan Zhang, Kefei Chen: An Efficient Asynchronous Proactive RSA Scheme. PDCAT 2005: 376-380
24 Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng: Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56
23EEWeidong Qiu, Kefei Chen: Identity oriented signature scheme based on quadratic residues. Applied Mathematics and Computation 168(1): 235-242 (2005)
22EEXiangxue Li, Kefei Chen: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation 169(1): 437-450 (2005)
21EEYu Long, Zhenfu Cao, Kefei Chen: A dynamic threshold commercial key escrow scheme based on conic. Applied Mathematics and Computation 171(2): 972-982 (2005)
20EEGuilin Wang, Feng Bao, Changshe Ma, Kefei Chen: Efficient Authenticated Encryption Schemes with Public Verifiability CoRR abs/cs/0504019: (2005)
19EERuishan Zhang, Kefei Chen: Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security 24(1): 76-82 (2005)
18EELuo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen: Some new characters on the wire-tap channel of type II. IEEE Transactions on Information Theory 51(3): 1222-1229 (2005)
2004
17EEDong Zheng, Huang Zheng, Kefei Chen, Weidong Kou: ID-Based Proxy Blind Signature. AINA (2) 2004: 380-383
16EEXiaoyun Wang, Lizhen Yang, Kefei Chen: SDD: Secure Distributed Diffusion Protocol for Sensor Networks. ESAS 2004: 205-214
15EEXiangxue Li, Kefei Chen: Identity Based Proxy-Signcryption Scheme from Pairings. IEEE SCC 2004: 494-497
14EEXiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li: Proxy Structured Multisignature Scheme from Bilinear Pairings. ISPA 2004: 705-714
13EEQing Yang, Kefei Chen: Digital Image Authentication Based on Turbo Codes. MIPS 2004: 276-286
12EEXiangxue Li, Kefei Chen, Shiqun Li: Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. PDCAT 2004: 591-595
11EEShengli Liu, Fang-Guo Zhang, Kefei Chen: Authenticating Tripartite Key Agreement Protocol with Pairings. J. Comput. Sci. Technol. 19(2): 169-176 (2004)
10EEYongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang: A genetic clustering method for intrusion detection. Pattern Recognition 37(5): 927-942 (2004)
2003
9EELibin Wang, Kefei Chen: A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ACISP 2003: 154-165
8EEXianfeng Zhao, Weinong Wang, Kefei Chen: On the Noninvertibility of Adaptive Digital Watermarking. DEXA Workshops 2003: 347-351
7EEXianfeng Zhao, Weinong Wang, Kefei Chen: Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. WAIM 2003: 483-494
6EEKefei Chen, Sheng Zhong: Attacks on the (enhanced) Yang-Shieh authentication. Computers & Security 22(8): 725-727 (2003)
2002
5EEZheng Huang, Kefei Chen: Electronic Payment in Mobile Environment. DEXA Workshops 2002: 413-417
4EEWeidong Qiu, Kefei Chen, Dawu Gu: A New Offline Privacy Protecting E-cash System with Revokable Anonymity. ISC 2002: 177-190
3EEXianfeng Zhao, Weinong Wang, Kefei Chen: Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. WAIM 2002: 430-440
2EEDong Zheng, Kefei Chen, Jinyuan You: Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. J. Comput. Sci. Technol. 17(6): 749-756 (2002)
1995
1 Kefei Chen: A New Identification Algorithm. Cryptography: Policy and Algorithms 1995: 244-249

Coauthor Index

1Joonsang Baek [81]
2Shane Balfe [49]
3Feng Bao [20] [81]
4Zhenfu Cao [21]
5Wen Chen [45]
6Xiaofeng Chen [78]
7David K. Y. Chiu [74]
8Robert H. Deng (Robert Huijie Deng) [46] [54] [80]
9Xuhua Ding [30]
10Ling Dong [44] [59] [64] [77] [83]
11Lin Gao [74]
12Zheng Gong [50] [60] [61] [70] [73]
13Dawu Gu [4]
14Jie Guo [46]
15Wei Han [78] [82]
16Tao Hao [78]
17Xuan Hong [60]
18Rufen Huang [56]
19Zheng Huang [5]
20Zhenjie Huang [36] [39] [56]
21Weidong Kou [17]
22Xuejia Lai [53] [54] [73] [81]
23Feiyu Lei [45]
24Hui Li [48] [62] [63]
25Jianhua Li [68]
26Shiqun Li [12] [14] [27] [32] [34] [49] [67]
27Xiangxue Li [12] [14] [15] [22] [27] [32] [43] [50] [66] [68] [69] [70] [71]
28Yingjiu Li [46]
29Xiaofeng Liao [10]
30Xiahong Lin [74]
31Xuanzhi Lin [56]
32Shengli Liu [11] [24] [28] [38] [43] [47] [51] [55] [58] [65] [71] [79] [80]
33Yan Liu (Yan (Jenny) Liu) [26] [37]
34Yongguo Liu [10] [26] [33] [34] [35] [37] [42] [72]
35Yu Long [21] [38] [57] [58] [60] [61]
36Rongxing Lu [32]
37Changshe Ma [20] [24] [28] [47] [51]
38Chaichana Mitrpant [18]
39Yi Mu [52]
40Jun Peng [42]
41David Pointcheval [52]
42Weidong Qiu [4] [23] [65] [79]
43A. J. Han Vinck [18]
44Guilin Wang [20] [67]
45Libin Wang [9] [26] [33] [34] [40] [41]
46Weinong Wang [3] [7] [8]
47Xiaoyun Wang [16] [31]
48Yumin Wang [36] [39]
49Han Wei [29]
50Wei Wei [30]
51Mi Wen [48] [59] [62] [63] [64] [83]
52Jian Weng [43] [47] [51] [55] [71] [79] [80]
53Hong Wu [72]
54Lizhen Yang [16] [75] [76] [77]
55Qing Yang [13]
56Mao Ye [72]
57Zhang Yi [72]
58Jinyuan You [2]
59Luo Yuan [18] [75] [76]
60Fang-Guo Zhang [11]
61Longjun Zhang [14] [29]
62Ruishan Zhang [19] [25]
63Wei Zhang [10] [35]
64Yi Zhang [42]
65Xianfeng Zhao [3] [7] [8]
66Dong Zheng [2] [17] [24] [28] [29] [34] [35] [66] [68] [69] [70] [78] [79] [82]
67Huang Zheng [17]
68Yanfei Zheng [48] [59] [62] [63] [64] [83]
69Sheng Zhong [6]
70Jianying Zhou [27] [49] [54] [67]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)