![]() | ![]() |
Sun Yat-sen University, Guangzhou, China
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2009 | ||
---|---|---|
28 | EE | Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim: The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009) |
2008 | ||
27 | EE | Fangguo Zhang, Xiaofeng Chen, Baodian Wei: Efficient designated confirmer signature from bilinear pairings. ASIACCS 2008: 363-368 |
26 | EE | Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen: A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344 |
25 | EE | Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) |
24 | EE | Shengli Liu, Xiaofeng Chen, Fang-Guo Zhang: Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. J. Comput. Sci. Technol. 23(2): 265-269 (2008) |
2007 | ||
23 | EE | Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 |
22 | EE | Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen: Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ProvSec 2007: 208-217 |
21 | EE | Xiaofeng Chen, Fangguo Zhang, Shengli Liu: ID-based restrictive partially blind signatures and applications. Journal of Systems and Software 80(2): 164-171 (2007) |
2006 | ||
20 | EE | Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang: Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. CIS 2006: 545-555 |
19 | EE | Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang: Generalization of the Selective-ID Security Model for HIBS Protocols. CIS 2006: 894-902 |
18 | EE | Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo: Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 |
17 | EE | Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu: A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 |
2005 | ||
16 | EE | Xiaofeng Chen, Fangguo Zhang, Shengli Liu: ID-Based Restrictive Partially Blind Signatures. CIS (2) 2005: 117-124 |
15 | EE | Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 |
14 | EE | Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen: Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 |
13 | EE | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang: t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421 |
12 | EE | Fangguo Zhang, Xiaofeng Chen: Cryptanalysis of Huang-Chang partially blind signature scheme. Journal of Systems and Software 76(3): 323-325 (2005) |
2004 | ||
11 | EE | Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim: Limited Verifier Signature from Bilinear Pairings. ACNS 2004: 135-148 |
10 | EE | Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang: Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389 |
9 | EE | Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim: New ID-Based Threshold Signature Scheme from Bilinear Pairings. INDOCRYPT 2004: 371-383 |
8 | EE | Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang: Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341 |
7 | EE | Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim: Chameleon Hashing Without Key Exposure. ISC 2004: 87-98 |
6 | EE | Fangguo Zhang, Xiaofeng Chen: Attack on an ID-based authenticated group key agreement scheme from PKC 2004. Inf. Process. Lett. 91(4): 191-193 (2004) |
2003 | ||
5 | EE | Changjie Wang, Xiaofeng Chen, Yumin Wang: An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. AINA 2003: 194-197 |
4 | EE | Xiaofeng Chen, Fei Feng, Yumin Wang: New Key Improvements and Its Application to XTR System. AINA 2003: 561-564 |
3 | EE | Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim: ID-Based Distributed "Magic Ink" Signature from Pairings. ICICS 2003: 249-259 |
2 | EE | Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim: Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. ICISC 2003: 259-273 |
2002 | ||
1 | EE | Xiaofeng Chen, Changjie Wang, Yumin Wang: Fair Electronic Cash Based on Double Signatur. J. Comput. Sci. Technol. 17(6): 830-835 (2002) |
1 | Kefei Chen | [26] |
2 | Fei Feng | [4] |
3 | Wei Han | [26] |
4 | Tao Hao | [26] |
5 | Xinyi Huang | [15] |
6 | Kwangjo Kim | [2] [3] [7] [9] [11] [22] [25] [28] |
7 | Divyan M. Konidala | [9] |
8 | Byoungcheon Lee | [2] |
9 | Hyunrok Lee | [25] |
10 | Jin Li | [19] [20] [22] |
11 | Shengli Liu | [16] [21] [24] |
12 | Jiqiang Lu (Jiqiang Lv) | [28] |
13 | Yi Mu | [14] [15] [17] [18] [23] [25] |
14 | Bo Qin | [13] |
15 | Kui Ren | [28] |
16 | Willy Susilo | [14] [15] [17] [18] [23] [25] |
17 | Haibo Tian | [25] |
18 | Changjie Wang | [1] [5] [8] [10] [13] |
19 | Yanming Wang | [19] [20] |
20 | Yumin Wang | [1] [4] [5] [8] [10] [13] |
21 | Baodian Wei | [25] [27] |
22 | Qianhong Wu | [8] [10] [13] |
23 | Yan Xie | [3] |
24 | Tsz Hon Yuen | [20] |
25 | Fang-Guo Zhang | [24] |
26 | Fangguo Zhang | [3] [6] [7] [9] [11] [12] [14] [15] [16] [17] [18] [19] [21] [22] [23] [25] [27] |
27 | Dong Zheng | [26] |