default search action
Chunxiang Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j114]Junjie Hu, Zhe Jiang, Chunxiang Xu:
Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG. Int. J. Intell. Syst. 2024: 1-13 (2024) - [j113]Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu:
BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management. J. Inf. Sci. Eng. 40(1): 1-26 (2024) - [j112]Zhen Liu, Changsong Jiang, Chunxiang Xu:
A portable blind cloud storage scheme against compromised servers. J. Syst. Archit. 146: 103037 (2024) - [j111]Zhao Zhang, Chunxiang Xu, Changsong Jiang, Kefei Chen:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. IEEE Trans. Dependable Secur. Comput. 21(4): 1515-1527 (2024) - [j110]Yaqing Song, Chunxiang Xu, Yuan Zhang, Shiyu Li:
Hardening Password-Based Credential Databases. IEEE Trans. Inf. Forensics Secur. 19: 469-484 (2024) - [j109]Changsong Jiang, Chunxiang Xu, Yunxia Han, Zhao Zhang, Kefei Chen:
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates. IEEE Trans. Inf. Forensics Secur. 19: 3844-3856 (2024) - [j108]Zhao Zhang, Chunxiang Xu, Yunxia Han:
Privacy-Preserving Cryptocurrency With Threshold Authentication and Regulation. IEEE Trans. Inf. Forensics Secur. 19: 6620-6635 (2024) - [c46]Changsong Jiang, Chunxiang Xu, Guomin Yang:
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication. ESORICS (4) 2024: 396-413 - 2023
- [j107]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen:
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts. IEEE Internet Things J. 10(16): 14269-14284 (2023) - [j106]Yaqing Song, Yuan Zhang, Chunxiang Xu, Shiyu Li, Anjia Yang, Nan Cheng:
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers. IEEE Internet Things J. 10(17): 15563-15580 (2023) - [j105]Changsong Jiang, Chunxiang Xu, Chenchen Cao, Kefei Chen:
GAIN: Decentralized Privacy-Preserving Federated Learning. J. Inf. Secur. Appl. 78: 103615 (2023) - [j104]Yunxia Han, Chunxiang Xu, Shanshan Li, Changsong Jiang, Kefei Chen:
ttPAKE: Typo tolerance password-authenticated key exchange. J. Inf. Secur. Appl. 79: 103658 (2023) - [j103]Md. Jakir Hossain, Chunxiang Xu, Yuan Zhang, Xiaojun Zhang, Wanpeng Li:
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator. J. Ambient Intell. Humaniz. Comput. 14(7): 8613-8629 (2023) - [j102]Yuxiang Chen, Guishan Dong, Chunxiang Xu, Yao Hao, Yue Zhao:
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. Sensors 23(20): 8526 (2023) - [j101]Lixue Sun, Chunxiang Xu, Xiaojun Zhang, Fugeng Zeng:
Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things. IEEE Syst. J. 17(3): 4521-4532 (2023) - [j100]Changsong Jiang, Chunxiang Xu, Zhao Zhang, Kefei Chen:
SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search. IEEE Trans. Cloud Comput. 11(3): 3168-3183 (2023) - [j99]Shiyu Li, Yuan Zhang, Chunxiang Xu, Nan Cheng, Zhi Liu, Yicong Du, Xuemin Shen:
HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain. IEEE Trans. Mob. Comput. 22(11): 6508-6525 (2023) - [j98]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Kefei Chen:
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. IEEE Trans. Serv. Comput. 16(1): 134-146 (2023) - [c45]Changsong Jiang, Chunxiang Xu, Kefei Chen:
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things. Inscrypt (2) 2023: 389-393 - [c44]Qinghua Hu, Chunxiang Xu, Wanpeng Li:
A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key. TrustCom 2023: 814-822 - [i8]Junjie Hu, Chunxiang Xu, Zhe Jiang, Jiwu Cao:
Novel bribery mining attacks in the bitcoin system and the bribery miner's dilemma. CoRR abs/2305.07381 (2023) - [i7]Junjie Hu, Zhe Jiang, Chunxiang Xu:
Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG. CoRR abs/2306.03540 (2023) - 2022
- [j97]Chuang Li, Chunxiang Xu:
Efficient Anonymous Authentication for Wireless Body Area Networks. IEEE Access 10: 80015-80026 (2022) - [j96]Vladimir Edemskiy, Chenhuang Wu, Chunxiang Xu:
Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients. Cryptologia 46(2): 148-166 (2022) - [j95]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Xinsheng Wen, Kefei Chen, Jianfeng Ma:
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems. IEEE Syst. J. 16(2): 3096-3107 (2022) - [j94]Min Zhang, Chunxiang Xu, Shanshan Li, Changsong Jiang:
On the Security of an ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 16(4): 6425-6428 (2022) - [j93]Chuang Li, Chunxiang Xu, Shanshan Li, Kefei Chen, Yinbin Miao:
On the Security of Verifiable Searchable Encryption Schemes. IEEE Trans. Cloud Comput. 10(4): 2977-2978 (2022) - [j92]Yuan Zhang, Chunxiang Xu, Nan Cheng, Xuemin Shen:
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 19(4): 2789-2806 (2022) - [j91]Shanshan Li, Chunxiang Xu, Yuan Zhang, Jianying Zhou:
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens. IEEE Trans. Inf. Forensics Secur. 17: 3525-3538 (2022) - [j90]Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Huaxiong Wang, Yuan Zhang:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. IEEE Trans. Serv. Comput. 15(1): 334-345 (2022) - [c43]Jingting Xue, Shuqin Luo, Lingjie Shi, Xiaojun Zhang, Chunxiang Xu:
Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government. FCS 2022: 48-68 - [c42]Jiangyuan Yao, Shengjun Lin, Chunxiang Xu, Min Jing, Deshun Li, Minrui Wang, Xingcan Cao:
Review of Detection and Avoidance of Interference Among Multiple Applications in Software-Defined Networks. ICAIS (2) 2022: 448-459 - [c41]Jiangyuan Yao, Chunxiang Xu, Deshun Li, Shengjun Lin, Xingcan Cao:
Formal Verification of Security Protocols: ProVerif and Extensions. ICAIS (2) 2022: 500-512 - [c40]Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu:
Ciphertext storage scheme supporting data hierarchical management and control. NaNA 2022: 205-212 - 2021
- [j89]Jidong Wang, Chunxiang Xu, Jafar Tavoosi:
A Novel Nonlinear Control for Uncertain Polynomial Type-2 Fuzzy Systems (Case Study: Cart-Pole System). Int. J. Uncertain. Fuzziness Knowl. Based Syst. 29(5): 753-770 (2021) - [j88]Xiaojun Zhang, Chao Huang, Chunxiang Xu, Yuan Zhang, Jingwei Zhang, Huaxiong Wang:
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids. IEEE Internet Things J. 8(10): 8234-8245 (2021) - [j87]Changsong Jiang, Chunxiang Xu, Yuan Zhang:
PFLM: Privacy-preserving federated learning with membership proof. Inf. Sci. 576: 288-311 (2021) - [j86]Yaqing Song, Chunxiang Xu, Yuan Zhang, Fagen Li:
Comments on an identity-based signature scheme for VANETs. J. Syst. Archit. 112: 101851 (2021) - [j85]Md. Jakir Hossain, Chunxiang Xu, Chuang Li, S. M. Hasan Mahmud, Xiaojun Zhang, Wanpeng Li:
ICAS: Two-factor identity-concealed authentication scheme for remote-servers. J. Syst. Archit. 117: 102077 (2021) - [j84]Yuan Zhang, Chunxiang Xu, Xiaodong Lin, Xuemin Shen:
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Trans. Cloud Comput. 9(3): 923-937 (2021) - [j83]Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, Xuemin Sherman Shen:
Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1335-1348 (2021) - [j82]Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Hongwei Li, Huaxiong Wang, Yuan Zhang:
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors. IEEE Trans. Cloud Comput. 9(4): 1362-1375 (2021) - [j81]Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 18(3): 1019-1032 (2021) - [j80]Shiyu Li, Yuan Zhang, Chunxiang Xu, Kefei Chen:
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing. IEEE Trans. Inf. Forensics Secur. 16: 2564-2565 (2021) - [j79]Yangyang Wu, Changsong Jiang, Chunxiang Xu, Kefei Chen:
Security Analysis of a Path Validation Scheme With Constant-Size Proof. IEEE Trans. Inf. Forensics Secur. 16: 4246-4248 (2021) - [j78]Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Nan Cheng, Xuemin Shen:
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage. IEEE Trans. Mob. Comput. 20(6): 2297-2312 (2021) - [j77]Xiaojun Zhang, Wenchen Wang, Liming Mu, Chao Huang, Hong Fu, Chunxiang Xu:
Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks. Wirel. Pers. Commun. 120(4): 3171-3187 (2021) - [c39]Md. Jakir Hossain, Chunxiang Xu:
Lattice-Based Secure Authentication Scheme for Cloud Storage. ICCCS 2021: 726-731 - [c38]Yaqing Song, Chunxiang Xu, Yuan Zhang, Nan Cheng:
Privacy-Preserving Friend Matching for Mobile Social Networks. GLOBECOM 2021: 1-6 - [c37]Yicong Du, Chunxiang Xu, Yuan Zhang:
A Blockchain-based Online Transaction System for Physical Products Trading with Fairness, Privacy Preservation, and Auditability. iSCI 2021: 15-22 - [c36]Shanshan Li, Chunxiang Xu:
PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage. ISPEC 2021: 106-125 - [c35]Shiyu Li, Yuan Zhang, Chunxiang Xu, Nan Cheng, Zhi Liu, Xuemin Sherman Shen:
BESURE: Blockchain-Based Cloud-Assisted eHealth System with Secure Data Provenance. IWQoS 2021: 1-6 - 2020
- [b1]Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen:
Data Security in Cloud Storage. Wireless Networks, Springer 2020, ISBN 978-981-15-4373-9, pp. 1-171 - [j76]Chenhuang Wu, Vladimir Edemskiy, Chunxiang Xu:
On k-Error Linear Complexity of Binary Sequences Derived From Euler Quotients Modulo 2p. IEEE Access 8: 51477-51481 (2020) - [j75]Lixue Sun, Chunxiang Xu, Chuang Li, Yuhui Li:
Server-aided searchable encryption in multi-user setting. Comput. Commun. 164: 25-30 (2020) - [j74]Xiaojun Zhang, Ziyu Zhou, Jingwei Zhang, Chunxiang Xu, Xinpeng Zhang:
Efficient light-weight private auditing scheme for cloud-based wireless body area networks. Int. J. Electron. Secur. Digit. Forensics 12(2): 139-153 (2020) - [j73]Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. Int. J. Inf. Sec. 19(6): 711-720 (2020) - [j72]Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon:
Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey. Int. J. Netw. Secur. 22(1): 118-125 (2020) - [j71]Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Bo Luo, Huaqun Wang:
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain. IEEE Trans. Dependable Secur. Comput. 17(1): 179-193 (2020) - [j70]Yunxia Han, Chunxiang Xu, Debiao He, Kefei Chen:
On the Security of a Key Agreement and Key Protection Scheme. IEEE Trans. Inf. Forensics Secur. 15: 3293-3294 (2020) - [j69]Yuan Zhang, Chunxiang Xu, Nan Cheng, Hongwei Li, Haomiao Yang, Xuemin Shen:
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage. IEEE Trans. Serv. Comput. 13(2): 216-229 (2020) - [c34]Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen:
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors. Inscrypt 2020: 202-220 - [c33]Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon, Nabeil Eltayieb:
Towards an Aggregate Signature-based Authentication for Opportunistic Networks. CyberSA 2020: 1-7 - [c32]Shanshan Li, Chunxiang Xu, Yuan Zhang, Xinsheng Wen:
Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage. SPDE 2020: 355-368
2010 – 2019
- 2019
- [j68]Run Xie, Chanlian He, Chunxiang Xu, Chongzhi Gao:
Lattice-based dynamic group signature for anonymous authentication in IoT. Ann. des Télécommunications 74(7-8): 531-542 (2019) - [j67]Jingting Xue, Chunxiang Xu, Jining Zhao, Jianfeng Ma:
Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci. China Inf. Sci. 62(3): 32104:1-32104:16 (2019) - [j66]Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage. Sci. China Inf. Sci. 62(5): 59101:1-59101:3 (2019) - [j65]Jingting Xue, Chunxiang Xu, Lanhua Bai:
DStore: A distributed system for outsourced data storage and retrieval. Future Gener. Comput. Syst. 99: 106-114 (2019) - [j64]Chenhuang Wu, Chunxiang Xu, Zhixiong Chen, Pinhui Ke:
On error linear complexity of new generalized cyclotomic binary sequences of period p2. Inf. Process. Lett. 144: 9-15 (2019) - [j63]Xiaojun Zhang, Huaxiong Wang, Chunxiang Xu:
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. 472: 223-234 (2019) - [j62]Xiaojun Zhang, Yao Tang, Huaxiong Wang, Chunxiang Xu, Yinbin Miao, Hang Cheng:
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494: 193-207 (2019) - [j61]Shanshan Li, Chunxiang Xu, Yuan Zhang:
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage. J. Inf. Secur. Appl. 46: 250-258 (2019) - [j60]Jining Zhao, Chunxiang Xu, Kefei Chen:
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy. J. Inf. Secur. Appl. 47: 39-49 (2019) - [j59]Jining Zhao, Chunxiang Xu, Kefei Chen:
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. KSII Trans. Internet Inf. Syst. 13(2): 1043-1063 (2019) - [j58]Xiaojun Zhang, Liming Mu, Jie Zhao, Chunxiang Xu:
An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks. KSII Trans. Internet Inf. Syst. 13(6): 3280-3298 (2019) - [j57]Xiaojun Zhang, Jie Zhao, Liming Mu, Yao Tang, Chunxiang Xu:
Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems. Pervasive Mob. Comput. 56: 18-28 (2019) - [j56]Liang Chen, Jianyan Sun, Chunxiang Xu:
Regularized extreme learning machine-based intelligent adaptive control for uncertain nonlinear systems in networked control systems. Pers. Ubiquitous Comput. 23(3-4): 617-625 (2019) - [c31]Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. Inscrypt 2019: 397-415 - [c30]Yuan Zhang, Chunxiang Xu, Nan Cheng, Xuemin Shen:
Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers. GLOBECOM 2019: 1-6 - [c29]Yuan Zhang, Chunxiang Xu, Hongwei Li, Haomiao Yang, Xuemin Sherman Shen:
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain. ICC 2019: 1-6 - [i6]Chenhuang Wu, Vladimir Edemskiy, Chunxiang Xu:
On k-error linear complexity of binary sequences derived from Euler quotients modulo 2p. CoRR abs/1910.04607 (2019) - 2018
- [j55]Yunfei Han, Tonghai Jiang, Yupeng Ma, Chunxiang Xu:
Pretraining Convolutional Neural Networks for Image-Based Vehicle Classification. Adv. Multim. 2018: 3138278:1-3138278:10 (2018) - [j54]Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li:
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China Inf. Sci. 61(3): 038106:1-038106:3 (2018) - [j53]Xiaojun Zhang, Chunxiang Xu, Jingting Xue:
Efficient multi-receiver identity-based signcryption from lattice assumption. Int. J. Electron. Secur. Digit. Forensics 10(1): 20-38 (2018) - [j52]Run Xie, Chunxiang Xu, Chanlian He, Xiaojun Zhang:
Lattice-based searchable public-key encryption scheme for secure cloud storage. Int. J. Web Grid Serv. 14(1): 3-20 (2018) - [j51]Lixue Sun, Chunxiang Xu, Yuan Zhang:
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting. J. Inf. Secur. Appl. 40: 145-155 (2018) - [j50]Jining Zhao, Chunxiang Xu, Kefei Chen:
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. KSII Trans. Internet Inf. Syst. 12(9): 4576-4598 (2018) - [j49]Jingting Xue, Chunxiang Xu, Yuan Zhang:
Private Blockchain-Based Secure Access Control for Smart Home Systems. KSII Trans. Internet Inf. Syst. 12(12): 6057-6078 (2018) - [j48]Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, Xiaodong Lin:
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems. IEEE Trans. Ind. Informatics 14(9): 4101-4112 (2018) - [j47]Xiaojun Zhang, Chunxiang Xu:
Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server. Wirel. Pers. Commun. 100(3): 907-921 (2018) - [c28]Chenhuang Wu, Chunxiang Xu:
On k-error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period p2. FCS 2018: 9-22 - [c27]Jining Zhao, Chunxiang Xu, Kefei Chen:
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. FCS 2018: 121-137 - [c26]Jingting Xue, Chunxiang Xu, Yuan Zhang, Lanhua Bai:
DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain. ICA3PP (3) 2018: 385-401 - [c25]Yuan Zhang, Xiaodong Lin, Chunxiang Xu:
Blockchain-Based Secure Data Provenance for Cloud Storage. ICICS 2018: 3-19 - [e1]Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0 [contents] - 2017
- [j46]Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu:
Identity-based provable data possession revisited: Security analysis and generic construction. Comput. Stand. Interfaces 54: 10-19 (2017) - [j45]Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris, Chunxiang Xu:
Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol. Int. J. Netw. Secur. 19(5): 776-784 (2017) - [j44]Xiaojun Zhang, Chunxiang Xu, Yuan Zhang:
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication. KSII Trans. Internet Inf. Syst. 11(5): 2762-2777 (2017) - [j43]Xingchun Yang, Chunxiang Xu, Chao Rong Li:
A Privacy Model for RFID Tag Ownership Transfer. Secur. Commun. Networks 2017: 5084636:1-5084636:10 (2017) - [j42]Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Chao Lin:
Statistical learning based fully homomorphic encryption on encrypted data. Soft Comput. 21(24): 7473-7483 (2017) - [j41]Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Inf. Forensics Secur. 12(3): 676-688 (2017) - [j40]Xiaojun Zhang, Chunxiang Xu, Yuan Zhang, Chunhua Jin:
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks. Wirel. Pers. Commun. 96(2): 1819-1833 (2017) - [i5]Chenhuang Wu, Chunxiang Xu, Zhixiong Chen, Pinhui Ke:
On error linear complexity of new generalized cyclotomic binary sequences of period p2. CoRR abs/1711.06063 (2017) - 2016
- [j39]Yuan Zhang, Chunxiang Xu, Hongwei Li, Xiaohui Liang:
Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. IEEE Cloud Comput. 3(5): 44-52 (2016) - [j38]Jiang Deng, Chunxiang Xu, Huai Wu, Liju Dong:
A new certificateless signature with enhanced security and aggregation version. Concurr. Comput. Pract. Exp. 28(4): 1124-1133 (2016) - [j37]Jiang Deng, Chunxiang Xu, Huai Wu, Jie Chen:
Analysis and improvement of a fair remote retrieval protocol for private medical records. Concurr. Comput. Pract. Exp. 28(6): 1918-1929 (2016) - [j36]Anping Xiong, Chunxiang Xu:
Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope. Intell. Autom. Soft Comput. 22(2): 289-294 (2016) - [j35]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin:
Enabling identity-based cloud storage public auditing with quantum computers resistance. Int. J. Electron. Secur. Digit. Forensics 8(1): 82-98 (2016) - [j34]Run Xie, Chunxiang Xu, Chanlian He, Xiaojun Zhang:
A new group signature scheme for dynamic membership. Int. J. Electron. Secur. Digit. Forensics 8(4): 332-351 (2016) - [j33]Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang:
PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users. Int. J. Netw. Secur. 18(4): 625-632 (2016) - [j32]Mohammed Ramadan, Fagen Li, Chunxiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla Ali:
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System. Int. J. Netw. Secur. 18(4): 769-781 (2016) - [j31]Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu:
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT. Int. J. Netw. Secur. 18(5): 888-899 (2016) - [j30]Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao:
An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter. Int. J. Netw. Secur. 18(5): 960-968 (2016) - [j29]Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng, Guoping Liu:
Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability. Inf. 7(2): 31 (2016) - [j28]Run Xie, Chunxiang Xu, Chanlian He, Xiaojun Zhang:
An Efficient Dynamic Group Signature with Non-frameability. KSII Trans. Internet Inf. Syst. 10(5): 2407-2426 (2016) - [j27]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety. J. Medical Syst. 40(1): 12:1-12:6 (2016) - [j26]Anping Xiong, Chunxiang Xu, Hao Feng:
云存储环境下支持策略变更的CP-ABE方案 (CP-ABE Scheme with Supporting Policy Elastic Updating in Cloud Storage Environment). 计算机科学 43(1): 191-194 (2016) - [j25]Mohammed Ramadan, Guo-hong Du, Fagen Li, Chunxiang Xu:
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems. Symmetry 8(9): 85 (2016) - [c24]Run Xie, Chanlian He, Yu He, Chunxiang Xu, Kun Liu:
Secure Searchable Public-Key Encryption for Cloud Storage. CloudComp 2016: 184-195 - 2015
- [j24]Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang:
Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks. Int. J. Distributed Sens. Networks 11: 593759:1-593759:10 (2015) - [j23]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Junwei Wen:
A post-quantum communication secure identity-based proxy-signcryption scheme. Int. J. Electron. Secur. Digit. Forensics 7(2): 147-165 (2015) - [j22]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
An efficient certificateless deniable authentication protocol without pairings. Int. J. Electron. Secur. Digit. Forensics 7(2): 179-196 (2015) - [j21]Huai Wu, Chunxiang Xu, Jiang Deng:
Server-aided aggregate verification signature: security definition and construction. Int. J. Inf. Commun. Technol. 7(2/3): 278-286 (2015) - [j20]Xiujie Zhang, Chunxiang Xu:
A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update. Int. J. Netw. Secur. 17(5): 619-628 (2015) - [j19]Yuan Zhang, Chunxiang Xu, Jining Zhao, Xiaojun Zhang, Junwei Wen:
Cryptanalysis of an integrity checking scheme for cloud data sharing. J. Inf. Secur. Appl. 23: 68-73 (2015) - [j18]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Jining Zhao:
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography. J. Medical Syst. 39(3): 24 (2015) - [j17]Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li, Xiaojun Zhang:
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors. IEEE Trans. Comput. Soc. Syst. 2(4): 159-170 (2015) - [c23]Chunhua Jin, Chunxiang Xu, Linzhi Jiang, Fagen Li:
ID-Based Deniable Threshold Ring Authentication. HPCC/CSS/ICESS 2015: 1779-1784 - [c22]Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Yanghong Zhou:
Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance. HPCC/CSS/ICESS 2015: 1785-1790 - 2014
- [j16]Solomon Guadie Worku, Chunxiang Xu, Jining Zhao, Xiaohu He:
Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40(5): 1703-1713 (2014) - [j15]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Run Xie:
Efficient forward secure identity-based shorter signature from lattice. Comput. Electr. Eng. 40(6): 1963-1971 (2014) - [j14]Yong Yu, Jianbing Ni, Man Ho Au, Hongyu Liu, Hua Wang, Chunxiang Xu:
Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17): 7789-7796 (2014) - [j13]Solomon Guadie Worku, Chunxiang Xu, Jining Zhao:
Cloud data auditing with designated verifier. Frontiers Comput. Sci. 8(3): 503-512 (2014) - [j12]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Run Xie, Jining Zhao:
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme. Future Gener. Comput. Syst. 36: 180-186 (2014) - [j11]Chunxiang Xu, Yuan Zhang, Yong Yu, Xiaojun Zhang, Junwei Wen:
An Efficient Provable Secure Public Auditing Scheme for Cloud Storage. KSII Trans. Internet Inf. Syst. 8(11): 4226-4241 (2014) - [c21]Jiang Deng, Chunxiang Xu, Huai Wu, Guangyuan Yang:
An Improved Certificateless Aggregate Signature. CIT 2014: 919-922 - [c20]Solomon Sarpong, Chunxiang Xu:
A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol in Proximity-Based Mobile Social Networks. ADMA 2014: 305-318 - [c19]Xiaojun Zhang, Chunxiang Xu:
Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption. CSE 2014: 1819-1826 - [c18]Angolo Shem Mbandu, Chunxiang Xu, Kamenyi Domenic Mutiria:
Optimized MHealth Batch Verification for a Variant of DSA. CyberC 2014: 79-86 - [c17]Chunxiang Xu, Yupeng Ma, Xiaobo Wang:
A Non-Parametric Data Envelopment Analysis Approach for Cloud Services Evaluation. ICSOC Workshops 2014: 250-255 - 2013
- [j10]Wanpeng Li, Chunxiang Xu, Wenzheng Zhang, Shixiong Zhu, Xiujie Zhang:
New forward-secure signature schemes with untrusted update. Frontiers Comput. Sci. 7(4): 536-543 (2013) - [j9]Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang, Wanpeng Li:
Threshold public key encryption scheme resilient against continual leakage without random oracles. Frontiers Comput. Sci. 7(6): 955-968 (2013) - [j8]Jining Zhao, Chunxiang Xu, Fagen Li, Wenzheng Zhang:
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2709-2716 (2013) - [c16]Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang:
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security. EIDWT 2013: 407-413 - [c15]Huai Wu, Chunxiang Xu, Jiang Deng:
A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing. INCoS 2013: 503-506 - [i4]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li:
A novel certificateless deniable authentication protocol. IACR Cryptol. ePrint Arch. 2013: 414 (2013) - 2012
- [c14]Chunxiang Xu, Xiaohu He, Daniel Abraha-Weldemariam:
Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing. ICICA (2) 2012: 422-428 - [c13]Fugeng Zeng, Chunxiang Xu, Xiujie Zhang, Jian Liu:
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability. WISM 2012: 231-238 - 2011
- [j7]Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang:
Improvement of a proxy multi-signature scheme without random oracles. Comput. Commun. 34(3): 257-263 (2011) - [j6]Ying Sun, Chunxiang Xu, Yong Yu, Yi Mu:
Strongly unforgeable proxy signature scheme secure in the standard model. J. Syst. Softw. 84(9): 1471-1479 (2011) - [c12]Xifeng Liu, Chunxiang Xu, Chuanjin Huang, Wei Shiand:
The Research of Tobacco Leaf Roasting Control Tactics Based on Fuzzy PID. CSISE (1) 2011: 185-190 - 2010
- [j5]Jiaqi Zhu, Hanpin Wang, Zhongyuan Xu, Chunxiang Xu:
A new model for model checking: cycle-weighted Kripke structure. Frontiers Comput. Sci. China 4(1): 78-88 (2010) - [c11]Meixia Zhu, Hanpin Wang, Wei Jin, Zizhen Wang, Chunxiang Xu:
Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation. COMPSAC Workshops 2010: 170-175 - [c10]Chunxiang Xu, Yu Huang, Wanling Qu, Hanpin Wang, Xiaojuan Ban:
A Petri Net-Based Algorithm for RFID Event Detection. COMPSAC 2010: 367-372 - [c9]Chunxiang Xu, Wanling Qu, Hanpin Wang, Zizhen Wang, Xiaojuan Ban:
A Petri Net-Based Method for Data Validation of Web Services Composition. COMPSAC 2010: 468-476
2000 – 2009
- 2009
- [j4]Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao:
Designated verifier proxy signature scheme without random oracles. Comput. Math. Appl. 57(8): 1352-1364 (2009) - [j3]Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu:
An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2): 348-353 (2009) - [c8]Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu:
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. IAS 2009: 281-284 - [c7]Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu:
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. IAS 2009: 661-664 - [c6]Qi Xia, Chunxiang Xu:
Cryptanalysis of Two Identity Based Signcryption Schemes. DASC 2009: 292-294 - [c5]Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang:
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. SSIRI 2009: 203-211 - [i3]Lan Luo, Qionghai Dai, Zhiguang Qin, Chunxiang Xu:
Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules. IACR Cryptol. ePrint Arch. 2009: 611 (2009) - 2008
- [j2]Yu Huang, Hanpin Wang, Wen Zhao, Chunxiang Xu:
A practical method to analyze workflow logic models. Concurr. Comput. Pract. Exp. 20(1): 41-60 (2008) - [j1]Chunxiang Xu, Junhui Zhou, Guozhen Xiao:
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security. Int. J. Netw. Secur. 6(1): 1-5 (2008) - [c4]Chunxiang Xu, Hanpin Wang, Wanling Qu:
Modeling and verifying BPEL using synchronized net. SAC 2008: 2358-2362 - 2007
- [c3]Yu Huang, Chunxiang Xu, Hanpin Wang, Yunni Xia, Jiaqi Zhu, Cheng Zhu:
Formalizing Web Service Choreography Interface. AINA Workshops (2) 2007: 576-581 - 2006
- [c2]Yunni Xia, Hanpin Wang, Chunxiang Xu, Liang Li:
Stochastic Modeling and Quality Evaluation of Workflow Systems Based on QWF-Nets. International Conference on Computational Science (3) 2006: 988-995 - [c1]Yunni Xia, Hanpin Wang, Yu Huang, Chunxiang Xu:
Stochastic modeling and quality evaluation of component-based software systems. QSIC 2006: 377-384 - 2005
- [i2]Chunxiang Xu, Junhui Zhou, Zhiguang Qin:
A Note on Secure Key Issuing in ID-based Cryptography. IACR Cryptol. ePrint Arch. 2005: 180 (2005) - 2004
- [i1]Xiaotong Fu, Chunxiang Xu, Guozhen Xiao:
Forgery Attacks on Chang et al.'s signature scheme with message recovery. IACR Cryptol. ePrint Arch. 2004: 236 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint