Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jing Xu 0002
@article{DBLP:journals/cj/YinXZ23, author = {Lingyuan Yin and Jing Xu and Zhenfeng Zhang}, title = {Interopera: An Efficient Cross-Chain Trading Protocol}, journal = {Comput. J.}, volume = {66}, number = {7}, pages = {1609--1621}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac030}, doi = {10.1093/COMJNL/BXAC030}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YinXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LanXZCL23, author = {Xiao Lan and Jing Xu and Zhenfeng Zhang and Xingshu Chen and Yonggang Luo}, title = {A systematic security analysis of {EMV} protocol}, journal = {Comput. Stand. Interfaces}, volume = {84}, pages = {103700}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2022.103700}, doi = {10.1016/J.CSI.2022.103700}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LanXZCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiXYLTZ23, author = {Xinyu Li and Jing Xu and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang}, title = {Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3699--3715}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3212601}, doi = {10.1109/TDSC.2022.3212601}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiXYLTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DouYLX22, author = {Hanyue Dou and Lingyuan Yin and Yuan Lu and Jing Xu}, title = {A probabilistic Proof-of-Stake protocol with fast confirmation}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103268}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103268}, doi = {10.1016/J.JISA.2022.103268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DouYLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YinXT22, author = {Lingyuan Yin and Jing Xu and Qiang Tang}, title = {Sidechains With Fast Cross-Chain Transfers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3925--3940}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3114151}, doi = {10.1109/TDSC.2021.3114151}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/YinXT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NiX22, author = {Peifang Ni and Jing Xu}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {427--446}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_23}, doi = {10.1007/978-3-031-16815-4\_23}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NiX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gao0L00Z22, author = {Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Dumbo-NG: Fast Asynchronous {BFT} Consensus with Throughput-Oblivious Latency}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1187--1201}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559379}, doi = {10.1145/3548606.3559379}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gao0L00Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GaoLLTXZ22, author = {Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Efficient Asynchronous Byzantine Agreement without Private Setups}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {246--257}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00032}, doi = {10.1109/ICDCS54860.2022.00032}, timestamp = {Thu, 20 Oct 2022 09:13:03 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/GaoLLTXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Guo0L00Z22, author = {Bingyong Guo and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Speeding Dumbo: Pushing Asynchronous {BFT} Closer to Practice}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-256/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Guo0L00Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-00750, author = {Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Dumbo-NG: Fast Asynchronous {BFT} Consensus with Throughput-Oblivious Latency}, journal = {CoRR}, volume = {abs/2209.00750}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.00750}, doi = {10.48550/ARXIV.2209.00750}, eprinttype = {arXiv}, eprint = {2209.00750}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-00750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLLTXZ22, author = {Bingyong Guo and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Speeding Dumbo: Pushing Asynchronous {BFT} Closer to Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2022}, url = {https://eprint.iacr.org/2022/027}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoLLTXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoZXAL21, author = {Hui Guo and Zhenfeng Zhang and Jing Xu and Ningyu An and Xiao Lan}, title = {Accountable Proxy Re-Encryption for Secure Data Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {145--159}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2877601}, doi = {10.1109/TDSC.2018.2877601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuoZXAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-07831, author = {Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Efficient Asynchronous Byzantine Agreement without Private Setups}, journal = {CoRR}, volume = {abs/2106.07831}, year = {2021}, url = {https://arxiv.org/abs/2106.07831}, eprinttype = {arXiv}, eprint = {2106.07831}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-07831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002LYL0Z21, author = {Jing Xu and Xinyu Li and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang}, title = {Redactable Blockchain Protocol with Instant Redaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2021}, url = {https://eprint.iacr.org/2021/223}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002LYL0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoLLTXZ21, author = {Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Efficient Asynchronous Byzantine Agreement without Private Setups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {810}, year = {2021}, url = {https://eprint.iacr.org/2021/810}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoLLTXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiXFWZ20, author = {Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang}, title = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3872--3885}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.3001738}, doi = {10.1109/TIFS.2020.3001738}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiXFWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiXZ20, author = {Xinyu Li and Jing Xu and Zhenfeng Zhang}, title = {Correction to: Revisiting the Security of Qian et al.'s Revised Tree-{\textdollar}{\textbackslash}hbox \{LSHB\}{\^{}}+{\textdollar} Protocol}, journal = {Wirel. Pers. Commun.}, volume = {110}, number = {2}, pages = {1073}, year = {2020}, url = {https://doi.org/10.1007/s11277-019-07009-2}, doi = {10.1007/S11277-019-07009-2}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuoL0XZ20, author = {Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Dumbo: Faster Asynchronous {BFT} Protocols}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {803--818}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417262}, doi = {10.1145/3372297.3417262}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GuoL0XZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LiXZLW20, author = {Xinyu Li and Jing Xu and Zhenfeng Zhang and Xiao Lan and Yuchen Wang}, title = {Modular Security Analysis of OAuth 2.0 in the Three-Party Setting}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {276--293}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00025}, doi = {10.1109/EUROSP48549.2020.00025}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/LiXZLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLTXZ20, author = {Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Dumbo: Faster Asynchronous {BFT} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2020}, url = {https://eprint.iacr.org/2020/841}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLTXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GuoZXA19, author = {Hui Guo and Zhenfeng Zhang and Jing Xu and Ningyu An}, title = {Non-transferable Proxy Re-encryption}, journal = {Comput. J.}, volume = {62}, number = {4}, pages = {490--506}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxy096}, doi = {10.1093/COMJNL/BXY096}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GuoZXA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LanXZZ19, author = {Xiao Lan and Jing Xu and Zhenfeng Zhang and Wen{-}Tao Zhu}, title = {Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming {TLS} 1.3}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {272--286}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2685382}, doi = {10.1109/TDSC.2017.2685382}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LanXZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiXZ19, author = {Xinyu Li and Jing Xu and Zhenfeng Zhang}, title = {Revisiting the Security of Qian et al.'s Revised Tree- {\textdollar}{\textdollar}{\textbackslash}hbox \{LSHB\}{\^{}}+{\textdollar}{\textdollar} {LSHB} + Protocol}, journal = {Wirel. Pers. Commun.}, volume = {106}, number = {2}, pages = {321--343}, year = {2019}, url = {https://doi.org/10.1007/s11277-019-06164-w}, doi = {10.1007/S11277-019-06164-W}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuoZ0X19, author = {Hui Guo and Zhenfeng Zhang and Jing Xu and Mingyuan Xia}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {234--256}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_12}, doi = {10.1007/978-3-030-29959-0\_12}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuoZ0X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03955, author = {Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang}, title = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol}, journal = {CoRR}, volume = {abs/1909.03955}, year = {2019}, url = {http://arxiv.org/abs/1909.03955}, eprinttype = {arXiv}, eprint = {1909.03955}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuZZX17, author = {Xuexian Hu and Jiang Zhang and Zhenfeng Zhang and Jing Xu}, title = {Universally composable anonymous password authenticated key exchange}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {52107}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-5522-z}, doi = {10.1007/S11432-016-5522-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuZZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LanXGZ16, author = {Xiao Lan and Jing Xu and Hui Guo and Zhenfeng Zhang}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {386--400}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_24}, doi = {10.1007/978-3-319-54705-3\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LanXGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiXZFH16, author = {Xinyu Li and Jing Xu and Zhenfeng Zhang and Dengguo Feng and Honggang Hu}, title = {Multiple Handshakes Security of {TLS} 1.3 Candidates}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {486--505}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.36}, doi = {10.1109/SP.2016.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiXZFH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuHZ15, author = {Jing Xu and Xuexian Hu and Zhenfeng Zhang}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {42--61}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_3}, doi = {10.1007/978-3-319-28166-7\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoZX15, author = {Hui Guo and Zhenfeng Zhang and Jing Xu}, title = {Non-Transferable Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1216}, year = {2015}, url = {http://eprint.iacr.org/2015/1216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/XuZ13, author = {Jing Xu and Wen Tao Zhu}, title = {A Generic Framework for Anonymous Authentication in Mobile Networks}, journal = {J. Comput. Sci. Technol.}, volume = {28}, number = {4}, pages = {732--742}, year = {2013}, url = {https://doi.org/10.1007/s11390-013-1371-z}, doi = {10.1007/S11390-013-1371-Z}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/XuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DuanXF13, author = {Meijiao Duan and Jing Xu and Dengguo Feng}, title = {Efficient identity-based strong designated verifier signature schemes}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {902--911}, year = {2013}, url = {https://doi.org/10.1002/sec.645}, doi = {10.1002/SEC.645}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DuanXF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YangXZ13, author = {Kang Yang and Jing Xu and Zhenfeng Zhang}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Certificateless Proxy Re-Encryption Without Pairings}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {67--88}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_5}, doi = {10.1007/978-3-319-12160-4\_5}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/YangXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/XuZF11, author = {Jing Xu and Wen Tao Zhu and Dengguo Feng}, title = {An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {319--325}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.04.041}, doi = {10.1016/J.COMCOM.2010.04.041}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/XuZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XuZJ11, author = {Jing Xu and Wen Tao Zhu and Wenting Jin}, title = {A generic framework for constructing cross-realm {C2C-PAKA} protocols based on the smart card}, journal = {Concurr. Comput. Pract. Exp.}, volume = {23}, number = {12}, pages = {1386--1398}, year = {2011}, url = {https://doi.org/10.1002/cpe.1616}, doi = {10.1002/CPE.1616}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/XuZJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DuanX11, author = {Meijiao Duan and Jing Xu}, title = {An efficient location-based compromise-tolerant key management scheme for sensor networks}, journal = {Inf. Process. Lett.}, volume = {111}, number = {11}, pages = {503--507}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.02.017}, doi = {10.1016/J.IPL.2011.02.017}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DuanX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/FengXC11, author = {Dengguo Feng and Jing Xu and Weidong Chen}, title = {Generic Constructions for Strong Designated Verifier Signature}, journal = {J. Inf. Process. Syst.}, volume = {7}, number = {1}, pages = {159--172}, year = {2011}, url = {https://doi.org/10.3745/JIPS.2011.7.1.159}, doi = {10.3745/JIPS.2011.7.1.159}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/FengXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XuF11, author = {Jing Xu and Dengguo Feng}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Comments on the {SM2} Key Exchange Protocol}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {160--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_12}, doi = {10.1007/978-3-642-25513-7\_12}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/XuF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/XuZF11, author = {Jing Xu and Wen Tao Zhu and Dengguo Feng}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {269--274}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/XuZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/XuZF09, author = {Jing Xu and Wen Tao Zhu and Dengguo Feng}, title = {An improved smart card based password authentication scheme with provable security}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {4}, pages = {723--728}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.09.006}, doi = {10.1016/J.CSI.2008.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/XuZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/JinX09, author = {Wenting Jin and Jing Xu}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {299--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_20}, doi = {10.1007/978-3-642-10433-6\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/JinX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/FengX09, author = {Dengguo Feng and Jing Xu}, editor = {Yeow Meng Chee and Chao Li and San Ling and Huaxiong Wang and Chaoping Xing}, title = {A New Client-to-Client Password-Authenticated Key Agreement Protocol}, booktitle = {Coding and Cryptology, Second International Workshop, {IWCC} 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5557}, pages = {63--76}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01877-0\_7}, doi = {10.1007/978-3-642-01877-0\_7}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/codcry/FengX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangWXF06, author = {Zhenfeng Zhang and Duncan S. Wong and Jing Xu and Dengguo Feng}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Certificateless Public-Key Signature: Security Model and Efficient Construction}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {293--308}, year = {2006}, url = {https://doi.org/10.1007/11767480\_20}, doi = {10.1007/11767480\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangWXF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XuZF05, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {ID-Based Aggregate Signatures from Bilinear Pairings}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {110--119}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_10}, doi = {10.1007/11599371\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/XuZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangXF05, author = {Zhenfeng Zhang and Jing Xu and Dengguo Feng}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Efficient Identity-Based Protocol for Fair Certified E-mail Delivery}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {200--210}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_17}, doi = {10.1007/11599371\_17}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhangXF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangFXZ05, author = {Zhenfeng Zhang and Dengguo Feng and Jing Xu and Yongbin Zhou}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Efficient ID-Based Optimistic Fair Exchange with Provable Security}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {14--26}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_2}, doi = {10.1007/11602897\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangFXZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/XuZF05, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {ID-Based Proxy Signature Using Bilinear Pairings}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {359--367}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_40}, doi = {10.1007/11576259\_40}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispa/XuZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XuZF04, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, editor = {Chae Hoon Lim and Moti Yung}, title = {A Ring Signature Scheme Using Bilinear Pairings}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {160--169}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_14}, doi = {10.1007/978-3-540-31815-6\_14}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XuZF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuZF04, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, title = {ID-Based Proxy Signature Using Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2004}, url = {http://eprint.iacr.org/2004/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuZF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuZF04a, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, title = {Identity Based Threshold Proxy Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2004}, url = {http://eprint.iacr.org/2004/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuZF04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXF03, author = {Zhenfeng Zhang and Jing Xu and Dengguo Feng}, title = {Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2003}, url = {http://eprint.iacr.org/2003/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.