Browse "CS-Journal Papers(저널논문)" by Author Chen, Xiaofeng

Showing results 1 to 12 of 12

1
Chameleon hashing without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.87 - 98, 2004

2
Discrete logarithm based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Kim, Kwangjo, COMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623, 2011-07

3
Efficient generic on-line/off-line (threshold) signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; et al, INFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203, 2008-11

4
Generic security-amplifying methods of ordinary digital signatures

Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo; Wong, Duncan S., INFORMATION SCIENCES, v.201, pp.128 - 139, 2012-10

5
ID-based distributed "magic ink" signature from pairings

Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003

6
Identity-based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

7
Limited verifier signature from bilinear pairings

Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3089, pp.135 - 148, 2004

8
New ID-based threshold signature scheme from bilinear pairings

Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3348, pp.371 - 383, 2004

9
New receipt-free voting scheme using double-trapdoor commitment

Chen, Xiaofeng; Wu, Qianhong; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Lee, Byoung-Cheon; Lee, Hyun-Rok; et al, INFORMATION SCIENCES, v.181, no.8, pp.1493 - 1502, 2011-04

10
Receipt-free electronic auction schemes using homomorphic encryption

Chen, Xiaofeng; Lee, Byoungcheon; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.259 - 273, 2004

11
The ring authenticated encryption scheme – How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009

12
The ring authenticated encryption scheme - How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0