Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xianping Mao
@article{DBLP:journals/tcs/LaiHAM20, author = {Junzuo Lai and Zhengan Huang and Man Ho Au and Xianping Mao}, title = {Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation}, journal = {Theor. Comput. Sci.}, volume = {847}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.09.031}, doi = {10.1016/J.TCS.2020.09.031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LaiHAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiHAM18, author = {Junzuo Lai and Zhengan Huang and Man Ho Au and Xianping Mao}, editor = {Willy Susilo and Guomin Yang}, title = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {805--812}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_49}, doi = {10.1007/978-3-319-93638-3\_49}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaoLWWL18, author = {Xianping Mao and Xuefeng Li and Xiaochuan Wu and Chuansheng Wang and Junzuo Lai}, editor = {Man Ho Au and Siu{-}Ming Yiu and Jin Li and Xiapu Luo and Cong Wang and Aniello Castiglione and Kamil Kluczniak}, title = {Anonymous Attribute-Based Conditional Proxy Re-encryption}, booktitle = {Network and System Security - 12th International Conference, {NSS} 2018, Hong Kong, China, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11058}, pages = {95--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02744-5\_7}, doi = {10.1007/978-3-030-02744-5\_7}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/MaoLWWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangLMCL17, author = {Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen and Jin Li}, title = {Insight of the protection for data security under selective opening attacks}, journal = {Inf. Sci.}, volume = {412}, pages = {223--241}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2017.05.031}, doi = {10.1016/J.INS.2017.05.031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangLMCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccip/MaoZLMWL17, author = {Xianping Mao and Jing Zhao and Xuefeng Li and Huanyu Ma and Xiaochuan Wu and Qiushan Liu}, editor = {Jalel Ben{-}Othman and Feng Gang and Jain{-}Shing Liu and Masayuki Arai}, title = {On the security of a smartcard-based authentication system for multiserver environments}, booktitle = {Proceedings of the 3rd International Conference on Communication and Information Processing, {ICCIP} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {345--349}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3162957.3163043}, doi = {10.1145/3162957.3163043}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/iccip/MaoZLMWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaoLMCW16, author = {Xianping Mao and Junzuo Lai and Qixiang Mei and Kefei Chen and Jian Weng}, title = {Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {533--546}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423669}, doi = {10.1109/TDSC.2015.2423669}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaoLCWM15, author = {Xianping Mao and Junzuo Lai and Kefei Chen and Jian Weng and Qixiang Mei}, title = {Efficient revocable identity-based encryption from multilinear maps}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3511--3522}, year = {2015}, url = {https://doi.org/10.1002/sec.1274}, doi = {10.1002/SEC.1274}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuangLMC15, author = {Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Non-malleability Under Selective Opening Attacks: Implication and Separation}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {87--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_5}, doi = {10.1007/978-3-319-28166-7\_5}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HuangLMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/WangCLMW15, author = {Liangliang Wang and Kefei Chen and Yu Long and Xianping Mao and Huige Wang}, editor = {Fatos Xhafa and Leonard Barolli}, title = {A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings}, booktitle = {2015 International Conference on Intelligent Networking and Collaborative Systems, INCoS 2015, Taipei, Taiwan, September 2-4, 2015}, pages = {82--85}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INCoS.2015.10}, doi = {10.1109/INCOS.2015.10}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/WangCLMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLMC15, author = {Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen}, title = {Non-malleability under Selective Opening Attacks: Implication and Separation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2015}, url = {http://eprint.iacr.org/2015/316}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/MaoCWL14, author = {Xianping Mao and Kefei Chen and Liangliang Wang and Yu Long}, editor = {Fatos Xhafa and Leonard Barolli and Francesco Palmieri and Mario Koeppen and Vincenzo Loia}, title = {On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme}, booktitle = {2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, September 10-12, 2014}, pages = {91--95}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INCoS.2014.41}, doi = {10.1109/INCOS.2014.41}, timestamp = {Wed, 06 Jan 2021 11:52:38 +0100}, biburl = {https://dblp.org/rec/conf/incos/MaoCWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoM07, author = {Tianjie Cao and Xianping Mao}, title = {Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {355--360}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p355-360.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaoML06, author = {Tianjie Cao and Xianping Mao and Dongdai Lin}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Security Analysis of a Server-Aided {RSA} Key Generation Protocol}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {314--320}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_29}, doi = {10.1007/11689522\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CaoML06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.