


Остановите войну!
for scientists:
Hu Xiong
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j113]Hu Xiong
, Tianang Yao
, Hanxiao Wang, Jun Feng, Shui Yu
:
A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT. IEEE Internet Things J. 9(1): 401-418 (2022) - [j112]Hu Xiong
, Xin Huang
, Minghao Yang, Lili Wang, Shui Yu
:
Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(4): 3097-3111 (2022) - [j111]Haleh Amintoosi
, Mahdi Nikooghadam
, Saru Kumari
, Feng Jun, Hu Xiong
, Sachin Kumar
, Joel J. P. C. Rodrigues
:
Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems. IEEE Internet Things J. 9(7): 5368-5379 (2022) - [j110]Prince Silas Kwesi Oberko
, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong:
A survey on multi-authority and decentralized attribute-based encryption. J. Ambient Intell. Humaniz. Comput. 13(1): 515-533 (2022) - [j109]Wei Zhang, Zhishuo Zhang
, Hu Xiong, Zhiguang Qin:
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. J. Ambient Intell. Humaniz. Comput. 13(1): 613-627 (2022) - [j108]Prince Silas Kwesi Oberko
, Victor-Hillary Kofi Setornyo Obeng
, Hu Xiong, Saru Kumari
:
A survey on Attribute-Based Signatures. J. Syst. Archit. 124: 102396 (2022) - [j107]Hu Xiong
, Kim-Kwang Raymond Choo
, Athanasios V. Vasilakos
:
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. IEEE Trans. Big Data 8(1): 1-13 (2022) - [j106]Hu Xiong, Jinhao Chen, Qian Mei, Yanan Zhao:
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs. IEEE Trans. Dependable Secur. Comput. 19(3): 2089-2104 (2022) - [j105]Hu Xiong
, Chuanjie Jin
, Mamoun Alazab
, Kuo-Hui Yeh
, Hanxiao Wang, Thippa Reddy Gadekallu
, Weizheng Wang
, Chunhua Su
:
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT. IEEE J. Biomed. Health Informatics 26(5): 1977-1986 (2022) - [j104]Lei Zhang
, Hu Xiong
, Qiong Huang
, Jiguo Li
, Kim-Kwang Raymond Choo
, Jiangtao Li
:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - 2021
- [j103]Lyes Khoukhi, Hu Xiong, Saru Kumari, Nicolas Puech:
The Internet of vehicles and smart cities. Ann. des Télécommunications 76(9-10): 545-546 (2021) - [j102]Izwa Altaf, Muhammad Arslan Akram, Khalid Mahmood
, Saru Kumari
, Hu Xiong, Muhammad Khurram Khan:
A novel authentication and key-agreement scheme for satellite communication network. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j101]Yingzhe Hou
, Xin Huang, Yanan Chen, Sachin Kumar Gupta
, Hu Xiong:
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j100]Yingzhe Hou
, Hu Xiong
, Xin Huang, Saru Kumari
:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things. IEEE Internet Things J. 8(11): 8935-8948 (2021) - [j99]Hu Xiong
, Yanan Zhao
, Yingzhe Hou
, Xin Huang
, Chuanjie Jin
, Lili Wang, Saru Kumari
:
Heterogeneous Signcryption With Equality Test for IIoT Environment. IEEE Internet Things J. 8(21): 16142-16152 (2021) - [j98]Yi Wu, Wei Zhang
, Hu Xiong, Zhiguang Qin, Kuo-Hui Yeh:
Efficient access control with traceability and user revocation in IoT. Multim. Tools Appl. 80(20): 31487-31508 (2021) - [j97]Qian Mei
, Hu Xiong
, Jinhao Chen
, Minghao Yang, Saru Kumari
, Muhammad Khurram Khan
:
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV. IEEE Syst. J. 15(1): 245-256 (2021) - [j96]Hu Xiong
, Zhiqing Kang
, Jinhao Chen
, Junyi Tao, Chen Yuan, Saru Kumari
:
A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity. IEEE Syst. J. 15(2): 2156-2167 (2021) - [j95]Zhiguang Qin
, Yan Wu
, Hu Xiong
:
Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data". IEEE Trans. Cloud Comput. 9(4): 1675-1677 (2021) - [j94]Jianfei Sun
, Hu Xiong
, Xuyun Nie
, Yinghui Zhang
, Pengfei Wu
:
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2518-2519 (2021) - [j93]Zhen Qin
, Gu Huang, Hu Xiong
, Zhiguang Qin
, Kim-Kwang Raymond Choo
:
A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics. IEEE Trans. Fuzzy Syst. 29(3): 549-559 (2021) - [j92]Lei Meng
, Haitao Xu
, Hu Xiong
, Xuewang Zhang
, Xianwei Zhou
, Zhu Han
:
An Efficient Certificateless Authenticated Key Exchange Protocol Resistant to Ephemeral Key Leakage Attack for V2V Communication in IoV. IEEE Trans. Veh. Technol. 70(11): 11736-11747 (2021) - [j91]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Mohammed Ramadan
, Zhiguang Qin:
Equality test with an anonymous authorization in cloud computing. Wirel. Networks 27(2): 1063-1076 (2021) - [c20]Qian Mei, Hu Xiong, Yanan Zhao, Kuo-Hui Yeh:
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating. DSC 2021: 1-8 - [c19]Yang Zhao, Guohang Dan, Ankang Ruan, Jicheng Huang, Hu Xiong:
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks. DSC 2021: 1-7 - 2020
- [j90]Rashad Elhabob, Yanan Zhao, Nabeil Eltayieb, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 23(2): 1085-1101 (2020) - [j89]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari
, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j88]Muhammad Asad Saleem
, Shafiq Ahmed
, Khalid Mahmood, Saru Kumari
, Hu Xiong:
An enhanced authentication protocol for client server environment. Frontiers Comput. Sci. 14(6): 146810 (2020) - [j87]Shufan Zhang
, Lili Wang, Hu Xiong:
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability. Int. J. Inf. Sec. 19(3): 323-341 (2020) - [j86]Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong:
Identity Based Key-Insulated Encryption with Outsourced Equality Test. Int. J. Netw. Secur. 22(2): 257-264 (2020) - [j85]Muhammad Arslan Akram
, Khalid Mahmood
, Saru Kumari
, Hu Xiong
:
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0". IEEE Internet Things J. 7(5): 4676-4681 (2020) - [j84]Jianfei Sun
, Hu Xiong
, Ximeng Liu
, Yinghui Zhang
, Xuyun Nie
, Robert H. Deng
:
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet Things J. 7(7): 6566-6575 (2020) - [j83]Hu Xiong
, Yan Wu
, Chuanjie Jin
, Saru Kumari
:
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT. IEEE Internet Things J. 7(12): 11713-11724 (2020) - [j82]Jianfei Sun
, Hu Xiong
, Hao Zhang, Li Peng:
Mobile access and flexible search over encrypted cloud data in heterogeneous systems. Inf. Sci. 507: 1-15 (2020) - [j81]Hu Xiong, Yan Wu, Chunhua Su, Kuo-Hui Yeh:
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things. J. Inf. Secur. Appl. 53: 102507 (2020) - [j80]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
An efficient certificateless public key cryptography with authorized equality test in IIoT. J. Ambient Intell. Humaniz. Comput. 11(3): 1065-1083 (2020) - [j79]R. Shashidhara, Sriramulu Bojjagani
, Anup Kumar Maurya, Saru Kumari
, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 13(6): 1943-1966 (2020) - [j78]Hu Xiong
, Qian Mei
, Yanan Zhao
:
Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments. IEEE Syst. J. 14(1): 310-320 (2020) - [j77]Chanapha Butpheng
, Kuo-Hui Yeh
, Hu Xiong:
Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review. Symmetry 12(7): 1191 (2020) - [j76]Yan Wu
, Hu Xiong, Chuanjie Jin:
A multi-use unidirectional certificateless proxy re-signature scheme. Telecommun. Syst. 73(3): 455-467 (2020) - [j75]Hu Xiong
, Yangyang Bao
, Xuyun Nie
, Yakubu Issifu Asoor:
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(2): 1013-1023 (2020) - [j74]Jianfei Sun
, Hu Xiong
, Shufan Zhang
, Ximeng Liu
, Jiaming Yuan, Robert H. Deng
:
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(11): 12938-12950 (2020) - [j73]Hu Xiong, Yingzhe Hou
, Xin Huang, Yanan Zhao
:
Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Veh. Commun. 26: 100264 (2020) - [j72]Rashad Elhabob, Yanan Zhao, Alzubair Hassan, Hu Xiong:
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT. Wirel. Pers. Commun. 113(1): 313-335 (2020) - [c18]Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. SPDE 2020: 369-383 - [i9]Wei Zhang, Yi Wu, Zhishuo Zhang, Hu Xiong, Zhiguang Qin:
Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability. CoRR abs/2009.04748 (2020) - [i8]Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. IACR Cryptol. ePrint Arch. 2020: 553 (2020) - [i7]Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 1027 (2020)
2010 – 2019
- 2019
- [j71]Rashad Elhabob
, Yanan Zhao
, Iva Sella, Hu Xiong
:
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles. IEEE Access 7: 68957-68969 (2019) - [j70]Yang Zhao, Mao Ren, Songquan Jiang, Guobin Zhu, Hu Xiong:
An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing 101(8): 1041-1065 (2019) - [j69]Hu Xiong
, Yan Wu
, Zhenyu Lu
:
A Survey of Group Key Agreement Protocols with Constant Rounds. ACM Comput. Surv. 52(3): 57:1-57:32 (2019) - [j68]Hu Xiong
, Yanan Zhao, Li Peng, Hao Zhang, Kuo-Hui Yeh
:
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 97: 453-461 (2019) - [j67]Qian Mei, Yanan Zhao, Hu Xiong:
A New Provably Secure Certificateless Signature with Revocation in the Standard Model. Informatica 30(4): 711-728 (2019) - [j66]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(9): 4742-4770 (2019) - [j65]Hu Xiong
, Hao Zhang, Jianfei Sun
:
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing. IEEE Syst. J. 13(3): 2739-2750 (2019) - [j64]Hu Xiong, Yi Wang, Wenchao Li, Chien-Ming Chen
:
Flexible, Efficient, and Secure Access Delegation in Cloud Computing. ACM Trans. Manag. Inf. Syst. 10(1): 2:1-2:20 (2019) - [c17]Jianfei Sun, Hu Xiong, Robert H. Deng
, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. DSC 2019: 1-8 - [i6]Shufan Zhang, Hu Xiong:
Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels. CoRR abs/1905.05562 (2019) - 2018
- [j63]Qiang Wang, Li Peng, Hu Xiong
, Jianfei Sun, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing. IEEE Access 6: 760-771 (2018) - [j62]Jianfei Sun
, Yangyang Bao, Xuyun Nie, Hu Xiong
:
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing. IEEE Access 6: 31621-31629 (2018) - [j61]Fuhu Deng, Yali Wang, Li Peng, Hu Xiong
, Ji Geng, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records. IEEE Access 6: 39473-39486 (2018) - [j60]Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin:
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. Int. J. Netw. Secur. 20(1): 95-109 (2018) - [j59]Qiang Wang, Hao Zhang, Jianfei Sun, Hu Xiong, Zhiguang Qin:
Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud". Inf. Process. Lett. 140: 34-36 (2018) - [j58]Yanan Chen, Zhenyu Lu, Hu Xiong
, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. Secur. Commun. Networks 2018: 1378583:1-1378583:14 (2018) - 2017
- [j57]Hu Xiong
, Junyi Tao, Chen Yuan:
Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity. IEEE Access 5: 5648-5661 (2017) - [j56]Zhen Qin, Jianfei Sun, Abubaker Wahaballa
, Wentao Zheng, Hu Xiong, Zhiguang Qin:
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stand. Interfaces 54: 55-60 (2017) - [j55]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Ahmed Abdalla Ali, Mohammed Ramadan, Zhiguang Qin:
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. Int. J. Netw. Secur. 19(1): 27-38 (2017) - [j54]Yang Chen, Yang Zhao, Hu Xiong, Feng Yue:
A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability. Int. J. Netw. Secur. 19(4): 573-582 (2017) - [j53]Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong:
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. Int. J. Netw. Secur. 19(4): 623-630 (2017) - [j52]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet. Int. J. Netw. Secur. 19(6): 940-949 (2017) - [j51]Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong:
Revocable ABE with Bounded Ciphertext in Cloud Computing. Int. J. Netw. Secur. 19(6): 973-983 (2017) - [j50]Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong:
Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare. Int. J. Netw. Secur. 19(6): 1044-1052 (2017) - [j49]Hu Xiong
, Qiang Wang, Jianfei Sun:
Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation". Inf. Process. Lett. 127: 67-70 (2017) - [j48]Zhen Qin, Jianfei Sun
, Dajiang Chen
, Hu Xiong
:
Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things. Mob. Inf. Syst. 2017: 7514867:1-7514867:15 (2017) - [j47]Hu Xiong, Jianfei Sun:
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing". IEEE Trans. Dependable Secur. Comput. 14(4): 461-462 (2017) - 2016
- [j46]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Philip Avornyo, Zhiguang Qin:
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. Int. J. Netw. Secur. 18(2): 235-243 (2016) - [j45]Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin:
An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment. Int. J. Netw. Secur. 18(3): 481-486 (2016) - [j44]Abubaker Wahaballa
, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin:
Secure mobile agent-based English auction protocol using identity-based signature scheme. Int. J. Secur. Networks 11(4): 175-187 (2016) - [j43]Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong
:
On the security of two identity-based signature schemes based on pairings. Inf. Process. Lett. 116(6): 416-418 (2016) - [j42]Hu Xiong
, Junyi Tao, Yanan Chen:
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems. J. Medical Syst. 40(11): 228:1-228:12 (2016) - [j41]Dong-fen Li, Rui-Jin Wang, Fengli Zhang, Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Huayi Zhan:
A noise immunity controlled quantum teleportation protocol. Quantum Inf. Process. 15(11): 4819-4837 (2016) - [j40]Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long:
Fuzzy certificateless signature. Secur. Commun. Networks 9(16): 3658-3669 (2016) - [c16]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. BigCom 2016: 387-395 - [c15]Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Zhiguang Qin:
Measuring Trust in Online Social Networks. ICADIWT 2016: 26-39 - [i5]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. IACR Cryptol. ePrint Arch. 2016: 501 (2016) - 2015
- [j39]Yanan Chen, Weixiang Xu, Hu Xiong:
Strongly secure certificateless key-insulated signature secure in the standard model. Ann. des Télécommunications 70(9-10): 395-405 (2015) - [j38]Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li:
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 17(2): 129-134 (2015) - [j37]Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu:
Cryptanalysis of Attribute-based Ring Signcryption Scheme. Int. J. Netw. Secur. 17(2): 224-228 (2015) - [j36]Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin:
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme. Int. J. Netw. Secur. 17(6): 779-786 (2015) - [j35]Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene
, Songyang Wu, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. KSII Trans. Internet Inf. Syst. 9(3): 1246-1259 (2015) - [j34]Hu Xiong, Zhiguang Qin:
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 10(7): 1442-1455 (2015) - [j33]Hu Xiong, Songyang Wu, Fagen Li
, Zhiguang Qin:
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes. Wirel. Pers. Commun. 80(4): 1671-1685 (2015) - [j32]Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Zhiguang Qin:
Characterization of Complex Networks for Epidemics Modeling. Wirel. Pers. Commun. 83(4): 2835-2858 (2015) - [c14]Zhiguang Qin, Shikun Wu, Hu Xiong:
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing. BigCom 2015: 205-216 - [c13]Xuyun Nie, Bo Liu, Hu Xiong, Gang Lu:
Cubic Unbalance Oil and Vinegar Signature Scheme. Inscrypt 2015: 47-56 - 2014
- [j31]Hu Xiong, Yanan Chen, Guobin Zhu, Zhiguang Qin:
Analysis and improvement of a provable secure fuzzy identity-based signature scheme. Sci. China Inf. Sci. 57(9): 1-5 (2014) - [j30]Juan Bi, Zhiguang Qin, Hu Xiong, Jia Huang:
Simultaneous community discovery and user interests extraction in social network based on probabilistic model. Int. J. Intell. Inf. Database Syst. 8(3): 260-279 (2014) - [j29]Zhiguang Qin, Hu Xiong, Fagen Li:
A Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 16(4): 278-285 (2014) - [j28]Shengke Zeng, Hu Xiong:
Privacy-enhanced Designated Confirmer Signature without Random Oracles. Int. J. Netw. Secur. 16(5): 331-339 (2014) - [j27]Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. Inf. Sci. 268: 447-457 (2014) - [j26]Hu Xiong
:
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 9(12): 2327-2339 (2014) - [j25]Guobin Zhu, Hu Xiong, Zhiguang Qin:
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol. Wirel. Pers. Commun. 74(2): 883-889 (2014) - [j24]Guobin Zhu, Hu Xiong, Zhiguang Qin:
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model. Wirel. Pers. Commun. 79(2): 1401-1416 (2014) - [i4]Hu Xiong:
Toward Certificateless Signcryption Scheme Without Random Oracles. IACR Cryptol. ePrint Arch. 2014: 162 (2014) - 2013
- [j23]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li
:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j22]Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng:
An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. Int. J. Netw. Secur. 15(3): 161-170 (2013) - [j21]Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013) - [j20]Qinyi Li, Hu Xiong, Fengli Zhang:
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. Int. J. Secur. Networks 8(1): 1-12 (2013) - [j19]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li
:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j18]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - [j17]Hu Xiong, Fagen Li
, Zhiguang Qin:
Certificateless threshold signature secure in the standard model. Inf. Sci. 237: 73-81 (2013) - [j16]