
Hu Xiong
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j89]Rashad Elhabob, Yanan Zhao, Nabeil Eltayieb, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 23(2): 1085-1101 (2020) - [j88]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari
, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j87]Muhammad Asad Saleem
, Shafiq Ahmed
, Khalid Mahmood, Saru Kumari, Hu Xiong:
An enhanced authentication protocol for client server environment. Frontiers Comput. Sci. 14(6): 146810 (2020) - [j86]Shufan Zhang
, Lili Wang, Hu Xiong:
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability. Int. J. Inf. Sec. 19(3): 323-341 (2020) - [j85]Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong:
Identity Based Key-Insulated Encryption with Outsourced Equality Test. Int. J. Netw. Secur. 22(2): 257-264 (2020) - [j84]Muhammad Arslan Akram
, Khalid Mahmood
, Saru Kumari
, Hu Xiong
:
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0". IEEE Internet Things J. 7(5): 4676-4681 (2020) - [j83]Jianfei Sun
, Hu Xiong
, Ximeng Liu
, Yinghui Zhang
, Xuyun Nie
, Robert H. Deng
:
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet Things J. 7(7): 6566-6575 (2020) - [j82]Hu Xiong, Yan Wu, Chuanjie Jin, Saru Kumari:
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT. IEEE Internet Things J. 7(12): 11713-11724 (2020) - [j81]Jianfei Sun
, Hu Xiong
, Hao Zhang, Li Peng:
Mobile access and flexible search over encrypted cloud data in heterogeneous systems. Inf. Sci. 507: 1-15 (2020) - [j80]Hu Xiong, Yan Wu, Chunhua Su, Kuo-Hui Yeh:
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things. J. Inf. Secur. Appl. 53: 102507 (2020) - [j79]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
An efficient certificateless public key cryptography with authorized equality test in IIoT. J. Ambient Intell. Humaniz. Comput. 11(3): 1065-1083 (2020) - [j78]R. Shashidhara, Sriramulu Bojjagani
, Anup Kumar Maurya, Saru Kumari
, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer Peer Netw. Appl. 13(6): 1943-1966 (2020) - [j77]Hu Xiong
, Qian Mei
, Yanan Zhao
:
Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments. IEEE Syst. J. 14(1): 310-320 (2020) - [j76]Chanapha Butpheng
, Kuo-Hui Yeh
, Hu Xiong:
Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review. Symmetry 12(7): 1191 (2020) - [j75]Yan Wu
, Hu Xiong, Chuanjie Jin:
A multi-use unidirectional certificateless proxy re-signature scheme. Telecommun. Syst. 73(3): 455-467 (2020) - [j74]Hu Xiong
, Yangyang Bao
, Xuyun Nie
, Yakubu Issifu Asoor:
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(2): 1013-1023 (2020) - [j73]Jianfei Sun
, Hu Xiong
, Shufan Zhang
, Ximeng Liu
, Jiaming Yuan, Robert H. Deng
:
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(11): 12938-12950 (2020) - [j72]Hu Xiong, Yingzhe Hou
, Xin Huang, Yanan Zhao
:
Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Veh. Commun. 26: 100264 (2020) - [j71]Rashad Elhabob, Yanan Zhao, Alzubair Hassan, Hu Xiong:
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT. Wirel. Pers. Commun. 113(1): 313-335 (2020) - [c18]Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. SPDE 2020: 369-383 - [i9]Wei Zhang, Yi Wu, Zhishuog Zhang, Hu Xiong, Zhiguang Qin:
Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability. CoRR abs/2009.04748 (2020) - [i8]Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. IACR Cryptol. ePrint Arch. 2020: 553 (2020) - [i7]Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 1027 (2020)
2010 – 2019
- 2019
- [j70]Rashad Elhabob
, Yanan Zhao
, Iva Sella, Hu Xiong
:
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles. IEEE Access 7: 68957-68969 (2019) - [j69]Yang Zhao, Mao Ren, Songquan Jiang, Guobin Zhu, Hu Xiong:
An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing 101(8): 1041-1065 (2019) - [j68]Hu Xiong, Yan Wu, Zhenyu Lu:
A Survey of Group Key Agreement Protocols with Constant Rounds. ACM Comput. Surv. 52(3): 57:1-57:32 (2019) - [j67]Hu Xiong
, Yanan Zhao, Li Peng, Hao Zhang, Kuo-Hui Yeh
:
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 97: 453-461 (2019) - [j66]Qian Mei, Yanan Zhao, Hu Xiong:
A New Provably Secure Certificateless Signature with Revocation in the Standard Model. Informatica 30(4): 711-728 (2019) - [j65]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(9): 4742-4770 (2019) - [j64]Hu Xiong
, Hao Zhang, Jianfei Sun
:
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing. IEEE Syst. J. 13(3): 2739-2750 (2019) - [j63]Hu Xiong, Yi Wang, Wenchao Li, Chien-Ming Chen
:
Flexible, Efficient, and Secure Access Delegation in Cloud Computing. ACM Trans. Manag. Inf. Syst. 10(1): 2:1-2:20 (2019) - [c17]Jianfei Sun, Hu Xiong, Robert H. Deng
, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. DSC 2019: 1-8 - [i6]Shufan Zhang, Hu Xiong:
Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels. CoRR abs/1905.05562 (2019) - 2018
- [j62]Qiang Wang, Li Peng, Hu Xiong
, Jianfei Sun, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing. IEEE Access 6: 760-771 (2018) - [j61]Jianfei Sun
, Yangyang Bao, Xuyun Nie, Hu Xiong
:
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing. IEEE Access 6: 31621-31629 (2018) - [j60]Fuhu Deng, Yali Wang, Li Peng, Hu Xiong
, Ji Geng, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records. IEEE Access 6: 39473-39486 (2018) - [j59]Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin:
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. Int. J. Netw. Secur. 20(1): 95-109 (2018) - [j58]Qiang Wang, Hao Zhang, Jianfei Sun, Hu Xiong, Zhiguang Qin:
Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud". Inf. Process. Lett. 140: 34-36 (2018) - [j57]Yanan Chen, Zhenyu Lu, Hu Xiong
, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. Secur. Commun. Networks 2018: 1378583:1-1378583:14 (2018) - 2017
- [j56]Hu Xiong
, Junyi Tao, Chen Yuan:
Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity. IEEE Access 5: 5648-5661 (2017) - [j55]Zhen Qin, Jianfei Sun, Abubaker Wahaballa
, Wentao Zheng, Hu Xiong, Zhiguang Qin:
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stand. Interfaces 54: 55-60 (2017) - [j54]Yang Chen, Yang Zhao, Hu Xiong, Feng Yue:
A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability. Int. J. Netw. Secur. 19(4): 573-582 (2017) - [j53]Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong:
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. Int. J. Netw. Secur. 19(4): 623-630 (2017) - [j52]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet. Int. J. Netw. Secur. 19(6): 940-949 (2017) - [j51]Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong:
Revocable ABE with Bounded Ciphertext in Cloud Computing. Int. J. Netw. Secur. 19(6): 973-983 (2017) - [j50]Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong:
Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare. Int. J. Netw. Secur. 19(6): 1044-1052 (2017) - [j49]Hu Xiong
, Qiang Wang, Jianfei Sun:
Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation". Inf. Process. Lett. 127: 67-70 (2017) - [j48]Zhen Qin, Jianfei Sun
, Dajiang Chen
, Hu Xiong
:
Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things. Mob. Inf. Syst. 2017: 7514867:1-7514867:15 (2017) - [j47]Hu Xiong, Jianfei Sun:
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing". IEEE Trans. Dependable Secur. Comput. 14(4): 461-462 (2017) - 2016
- [j46]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Philip Avornyo, Zhiguang Qin:
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. Int. J. Netw. Secur. 18(2): 235-243 (2016) - [j45]Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin:
An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment. Int. J. Netw. Secur. 18(3): 481-486 (2016) - [j44]Abubaker Wahaballa
, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin:
Secure mobile agent-based English auction protocol using identity-based signature scheme. Int. J. Secur. Networks 11(4): 175-187 (2016) - [j43]Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong
:
On the security of two identity-based signature schemes based on pairings. Inf. Process. Lett. 116(6): 416-418 (2016) - [j42]Hu Xiong
, Junyi Tao, Yanan Chen:
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems. J. Medical Syst. 40(11): 228:1-228:12 (2016) - [j41]Dong-fen Li, Rui-jin Wang, Fengli Zhang, Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Huayi Zhan:
A noise immunity controlled quantum teleportation protocol. Quantum Inf. Process. 15(11): 4819-4837 (2016) - [j40]Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long:
Fuzzy certificateless signature. Secur. Commun. Networks 9(16): 3658-3669 (2016) - [c16]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. BigCom 2016: 387-395 - [c15]Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Zhiguang Qin:
Measuring Trust in Online Social Networks. ICADIWT 2016: 26-39 - [i5]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. IACR Cryptol. ePrint Arch. 2016: 501 (2016) - 2015
- [j39]Yanan Chen, Weixiang Xu, Hu Xiong:
Strongly secure certificateless key-insulated signature secure in the standard model. Ann. des Télécommunications 70(9-10): 395-405 (2015) - [j38]Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li:
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 17(2): 129-134 (2015) - [j37]Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu:
Cryptanalysis of Attribute-based Ring Signcryption Scheme. Int. J. Netw. Secur. 17(2): 224-228 (2015) - [j36]Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin:
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme. Int. J. Netw. Secur. 17(6): 779-786 (2015) - [j35]Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene
, Songyang Wu, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. KSII Trans. Internet Inf. Syst. 9(3): 1246-1259 (2015) - [j34]Hu Xiong, Zhiguang Qin:
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 10(7): 1442-1455 (2015) - [j33]Hu Xiong, Songyang Wu, Fagen Li
, Zhiguang Qin:
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes. Wirel. Pers. Commun. 80(4): 1671-1685 (2015) - [j32]Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Zhiguang Qin:
Characterization of Complex Networks for Epidemics Modeling. Wirel. Pers. Commun. 83(4): 2835-2858 (2015) - [c14]Zhiguang Qin, Shikun Wu, Hu Xiong:
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing. BigCom 2015: 205-216 - [c13]Xuyun Nie, Bo Liu, Hu Xiong, Gang Lu:
Cubic Unbalance Oil and Vinegar Signature Scheme. Inscrypt 2015: 47-56 - 2014
- [j31]Hu Xiong, Yanan Chen, Guobin Zhu, Zhiguang Qin:
Analysis and improvement of a provable secure fuzzy identity-based signature scheme. Sci. China Inf. Sci. 57(9): 1-5 (2014) - [j30]Juan Bi, Zhiguang Qin, Hu Xiong, Jia Huang:
Simultaneous community discovery and user interests extraction in social network based on probabilistic model. Int. J. Intell. Inf. Database Syst. 8(3): 260-279 (2014) - [j29]Zhiguang Qin, Hu Xiong, Fagen Li:
A Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 16(4): 278-285 (2014) - [j28]Shengke Zeng, Hu Xiong:
Privacy-enhanced Designated Confirmer Signature without Random Oracles. Int. J. Netw. Secur. 16(5): 331-339 (2014) - [j27]Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. Inf. Sci. 268: 447-457 (2014) - [j26]Hu Xiong
:
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 9(12): 2327-2339 (2014) - [j25]Guobin Zhu, Hu Xiong, Zhiguang Qin:
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol. Wirel. Pers. Commun. 74(2): 883-889 (2014) - [j24]Guobin Zhu, Hu Xiong, Zhiguang Qin:
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model. Wirel. Pers. Commun. 79(2): 1401-1416 (2014) - [i4]Hu Xiong:
Toward Certificateless Signcryption Scheme Without Random Oracles. IACR Cryptol. ePrint Arch. 2014: 162 (2014) - 2013
- [j23]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li
:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j22]Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng:
An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. Int. J. Netw. Secur. 15(3): 161-170 (2013) - [j21]Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013) - [j20]Qinyi Li, Hu Xiong, Fengli Zhang:
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. Int. J. Secur. Networks 8(1): 1-12 (2013) - [j19]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li
:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j18]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - [j17]Hu Xiong, Fagen Li
, Zhiguang Qin:
Certificateless threshold signature secure in the standard model. Inf. Sci. 237: 73-81 (2013) - [j16]Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2): 927-932 (2013) - 2012
- [j15]Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3): 573-581 (2012) - [j14]Hu Xiong, Zhong Chen, Fagen Li
:
Bidder-anonymous English auction protocol based on revocable ring signature. Expert Syst. Appl. 39(8): 7062-7066 (2012) - [j13]Hu Xiong, Xiaofeng Wang, Fagen Li:
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 256-258 (2012) - [j12]Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin:
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 6(1): 20-27 (2012) - [j11]Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. Int. J. Netw. Secur. 14(5): 297-300 (2012) - [j10]Hu Xiong, Zhong Chen, Fagen Li
:
Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3-4): 1213-1221 (2012) - [j9]Hu Xiong, Zhong Chen, Fagen Li
:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. Secur. Commun. Networks 5(12): 1441-1451 (2012) - [c12]Fengli Zhang, Qinyi Li, Hu Xiong:
Efficient Revocable Key-Policy Attribute Based Encryption with Full Security. CIS 2012: 477-481 - 2011
- [j8]Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li
:
On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2): 129-135 (2011) - [j7]Hu Xiong, Zhiguang Qin, Fagen Li
:
Cryptanalysis of an Identity Based Signcryption without Random Oracles. Fundam. Informaticae 107(1): 105-109 (2011) - [j6]Hu Xiong, Zhong Chen, Zhiguang Qin:
Efficient three-party authenticated key agreement protocol in certificateless cryptography. Int. J. Comput. Math. 88(13): 2707-2716 (2011) - [j5]Hu Xiong, Zhiguang Qin, Fagen Li:
A Certificateless Proxy Ring Signature Scheme with Provable Security. Int. J. Netw. Secur. 12(2): 92-106 (2011) - [c11]Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 - [c10]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen:
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381 - [c9]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen:
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature. FSKD 2011: 2217-2221 - [c8]Hu Xiong, Qianhong Wu, Zhong Chen:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. INCoS 2011: 92-99 - [c7]Zhi Guan, Hu Xiong, Suke Li, Zhong Chen:
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 - [c6]Hu Xiong, Qianhong Wu, Zhong Chen:
Toward Pairing-Free Certificateless Authenticated Key Exchanges. ISC 2011: 79-94 - 2010
- [j4]Hu Xiong, Zhiguang Qin, Fagen Li:
Identity-based Threshold Signature Secure in the Standard Model. Int. J. Netw. Secur. 10(1): 75-80 (2010) - [j3]Hu Xiong, Fagen Li, Zhiguang Qin:
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography. Informatica 21(2): 277-294 (2010) - [c5]Yong Deng, Zhonghai Wu, Cong Tang, Huayou Si, Hu Xiong, Zhong Chen:
A Hybrid Movie Recommender Based on Ontology and Neural Networks. GreenCom/CPSCom 2010: 846-851 - [c4]Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication. ICC 2010: 1-6 - [i3]Hu Xiong, Jian-bin Hu, Tao Yang, Wei Xin, Zhong Chen:
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy. CoRR abs/1008.5015 (2010) - [i2]Hu Xiong, Zhong Chen:
Privacy-Preserving English Auction Protocol with Round Efficiency. CoRR abs/1010.5642 (2010)
2000 – 2009
- 2009
- [j2]Hu Xiong, Zhiguang Qin, Fagen Li:
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature. Int. J. Netw. Secur. 8(3): 235-242 (2009) - [c3]Jing Jin, Zhiguang Qin, Hu Xiong, Juan Wang, Zhigang Wu:
DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets. FCST 2009: 722-727 - [i1]Hu Xiong, Matei Ripeanu, Zhiguang Qin:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications. CoRR abs/0909.1590 (2009) - 2008
- [j1]Hu Xiong, Zhiguang Qin, Fagen Li:
An Improved Certificateless Signature Scheme Secure in the Standard Model. Fundam. Informaticae 88(1-2): 193-206 (2008) - [c2]Hu Xiong, Zhiguang Qin, Fagen Li:
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles. CIS (2) 2008: 308-313 - 2007
- [c1]Zhang Xunxie, Wang Xin, Shao Lianjun, Sun Qiang, Hu Xiong, Xu Li, Giulio Ruffini, D. Stephen, François Soulat:
First results of GNSS-R coastal experiment in China. IGARSS 2007: 5088-5092