"xiangxue li"
"xiangxue li"
Verified email at
Cited by
Cited by
Certificateless signature and proxy signature schemes from bilinear pairings
X Li, K Chen, L Sun
Lithuanian Mathematical Journal 45, 76-83, 2005
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
X Li, W Qiu, D Zheng, K Chen, J Li
IEEE Transactions on Industrial Electronics 57 (2), 793-800, 2009
Identity based proxy-signcryption scheme from pairings
X Li, K Chen
IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004
Cryptanalysis of a certificateless signcryption scheme in the standard model
J Weng, G Yao, RH Deng, MR Chen, X Li
Information Sciences 181 (3), 661-667, 2011
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
X Li, K Chen
Applied Mathematics and Computation 169 (1), 437-450, 2005
Simulatability and security of certificateless threshold signatures
L Wang, Z Cao, X Li, H Qian
Information Sciences 177 (6), 1382-1394, 2007
Anonymity for bitcoin from secure escrow address
Q Wang, X Li, Y Yu
IEEE Access 6, 12336-12341, 2017
Identity-based key-insulated signature with secure key-updates
J Weng, S Liu, K Chen, X Li
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006 …, 2006
Connected vehicles' security from the perspective of the in-vehicle network
X Li, Y Yu, G Sun, K Chen
IEEE Network 32 (3), 58-63, 2018
Code-based Ring Signature Scheme.
D Zheng, X Li, K Chen
Int. J. Netw. Secur. 5 (2), 154-157, 2007
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
X Li, K Chen, S Li
International Conference on Parallel and Distributed Computing: Applications …, 2004
CLKS: Certificateless keyword search on encrypted data
Q Zheng, X Li, A Azgin
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
X Li, H Qian, J Weng, Y Yu
Mathematical and Computer Modelling 57 (3-4), 503-511, 2013
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J Weng, X Li, K Chen, S Liu
J. Inf. Sci. Eng. 24 (4), 1143-1157, 2008
Internet of things meets vehicles: sheltering in-vehicle network through lightweight machine learning
J Xiao, H Wu, X Li
Symmetry 11 (11), 1388, 2019
Analysis of speedup and communication/computation ratio in multiprocessor systems
X Li, M Malek
Proceedings. Real-Time Systems Symposium, 282,283,284,285,286,287,288-282 …, 1988
Vuldigger: A just-in-time and cost-aware tool for digging vulnerability-contributing changes
L Yang, X Li, Y Yu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Linkable ring signatures from linear feedback shift register
D Zheng, X Li, K Chen, J Li
International Conference on Embedded and Ubiquitous Computing, 716-727, 2007
Identity-based parallel key-insulated signature: Framework and construction
J Weng, S Liu, K Chen, X Li
Journal of Research and Practice in Information Technology 40 (1), 55-68, 2008
The system can't perform the operation now. Try again later.
Articles 1–20