Certificateless signature and proxy signature schemes from bilinear pairings X Li, K Chen, L Sun Lithuanian Mathematical Journal 45 (1), 76-83, 2005 | 229 | 2005 |
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards X Li, W Qiu, D Zheng, K Chen, J Li IEEE Transactions on Industrial Electronics 57 (2), 793-800, 2009 | 147 | 2009 |
Cryptanalysis of a certificateless signcryption scheme in the standard model J Weng, G Yao, RH Deng, MR Chen, X Li Information Sciences 181 (3), 661-667, 2011 | 80 | 2011 |
Identity based proxy-signcryption scheme from pairings X Li, K Chen IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004 | 79 | 2004 |
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings X Li, K Chen Applied Mathematics and Computation 169 (1), 437-450, 2005 | 72 | 2005 |
Simulatability and security of certificateless threshold signatures L Wang, Z Cao, X Li, H Qian Information Sciences 177 (6), 1382-1394, 2007 | 62 | 2007 |
Identity-based key-insulated signature with secure key-updates J Weng, S Liu, K Chen, X Li International Conference on Information Security and Cryptology, 13-26, 2006 | 48 | 2006 |
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings X Li, K Chen, S Li International Conference on Parallel and Distributed Computing: Applications …, 2004 | 47 | 2004 |
Code-based Ring Signature Scheme. D Zheng, X Li, K Chen Int. J. Netw. Secur. 5 (2), 154-157, 2007 | 42 | 2007 |
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model X Li, H Qian, J Weng, Y Yu Mathematical and Computer Modelling 57 (3-4), 503-511, 2013 | 35 | 2013 |
CLKS: Certificateless keyword search on encrypted data Q Zheng, X Li, A Azgin International Conference on Network and System Security, 239-253, 2015 | 32 | 2015 |
Anonymity for bitcoin from secure escrow address Q Wang, X Li, Y Yu IEEE Access 6, 12336-12341, 2017 | 31 | 2017 |
Connected vehicles' security from the perspective of the in-vehicle network X Li, Y Yu, G Sun, K Chen IEEE Network 32 (3), 58-63, 2018 | 29 | 2018 |
Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J Weng, X Li, K Chen, S Liu J. Inf. Sci. Eng. 24 (4), 1143-1157, 2008 | 27 | 2008 |
Identity-based parallel key-insulated signature: Framework and construction J Weng, S Liu, K Chen, X Li Journal of Research and Practice in Information Technology 40 (1), 55-68, 2008 | 18 | 2008 |
YI Cloud: Improving user privacy with secret key recovery in cloud storage Z Huang, Q Li, D Zheng, K Chen, XX Li Proceedings of 2011 IEEE 6th International Symposium on Service Oriented …, 2011 | 17 | 2011 |
Analysis of speedup and communication/computation ratio in multiprocessor systems X Li, M Malek Proceedings. Real-Time Systems Symposium, 282,283,284,285,286,287,288-282 …, 1988 | 17 | 1988 |
Linkable ring signatures from linear feedback shift register D Zheng, X Li, K Chen, J Li International Conference on Embedded and Ubiquitous Computing, 716-727, 2007 | 16 | 2007 |
Verifiably encrypted signatures without random oracles 李祥学, 陈克非, 刘胜利, 李世群 上海交通大学学报: 英文版 11 (2), 230-235, 2006 | 16 | 2006 |
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations Y Sun, Y Yu, X Li, K Zhang, H Qian, Y Zhou Australasian Conference on Information Security and Privacy, 293-309, 2016 | 15 | 2016 |