"xiangxue li"
"xiangxue li"
Verified email at
Cited by
Cited by
Certificateless signature and proxy signature schemes from bilinear pairings
X Li, K Chen, L Sun
Lithuanian Mathematical Journal 45 (1), 76-83, 2005
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
X Li, W Qiu, D Zheng, K Chen, J Li
IEEE Transactions on Industrial Electronics 57 (2), 793-800, 2009
Cryptanalysis of a certificateless signcryption scheme in the standard model
J Weng, G Yao, RH Deng, MR Chen, X Li
Information Sciences 181 (3), 661-667, 2011
Identity based proxy-signcryption scheme from pairings
X Li, K Chen
IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
X Li, K Chen
Applied Mathematics and Computation 169 (1), 437-450, 2005
Simulatability and security of certificateless threshold signatures
L Wang, Z Cao, X Li, H Qian
Information Sciences 177 (6), 1382-1394, 2007
Identity-based key-insulated signature with secure key-updates
J Weng, S Liu, K Chen, X Li
International Conference on Information Security and Cryptology, 13-26, 2006
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
X Li, K Chen, S Li
International Conference on Parallel and Distributed Computing: Applications …, 2004
Code-based Ring Signature Scheme.
D Zheng, X Li, K Chen
Int. J. Netw. Secur. 5 (2), 154-157, 2007
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
X Li, H Qian, J Weng, Y Yu
Mathematical and Computer Modelling 57 (3-4), 503-511, 2013
CLKS: Certificateless keyword search on encrypted data
Q Zheng, X Li, A Azgin
International Conference on Network and System Security, 239-253, 2015
Anonymity for bitcoin from secure escrow address
Q Wang, X Li, Y Yu
IEEE Access 6, 12336-12341, 2017
Connected vehicles' security from the perspective of the in-vehicle network
X Li, Y Yu, G Sun, K Chen
IEEE Network 32 (3), 58-63, 2018
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J Weng, X Li, K Chen, S Liu
J. Inf. Sci. Eng. 24 (4), 1143-1157, 2008
Identity-based parallel key-insulated signature: Framework and construction
J Weng, S Liu, K Chen, X Li
Journal of Research and Practice in Information Technology 40 (1), 55-68, 2008
YI Cloud: Improving user privacy with secret key recovery in cloud storage
Z Huang, Q Li, D Zheng, K Chen, XX Li
Proceedings of 2011 IEEE 6th International Symposium on Service Oriented …, 2011
Analysis of speedup and communication/computation ratio in multiprocessor systems
X Li, M Malek
Proceedings. Real-Time Systems Symposium, 282,283,284,285,286,287,288-282 …, 1988
Linkable ring signatures from linear feedback shift register
D Zheng, X Li, K Chen, J Li
International Conference on Embedded and Ubiquitous Computing, 716-727, 2007
Verifiably encrypted signatures without random oracles
李祥学, 陈克非, 刘胜利, 李世群
上海交通大学学报: 英文版 11 (2), 230-235, 2006
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
Y Sun, Y Yu, X Li, K Zhang, H Qian, Y Zhou
Australasian Conference on Information Security and Privacy, 293-309, 2016
The system can't perform the operation now. Try again later.
Articles 1–20