Shaoquan Jiang
Citata da
Citata da
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
Financial Cryptography and Data Security: 12th International Conference, FC…, 2008
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
Optimal Secure Message Transmission by Public Discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE Transactions on Information Theory 57 (1), 572-585, 2011
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
Improved algorithm of Louvain communities dipartition
ZF Wu, PF Wang, ZG Qin, SQ Jiang
Journal of University of Electronic Science and Technology of China 42 (1…, 2013
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference (COCOON), 479-491, 2011
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
Deniable authentication on the internet
S Jiang
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007…, 2008
Message Authentication Code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
On interleaved sequences over finite fields
S Jiang, Z Dai, G Gong
Discrete mathematics 252 (1-3), 161-178, 2002
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
Corruption-localizing hashing
GD Crescenzo, S Jiang, R Safavi-Naini
European Symposium on Research in Computer Security (ESORICS), 489-504, 2009
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
S Jiang, G Gong, J He, K Nguyen, H Wang
IACR international conference on public-key cryptography, 396-427, 2020
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20