Lanxiang Chen

Orcid: 0000-0002-5232-7801

According to our database1, Lanxiang Chen authored at least 42 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph.
IEEE Trans. Inf. Forensics Secur., 2024

Practical and malicious private set intersection with improved efficiency.
Theor. Comput. Sci., 2024

Using private set intersection to achieve privacy-preserving authorization for IoT systems.
J. Inf. Secur. Appl., 2024

2023
Global Combination and Clustering Based Differential Privacy Mixed Data Publishing.
IEEE Trans. Knowl. Data Eng., November, 2023

Structured encryption for triangle counting on graph data.
Future Gener. Comput. Syst., August, 2023

Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT.
IEEE Trans. Serv. Comput., 2023

CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023

Authenticable Data Analytics Over Encrypted Data in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT.
IEEE Trans. Cloud Comput., 2023

Enhanced Public-Key Searchable Encryption Scheme for Cloud-Based EHR Systems.
Proceedings of the IEEE International Conference on E-health Networking, 2023

2022
Structured encryption for knowledge graphs.
Inf. Sci., 2022

Blockchain-based random auditor committee for integrity verification.
Future Gener. Comput. Syst., 2022

2021
Secure and Efficient Data Aggregation for IoT Monitoring Systems.
IEEE Internet Things J., 2021

Post-quantum blockchain for secure communication in IoT-based smart home services.
Int. J. Embed. Syst., 2021

2020
On Reliability of Multiprocessor System Based on Star Graph.
IEEE Trans. Reliab., 2020

Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020

2019
On Metric Dimension in Some Hex Derived Networks.
Sensors, 2019

Multi-factor combination authentication using fuzzy graph domination model.
J. Intell. Fuzzy Syst., 2019

Enhanced secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2019

Blockchain based searchable encryption for electronic health record sharing.
Future Gener. Comput. Syst., 2019

Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Improving file locality in multi-keyword top-k search based on clustering.
Soft Comput., 2018

Parallel and High Speed Hashing in GPU for Telemedicine Applications.
IEEE Access, 2018

Metric Dimension and Robot Navigation in Specific Sensor Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

The Rainbow Restrained Domination in Torus Network.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
Soft Comput., 2017

2016
On conditional fault tolerance and diagnosability of hierarchical cubic networks.
Theor. Comput. Sci., 2016

Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Remote data possession checking with enhanced security for cloud storage.
Future Gener. Comput. Syst., 2015

2014
A hill cipher-based remote data possession checking in cloud storage.
Secur. Commun. Networks, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

2013
Using algebraic signatures to check data possession in cloud storage.
Future Gener. Comput. Syst., 2013

Data dynamics for remote data possession checking in cloud storage.
Comput. Electr. Eng., 2013

2012
Conditional Fault Diagnosability of Dual-Cubes.
Int. J. Found. Comput. Sci., 2012

The Design Principles for User-centered Remote Data Possession Checking.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Using Algebraic Signatures for Remote Data Possession Checking.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

2010
Integrating FPGA/ASIC into cryptographic storage systems to avoid re-encryption.
Int. J. Parallel Emergent Distributed Syst., 2010

2009
Using Session Identifiers as Authentication Tokens.
Proceedings of IEEE International Conference on Communications, 2009

2007
A Direction to Avoid Re-encryption in Cryptographic File Sharing.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

An Efficient Credential-Based Scheme for Cross-Domain File Sharing.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

The Security Threats and Corresponding Measures to Distributed Storage Systems.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007

FPGA/ASIC based Cryptographic Object Store System.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...