Huixian Li

Orcid: 0000-0001-8098-9573

According to our database1, Huixian Li authored at least 27 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability.
J. Inf. Secur. Appl., 2022

2020
MPKC-based threshold proxy signcryption scheme.
Int. Arab J. Inf. Technol., 2020

2019
Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC.
IEEE Access, 2019

Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel.
IEEE Access, 2019

2018
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings.
IEEE Access, 2018

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials.
IEEE Access, 2018

2017
Efficient and secure certificateless signature scheme in the standard model.
Int. J. Commun. Syst., 2017

Directed proxy signature with fast revocation proven secure in the standard model.
IET Inf. Secur., 2017

2016
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model.
Int. J. Distributed Sens. Networks, 2016

Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme.
Int. J. Distributed Sens. Networks, 2016

2015
Secure of personal health records shared in cloud computing using cipher-text attribute based encryption.
Int. J. Secur. Networks, 2015

Anonymous multi-receiver ID-based signcryption scheme.
IET Inf. Secur., 2015

2014
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
Int. J. Commun. Syst., 2014

Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2014

2013
Improvement on Meshram et al.'s ID-based cryptographic mechanism.
Inf. Process. Lett., 2013

nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness.
Comput. Informatics, 2013

An efficient authentication protocol with user anonymity for mobile networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Improved multicast key management of Chinese wireless local area network security standard.
IET Commun., 2012

Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Research on Sentiment Analyzing in Multi-topics Texts.
Proceedings of the Advances in Computer Science, 2011

A Novel Hash-based RFID Mutual Authentication Protocol.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Secure Communication Model of WSN Based on Secret Sharing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Key Binding Based on Biometric Shielding Functions.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Novel Biometric-Based Authentication Scheme with Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Improvement on WLAN Multicast Key Management Protocol.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2003
An exploratory case study on IS implementation and organizational change in China.
Proceedings of the 11th European Conference on Information Systems, 2003


  Loading...