Licheng Wang

Orcid: 0000-0002-7216-8721

According to our database1, Licheng Wang authored at least 203 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Event-triggered distributed optimization for model-free multi-agent systems.
Frontiers Inf. Technol. Electron. Eng., 2024

2023
A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server.
IEEE Syst. J., December, 2023

Practical NTRU Signcryption in the Standard Model.
Entropy, December, 2023

PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem.
BMC Bioinform., December, 2023

Strongly Synchronized Redactable Blockchain Based on Verifiable Delay Functions.
IEEE Internet Things J., October, 2023

Stabilization of linear discrete-time systems over resource-constrained networks under dynamical multiple description coding scheme.
Autom., October, 2023

A Data Sharing Scheme Based on Federated Learning in IoV.
IEEE Trans. Veh. Technol., September, 2023

Distributed Online Voltage Control With Fast PV Power Fluctuations and Imperfect Communication.
IEEE Trans. Smart Grid, September, 2023

Finite-Horizon $H_{\infty }$ Filtering via a High-Rate Network With the FlexRay Protocol.
IEEE Trans. Autom. Control., June, 2023

Security-Ensured State of Charge Estimation of Lithium-Ion Batteries Subject to Malicious Attacks.
IEEE Trans. Smart Grid, May, 2023

A Joint Online Strategy of Measurement Outliers Diagnosis and State of Charge Estimation for Lithium-Ion Batteries.
IEEE Trans. Ind. Informatics, May, 2023

Privacy-Preserved Distributed Optimization for Multi-Agent Systems With Antagonistic Interactions.
IEEE Trans. Circuits Syst. I Regul. Pap., March, 2023

Analysis of Soil Moisture Change Characteristics and Influencing Factors of Grassland on the Tibetan Plateau.
Remote. Sens., January, 2023

Multimodal Pre-Training Based on Graph Attention Network for Document Understanding.
IEEE Trans. Multim., 2023

TRCT: A Traceable Anonymous Transaction Protocol for Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023

Proportional-Integral Observer Design for Multirate-Networked Systems Under Constrained Bit Rate: An Encoding-Decoding Mechanism.
IEEE Trans. Cybern., 2023

A Soft Coordination Method of Heterogeneous Devices in Distribution System Voltage Control.
CoRR, 2023

2022
Recursive Set-Membership State Estimation Over a FlexRay Network.
IEEE Trans. Syst. Man Cybern. Syst., 2022

State-of-Charge Estimation of Lithium-Ion Batteries Subject to Random Sensor Data Unavailability: A Recursive Filtering Approach.
IEEE Trans. Ind. Electron., 2022

H∞ Pinning Control of Complex Dynamical Networks Under Dynamic Quantization Effects: A Coupled Backward Riccati Equation Approach.
IEEE Trans. Cybern., 2022

Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Leveraging the hardness of dihedral coset problem for quantum cryptography.
Quantum Inf. Process., 2022

Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting.
J. Syst. Archit., 2022

Group public key encryption supporting equality test without bilinear pairings.
Inf. Sci., 2022

Non-fragile <i>l</i><sub>2</sub>-<i>l</i><sub>∞</sub> state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach.
Int. J. Syst. Sci., 2022

Gain-scheduled state estimation for discrete-time complex networks under bit-rate constraints.
Neurocomputing, 2022

Partial-neurons-based state estimation for artificial neural networks under constrained bit rate: The finite-time case.
Neurocomputing, 2022

Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency.
IACR Cryptol. ePrint Arch., 2022

Security Analysis of DBTRU Cryptosystem.
Entropy, 2022

Post-Quantum κ-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets.
CoRR, 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

Event-based state estimation under constrained bit rate: An encoding-decoding approach.
Autom., 2022

"This article is interesting, however": exploring the language use in the peer review comment of articles published in the BMJ.
Aslib J. Inf. Manag., 2022

OGM: Online gaussian graphical models on the fly.
Appl. Intell., 2022

Event-based joint state and fault estimation: The envelope-constrained H∞ criterion.
Appl. Math. Comput., 2022

A Novel Intelligent Ant Colony System Based on Blockchain.
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022

2021
On Achieving Trustworthy Service Function Chaining.
IEEE Trans. Netw. Serv. Manag., 2021

Nondestructive Defect Detection in Castings by Using Spatial Attention Bilinear Convolutional Neural Network.
IEEE Trans. Ind. Informatics, 2021

A Novel Feature Points Tracking Algorithm in Terms of IMU-Aided Information Fusion.
IEEE Trans. Ind. Informatics, 2021

CRLEDD: Regularized Causalities Learning for Early Detection of Diseases Using Electronic Health Record (EHR) Data.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Finite-Horizon H<sub>∞</sub> State Estimation for Stochastic Coupled Networks With Random Inner Couplings Using Round-Robin Protocol.
IEEE Trans. Cybern., 2021

Recursive Filtering With Measurement Fading: A Multiple Description Coding Scheme.
IEEE Trans. Autom. Control., 2021

Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things.
Secur. Commun. Networks, 2021

Location privacy-preserving in online taxi-hailing services.
Peer-to-Peer Netw. Appl., 2021

Generalising combinatorial discriminant analysis through conditioning truncated Rayleigh flow.
Knowl. Inf. Syst., 2021

Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach.
Inf. Sci., 2021

Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence.
IEEE Internet Things J., 2021

New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups.
Inf., 2021

Physical layer authentication for automotive cyber physical systems based on modified HB protocol.
Frontiers Comput. Sci., 2021

Pinning Synchronization Control for a Class of Dynamical Networks with Coupled Time-Varying Delays: An Interval-Observer-Based Approach.
Circuits Syst. Signal Process., 2021

State of Charge Estimation of Composite Energy Storage Systems with Supercapacitors and Lithium Batteries.
Complex., 2021

Improving covariance-regularized discriminant analysis for EHR-based predictive analytics of diseases.
Appl. Intell., 2021

Pairing-Free for Public Key Encryption With Equality Test Scheme.
IEEE Access, 2021

A Closed-Form Target Localization Method for FDA-MIMO Based on root-MUSIC and ESPRIT Algorithm.
Proceedings of the SSPS 2021: The 3rd International Symposium on Signal Processing Systems, Beijing China, March 26, 2021

2020
Mixed $H_2/H_\infty$ State Estimation for Discrete-Time Switched Complex Networks With Random Coupling Strengths Through Redundant Channels.
IEEE Trans. Neural Networks Learn. Syst., 2020

Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes.
Secur. Commun. Networks, 2020

Quantum algorithms for typical hard problems: a perspective of cryptanalysis.
Quantum Inf. Process., 2020

Distributed resilient filtering of large-scale systems with channel scheduling.
Kybernetika, 2020

Mismatch Removal Based on Gaussian Mixture Model for Aircraft Surface Texture Mapping.
Inf. Technol. Control., 2020

Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing.
IEEE Internet Things J., 2020

Event-triggered control for discrete-time systems with unknown nonlinearities: an interval observer-based approach.
Int. J. Syst. Sci., 2020

Wireless-sensor-network-based target localization: A semidefinite relaxation approach with adaptive threshold correction.
Neurocomputing, 2020

New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
IACR Cryptol. ePrint Arch., 2020

Public Key Encryption with Keyword Search in Cloud: A Survey.
Entropy, 2020

RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service.
Entropy, 2020

Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters.
Entropy, 2020

New Constructions of Identity-Based Dual Receiver Encryption from Lattices.
Entropy, 2020

CBOL: Cross-Bank Over-Loan Prevention, Revisited.
Entropy, 2020

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud.
Cryptogr., 2020

A Multivariate Public Key Encryption Scheme With Equality Test.
IEEE Access, 2020

Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik's Cubes.
IEEE Access, 2020

IDDS: An ICN based Data Dissemination Scheme for Vehicular Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Quasi-optimal Data Placement for Secure Multi-tenant Data Federation on the Cloud.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Impacts of large-scale PV integration on power distribution systems and investigation of possible solutions
PhD thesis, 2019

Observer-Based Consensus Control for Discrete-Time Multiagent Systems With Coding-Decoding Communication Protocol.
IEEE Trans. Cybern., 2019

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
J. Parallel Distributed Comput., 2019

Cryptographic primitives in blockchains.
J. Netw. Comput. Appl., 2019

Variance-constrained <i>H</i><sub>∞</sub> state estimation for time-varying multi-rate systems with redundant channels: The finite-horizon case.
Inf. Sci., 2019

Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT.
IEEE Internet Things J., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019

Investigation of Var Compensation Schemes in Unbalanced Distribution Systems.
Complex., 2019

A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

DDmap: a MATLAB package for the double digest problem using multiple genetic operators.
BMC Bioinform., 2019

EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing.
IEEE Access, 2019

Attribute-Based Signcryption From Lattices in the Standard Model.
IEEE Access, 2019

New Construction of Blind Signatures From Braid Groups.
IEEE Access, 2019

An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains.
IEEE Access, 2019

Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting.
IEEE Access, 2019

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices.
IEEE Access, 2019

RMVP: A Real-Time Method to Monitor Random Processes of Virtual Machine.
IEEE Access, 2019

A Survey on Personalized News Recommendation Technology.
IEEE Access, 2019

Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV.
Proceedings of the Security and Privacy in Communication Networks, 2019

A blockchain-based loan over-prevention mechanism.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

RZcash: A Privacy Protection Scheme for the Account-based Blockchain.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

SecureGBM: Secure Multi-Party Gradient Boosting.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.
World Wide Web, 2018

Lightweight Cryptographic Techniques for Automotive Cybersecurity.
Wirel. Commun. Mob. Comput., 2018

Modeling and Analysis of Open-Delta Step Voltage Regulators for Unbalanced Distribution Network With Photovoltaic Power Generation.
IEEE Trans. Smart Grid, 2018

Voltage Management for Large Scale PV Integration into Weak Distribution Systems.
IEEE Trans. Smart Grid, 2018

On Efficient Constructions of Lightweight MDS Matrices.
IACR Trans. Symmetric Cryptol., 2018

Finite-Time State Estimation for Recurrent Delayed Neural Networks With Component-Based Event-Triggering Protocol.
IEEE Trans. Neural Networks Learn. Syst., 2018

Synchronization Control for a Class of Discrete-Time Dynamical Networks With Packet Dropouts: A Coding-Decoding-Based Approach.
IEEE Trans. Cybern., 2018

Event-Based Variance-Constrained ${\mathcal {H}}_{\infty }$ Filtering for Stochastic Parameter Systems Over Sensor Networks With Successive Missing Measurements.
IEEE Trans. Cybern., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation.
Sensors, 2018

MIStore: a Blockchain-Based Medical Insurance Storage System.
J. Medical Syst., 2018

New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems.
KSII Trans. Internet Inf. Syst., 2018

On quantized H∞ filtering for multi-rate systems under stochastic communication protocols: The finite-horizon case.
Inf. Sci., 2018

Encoding-Decoding-Based control and filtering of networked systems: insights, developments and opportunities.
IEEE CAA J. Autom. Sinica, 2018

Loamit: A Blockchain-based Residual Loanable-limit Query System.
IACR Cryptol. ePrint Arch., 2018

An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems.
Fundam. Informaticae, 2018

Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others.
Fundam. Informaticae, 2018

Primitives towards verifiable computation: a survey.
Frontiers Comput. Sci., 2018

Securing Named Data Networking: Attribute-Based Encryption and Beyond.
IEEE Commun. Mag., 2018

Quantifying team precedence in the game of cricket.
Clust. Comput., 2018

BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation.
IEEE Access, 2018

AntNest: Fully Non-Interactive Secure Multi-Party Computation.
IEEE Access, 2018

A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems.
IEEE Access, 2018

Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018

2017
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities.
Secur. Commun. Networks, 2017

Pairing-free equality test over short ciphertexts.
Int. J. Distributed Sens. Networks, 2017

CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite.
IACR Cryptol. ePrint Arch., 2017

On the Efficient Construction of Lightweight Orthogonal MDS Matrices.
IACR Cryptol. ePrint Arch., 2017

Noiseless Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
Concurr. Comput. Pract. Exp., 2017

Minimum length key in MST cryptosystems.
Sci. China Inf. Sci., 2017

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing.
IEEE Access, 2017

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things.
IEEE Access, 2017

Prediction of Rising Stars in the Game of Cricket.
IEEE Access, 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

Event-triggered variance-constrained finite-horizon state estimation for discrete-time systems with redundant channels.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

2016
An Event-Triggered Approach to State Estimation for a Class of Complex Networks With Mixed Time Delays and Nonlinearities.
IEEE Trans. Cybern., 2016

Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects.
Int. J. Gen. Syst., 2016

Challenges of Fully Homomorphic Encryptions for the Internet of Things.
IEICE Trans. Inf. Syst., 2016

Construction of Lightweight MDS Matrices over Matrix Polynomial Residue Ring.
IACR Cryptol. ePrint Arch., 2016

Construction of DNA codes by using algebraic number theory.
Finite Fields Their Appl., 2016

Public Key Encryption in Non-Abelian Groups.
CoRR, 2016

Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Concurr. Comput. Pract. Exp., 2016

An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Star-Topological Privacy Encryption for Telecare Medical Information Systems.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Identity-based signcryption from lattices.
Secur. Commun. Networks, 2015

Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings.
IACR Cryptol. ePrint Arch., 2015

Minimal logarithmic signatures for the unitary group U<sub>n</sub>(q).
Des. Codes Cryptogr., 2015

Minimal Logarithmic Signatures for one type of Classical Groups.
CoRR, 2015

Minimal Logarithmic Signatures for Sporadic Groups.
CoRR, 2015

A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
Hierarchical identity-based broadcast encryption scheme from LWE.
J. Commun. Networks, 2014

A Fuzzy Identity-Based Signcryption Scheme from Lattices.
KSII Trans. Internet Inf. Syst., 2014

A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.
KSII Trans. Internet Inf. Syst., 2014

Probability-dependent H<sub>∞</sub> synchronization control for dynamical networks with randomly varying nonlinearities.
Neurocomputing, 2014

Reliable <i>H</i><sub>∞</sub> filtering for discrete piecewise linear systems with infinite distributed delays.
Int. J. Gen. Syst., 2014

Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014

A lattice-based signcryption scheme without random oracles.
Frontiers Comput. Sci., 2014

All exceptional groups of lie type have minimal logarithmic signatures.
Appl. Algebra Eng. Commun. Comput., 2014

2013
New public key cryptosystems based on non-Abelian factorization problems.
Secur. Commun. Networks, 2013

CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
J. Softw., 2013

Certificate-based proxy decryption systems with revocability in the standard model.
Inf. Sci., 2013

State estimation for complex networks with randomly occurring coupling delays.
Neurocomputing, 2013

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013

New Efficient Identity-Based Encryption From Factorization.
IACR Cryptol. ePrint Arch., 2013

More Efficient Cryptosystems From k-th Power Residues.
IACR Cryptol. ePrint Arch., 2013

Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013

Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013

2012
CSP-DHIES: a new public-key encryption scheme from matrix conjugation.
Secur. Commun. Networks, 2012

Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012

Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011

Enable delegation for RBAC with Secure Authorization Certificate.
Comput. Secur., 2011

2010
Multi-use and unidirectional identity-based proxy re-encryption schemes.
Inf. Sci., 2010

Comment on Wu et al.'s Server-aided Verification Signature Schemes.
Int. J. Netw. Secur., 2010

Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010

Secure network coding in the presence of eavesdroppers.
Sci. China Inf. Sci., 2010

A new impossible differential attack on SAFER ciphers.
Comput. Electr. Eng., 2010

New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Measurement Error Compensation Using Data Fusion Technique for Laser Scanner on AACMMs.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010

New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Mesoscopic simulation of chloride ions diffusion in frost-damaged concrete.
Int. J. Model. Identif. Control., 2009

New Cryptosystems From CSP-Based Self-Distributive Systems.
IACR Cryptol. ePrint Arch., 2009

Collision Attacks on NaSHA-384/512.
IACR Cryptol. ePrint Arch., 2009

Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Modeling Internet Applications with Event Graphs.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Simulation of Key Management Protocol in Wireless Sensor Networks.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

A Fair Concurrent Signature Scheme Based on Identity.
Proceedings of the High Performance Computing and Applications, 2009

2008
Biased Bit Commitment and Applications.
J. Inf. Sci. Eng., 2008

New designing of cryptosystems based on quadratic fields.
Sci. China Ser. F Inf. Sci., 2008

2007
Simulatability and security of certificateless threshold signatures.
Inf. Sci., 2007

Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Efficient Password-based Authenticated Key Exchange without Public Information.
IACR Cryptol. ePrint Arch., 2007

New Public Key Cryptosystems Using Polynomials over Non-commutative Rings.
IACR Cryptol. ePrint Arch., 2007

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Stand. Interfaces, 2007

Transitive Signatures from Braid Groups.
Proceedings of the Progress in Cryptology, 2007

2006
A New Construction of Time Capsule Signature.
IACR Cryptol. ePrint Arch., 2006

Efficient ID-based Threshold Signature Schemes without Pairings.
IACR Cryptol. ePrint Arch., 2006

New Public Key Authentication Frameworks with Lite Certification Authority.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Improvement of an Identity-Based Key Issuing Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Hybrid Genetic Algorithm for Solving the Degree-Constrained Minimal Bandwidth Multicast Routing Problem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...