Rui Xue

According to our database1, Rui Xue
  • authored at least 84 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fast and Sensitive Ellipsometry-Based Biosensing.
Sensors, 2018

Attribute-based multi-function verifiable computation.
Future Generation Comp. Syst., 2018

2017
Radio Frequency Compatibility Evaluation of S Band Navigation Signals for Future BeiDou.
Sensors, 2017

Information-Assisted Density Peak Index for Hyperspectral Band Selection.
IEEE Geosci. Remote Sensing Lett., 2017

Data-Aided and Non-Data-Aided SNR Estimators for CPM Signals in Ka-Band Satellite Communications.
Information, 2017

A ranging code based on the improved Logistic map for future GNSS signals: code design and performance evaluation.
EURASIP J. Wireless Comm. and Networking, 2017

Timely address space rerandomization for resisting code reuse attacks.
Concurrency and Computation: Practice and Experience, 2017

Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size.
Comput. J., 2017

A kind of three-weight linear codes.
Cryptography and Communications, 2017

The New Large-Scale RNNLM System Based on Distributed Neuron.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium Workshops, 2017

Oblivious Multi-Keyword Search for Secure Cloud Storage Service.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Multi-Client Verifiable Computation Service for Outsourced Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

Two Efficient Tag-Based Encryption Schemes on Lattices.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Leveled FHE with Matrix Message Space.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Improving Cooperation between Systems Engineers and Project Managers in Engineering Projects - Towards the alignment of Systems Engineering and Project Management standards and guides. (Amélioration de la coopération entre les ingénieurs Système et les managers dans les projets d'Ingénierie - Vers un processus intégré obtenu par l'alignement des standards et guides de l'Ingénierie Système et de la Gestion de Projet).
PhD thesis, 2016

Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016

An Adaptive INS-Aided PLL Tracking Method for GNSS Receivers in Harsh Environments.
Sensors, 2016

Separations in circular security for arbitrary length key cycles, revisited.
Security and Communication Networks, 2016

Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system.
Security and Communication Networks, 2016

Dynamic proofs of retrievability with square-root oblivious RAM.
J. Ambient Intelligence and Humanized Computing, 2016

Dynamic iteration stopping algorithm for non-binary LDPC-coded high-order PRCPM in the Rayleigh fading channel.
EURASIP J. Wireless Comm. and Networking, 2016

Verifiable Computation for Randomized Algorithm.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016

Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

GBAS heavy-tail error overbounding with GARCH model.
Proceedings of the International Conference on Computer, 2016

2015
CPM Signals for Satellite Navigation in the S and C Bands.
Sensors, 2015

A Performance Improvement Method for Low-Cost Land Vehicle GPS/MEMS-INS Attitude Determination.
Sensors, 2015

Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions.
Security and Communication Networks, 2015

A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding.
JCM, 2015

An Alternating Variable Step-Size Adaptive Long-Range Prediction of LMS Fading Signals.
IJDSN, 2015

Compressive-Sensing-Based Video Codec by Autoregressive Prediction and Adaptive Residual Recovery.
IJDSN, 2015

The KDM-CCA Security of the Kurosawa-Desmedt Scheme.
IEICE Transactions, 2015

Binary Linear Codes With Two Weights.
IEEE Communications Letters, 2015

Efficient keyword search for public-key setting.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Verifiable Proxy Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Integrating the ISO/IEC 15288 Systems Engineering Standard with the PMBoK Project Management Guide to Optimize the Management of Engineering Projects.
Proceedings of the Complex Systems Design & Management, 2015

An Approach for Mitigating Potential Threats in Practical SSO Systems.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Role-based and time-bound access and management of EHR data.
Security and Communication Networks, 2014

General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.
JSW, 2014

On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives.
Inf. Sci., 2014

On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack.
IEICE Transactions, 2014

Bounded Fully Homomorphic Signature Schemes.
IACR Cryptology ePrint Archive, 2014

Managing systems engineering processes: A multi-standard approach.
Proceedings of the IEEE International Systems Conference, 2014

KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited.
Proceedings of the SECRYPT 2014, 2014

Managing Requirements: For an Integrated Approach from System Engineering to Project Management.
Proceedings of the Advances in Production Management Systems. Innovative and Knowledge-Based Production Management in a Global-Local World, 2014

2013
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices.
IACR Cryptology ePrint Archive, 2013

IK-CPA security implies IE-CCA security in the random oracle model.
SCIENCE CHINA Information Sciences, 2013

Soft Timing Synchronization Algorithm for CPM Signals.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

iBigTable: practical data integrity for bigtable in public cloud.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Zero Knowledge Proofs from Ring-LWE.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting.
IACR Cryptology ePrint Archive, 2012

On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives.
IACR Cryptology ePrint Archive, 2012

Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Inner-Product Lossy Trapdoor Functions and Applications.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Efficient Threshold Encryption from Lossy Trapdoor Functions.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks.
Proceedings of the Trusted Systems - Third International Conference, 2011

Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption.
Proceedings of the Financial Cryptography and Data Security, 2011

On the invisibility of designated confirmer signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Multifactor Identity Verification Using Aggregated Proof of Knowledge.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

A Timed Logic for Modeling and Reasoning about Security Protocols.
IACR Cryptology ePrint Archive, 2010

Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
IACR Cryptology ePrint Archive, 2010

A Short Signature Scheme from the RSA Family.
Proceedings of the Information Security - 13th International Conference, 2010

ASM-SPV: A Model Checker for Security Protocols.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Formal Verification of HMQV Using ASM-SPV.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Statistically Hiding Sets.
Proceedings of the Topics in Cryptology, 2009

2008
Preface.
J. Comput. Sci. Technol., 2008

Algebraic Construction for Zero-Knowledge Sets.
J. Comput. Sci. Technol., 2008

Design of a CIL Connector to Spin.
International Journal of Software Engineering and Knowledge Engineering, 2008

2007
Statistically Hiding Sets.
IACR Cryptology ePrint Archive, 2007

Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Universal Accumulators with Efficient Nonmembership Proofs.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Security Analysis of Some Batch Verifying Signatures from Pairings.
I. J. Network Security, 2006

2005
A randomized RSA-based partially blind signature scheme for electronic cash.
Computers & Security, 2005

Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

ID-Based Ring Authenticated Encryption.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient ID-Based Deniable Authentication Protocol from Pairings.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
New Semantic Model for Authentication Protocols in ASMs.
J. Comput. Sci. Technol., 2004

Microarray Gene Expression Profile Data Mining Model for Clinical Cancer Research.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Optimum Detection of MultiplicativeWatermarks for Digital Images in the DWT Domain.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

Improved Privacy-Protecting Proxy Signature Scheme.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Security Analysis of User Efficient Blind Signatures.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
On decidability and model checking for a first order modal logic for value-passing processes.
Science in China Series F: Information Sciences, 2003


  Loading...