Xiangguo Cheng

According to our database1, Xiangguo Cheng authored at least 41 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Computer Networks, 2019

2018
Towards a Novel Trust-Based Multicast Routing for VANETs.
Security and Communication Networks, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

A Novel Recommendation-Based Trust Inference Model for MANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks.
Proceedings of the 2018 International Conference on Identification, 2018

2017
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wireless Networks, 2016

2015
A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IEEE Trans. Smart Grid, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
An ID-Based Short Group Signature Scheme.
JSW, 2013

Security analysis and improvement of two verifiable multi-secret sharing schemes.
IJSN, 2013

2012
Intrusion-resilient identity-based signature: Security definition and construction.
Journal of Systems and Software, 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

A Practical ID-Based Group Signature Scheme.
JCP, 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2012

2011
ID-Based Sequential Aggregate Signatures.
JSW, 2011

New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

A New Approach to Group Signature Schemes.
JCP, 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
JNW, 2010

A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
JSW, 2009

2008
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

2007
An Efficient Identity-based Signature Scheme and Its Applications.
I. J. Network Security, 2007

2006
An Identity-based Mediated Signature Scheme from Bilinear Pairing.
I. J. Network Security, 2006

A New ID-Based Broadcast Encryption Scheme.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Methods to Forge ElGamal Signatures and Determine Secret Key.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Practical Group Signatures from RSA.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Cryptanalysis of Rijndael S-box and improvement.
Applied Mathematics and Computation, 2005

Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing.
Proceedings of the Computational Science and Its Applications, 2005

Efficient Group Signatures from Bilinear Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Cryptanalysis of a Cellular Automata Cryptosystem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An AES S-Box to Increase Complexity and Cryptographic Analysis.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Identity-Based Signature and Its Threshold Version.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...