Xiaochao Wei

According to our database1, Xiaochao Wei authored at least 17 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.
Security and Communication Networks, 2019

Face Detection for Privacy Protected Images.
IEEE Access, 2019

Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications.
IEEE Access, 2019

2018
Efficient and secure outsourced approximate pattern matching protocol.
Soft Comput., 2018

An ORAM-based privacy preserving data sharing scheme for cloud storage.
J. Inf. Sec. Appl., 2018

2017
k-out-of-n oblivious transfer protocol with security against malicious adversaries.
Comput. Syst. Sci. Eng., 2017

2016
A Decision Method to Maximize Service Quality under Budget Constraints: The Kano Study of a Chinese Machinery Manufacturer.
Scientific Programming, 2016

A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Practical Server-Aided k-out-of-n Oblivious Transfer Protocol.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Several Oblivious Transfer Variants in Cut-and-Choose Scenario.
IJISP, 2015

Cut-and-Choose Bilateral Oblivious Transfer and Its Application.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient ORAM Based on Binary Tree without Data Overflow and Evictions.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptology ePrint Archive, 2014

2013
Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption.
J. Artificial Societies and Social Simulation, 2013

2005
Protect Interactive 3D Models via Vertex Shader Programming.
Proceedings of the Entertainment Computing, 2005

Geometric model reconstruction from streams of DirectX 3D game application.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2005


  Loading...