Xiaoming Hu

Orcid: 0000-0001-8046-6457

Affiliations:
  • Shanghai Polytechnic University, College of Computer and Information Engineering, China


According to our database1, Xiaoming Hu authored at least 18 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
基于轨迹多特性的隐私保护算法 (Privacy Protection Algorithm Based on Multi-characteristics of Trajectory).
计算机科学, 2019

A generic construction of identity-based proxy signature scheme in the standard model.
Int. J. Inf. Comput. Secur., 2019

Security Anlysis of Certificateless Aggregate Signature Scheme in VANETs.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

2018
Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2017
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications.
Secur. Commun. Networks, 2017

改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier).
计算机科学, 2017

An improved efficient identity-based proxy signature in the standard model.
Int. J. Comput. Math., 2017

2016
An efficient designated verifier signature scheme with pairing-free and low cost.
Secur. Commun. Networks, 2016

Short and provably secure designated verifier proxy signature scheme.
IET Inf. Secur., 2016

Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

An undeniable strong DSVS scheme with no bilinear pairings.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
A short and highly efficient identity-based designated verifier proxy signature scheme.
Secur. Commun. Networks, 2015

Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction.
Proceedings of the International Joint Conference, 2015

2014
Constant Size Ciphertext and Private Key HIBE without Random Oracles.
J. Inf. Sci. Eng., 2014

2013
Short Hierarchical Identity-based Encryption in the Selective-ID Model.
J. Softw., 2013

2010
Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010


  Loading...