Xiufeng Zhao

Orcid: 0000-0002-9737-6842

According to our database1, Xiufeng Zhao authored at least 18 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
An IBE scheme based on hybrid sampler over NTRU lattice.
Int. J. Inf. Comput. Secur., 2025

HP-CP-ABE scheme against collusion attacks under an attribute-key security model.
Int. J. Inf. Comput. Secur., 2025

2024
Stochastic Evolutionary Game Model of Hot Topics Propagation for Network Public Opinion.
IEEE Trans. Comput. Soc. Syst., December, 2024

2021
Secure Two-party Dilithium Signing Protocol.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
A Salient Object Detection Algorithm Based on Region Merging and Clustering.
Proceedings of the Intelligent Information Processing X, 2020

2019
One Improved RLWE-based FHE and Fast Private Information Retrieval.
KSII Trans. Internet Inf. Syst., 2019

2018
Privacy Protection of IoT Based on Fully Homomorphic Encryption.
Wirel. Commun. Mob. Comput., 2018

Generalized Bootstrapping Technique Based on Block Equality Test Algorithm.
Secur. Commun. Networks, 2018

Analysis on Matrix GSW-FHE and Optimizing Bootstrapping.
Secur. Commun. Networks, 2018

Multi-bit Leveled Homomorphic Encryption of Message Matrices.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2017
Optimizing LWE-based FHE for Better Security and Privacy Protection of Smart City.
J. Inf. Sci. Eng., 2017

2015
Cloud data integrity checking protocol from lattice.
Int. J. High Perform. Comput. Netw., 2015

Two improved homomorphic MAC schemes in network coding.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2011
A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity.
J. Networks, 2011

A New Cross-realm Group Password-based Authenticated Key Exchange Protocol.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Generalized Hierarchical Identity-Based Signcryption.
J. Comput., 2010

Asymmetric Group Key Agreement with Traitor Traceability.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...