# Xiyong Zhang

According to our database

Collaborative distances:

^{1}, Xiyong Zhang authored at least 26 papers between 2006 and 2020.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2020

Model and criteria on the global finite-time synchronization of the chaotic gyrostat systems.

Math. Comput. Simul., 2020

2019

A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.

Ad Hoc Networks, 2019

2017

Adv. Math. Commun., 2017

2016

Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.

Sensors, 2016

2015

Finite Fields Their Appl., 2015

2014

Finding normal bases over finite fields with prescribed trace self-orthogonal relations.

Finite Fields Their Appl., 2014

2013

CoRR, 2013

2012

IEEE Trans. Inf. Theory, 2012

Finite Fields Their Appl., 2012

2011

Wirel. Commun. Mob. Comput., 2011

The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables.

IEEE Trans. Inf. Theory, 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.

Inf. Sci., 2011

Characterizations of Bent and Almost Bent Function on \mathbb<i>Z</i><sub><i>p</i></sub><sup>2</sup>.

Graphs Comb., 2011

Discret. Math., 2011

Comput. Secur., 2011

2010

Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.

Int. J. Secur. Networks, 2010

CoRR, 2010

2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.

Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Proceedings of the Provable Security, Third International Conference, 2009

Proceedings of the Third International Conference on Network and System Security, 2009

2008

fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.

Electron. Notes Theor. Comput. Sci., 2008

Comput. Secur., 2008

Appl. Algebra Eng. Commun. Comput., 2008

2007

Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.

Finite Fields Their Appl., 2007

2006

Proceedings of the Sequences and Their Applications, 2006

Proceedings of the Cryptology and Network Security, 5th International Conference, 2006