Yuan Chen
Orcid: 0000-0003-3004-1455Affiliations:
- Xidian University, State Key Laboratory of Integrated Service Networks, Xidian, China
  According to our database1,
  Yuan Chen
  authored at least 16 papers
  between 2012 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2023
    IEEE Trans. Dependable Secur. Comput., 2023
    
  
  2020
  2019
    J. Univers. Comput. Sci., 2019
    
  
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
    
  
    Int. J. Found. Comput. Sci., 2019
    
  
  2018
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
    
  
    J. Comput. Sci. Technol., 2018
    
  
    Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
    
  
  2017
    Proceedings of the Provable Security, 2017
    
  
  2015
    Secur. Commun. Networks, 2015
    
  
Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.
    
  
    Secur. Commun. Networks, 2015
    
  
Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud.
    
  
    Int. J. Distributed Sens. Networks, 2015
    
  
  2014
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions.
    
  
    Secur. Commun. Networks, 2014
    
  
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
    
  
    Int. J. Grid Util. Comput., 2014
    
  
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
    
  
    Frontiers Comput. Sci., 2014
    
  
  2012
    Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
    
  
    Proceedings of the Information Security and Cryptology - 8th International Conference, 2012