Zhe Xia

Orcid: 0000-0003-4397-1248

According to our database1, Zhe Xia authored at least 92 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024

An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme.
IEEE Internet Things J., April, 2024

An efficient and secure certificateless aggregate signature scheme.
J. Syst. Archit., February, 2024

PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones.
Comput. Networks, January, 2024

2023
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023

Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities.
Inf. Sci., November, 2023

Leakage-resilient identity-based cryptography from minimal assumptions.
Des. Codes Cryptogr., November, 2023

Multiple Blind Signature for e-Voting and e-Cash.
Comput. J., October, 2023

Simple and efficient threshold changeable secret sharing.
J. Inf. Secur. Appl., September, 2023

An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs.
IEEE Internet Things J., June, 2023

Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT.
Wirel. Pers. Commun., April, 2023

A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things.
Inf. Sci., April, 2023

Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud.
Inf. Sci., April, 2023

An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023

An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023

Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'.
IET Inf. Secur., March, 2023

Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks.
Comput. J., January, 2023

A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023

Public-key encryption scheme with optimal continuous leakage resilience.
Inf. Process. Lett., 2023

An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023

A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023

OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles.
Veh. Commun., 2022

Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022

Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments.
J. Cloud Comput., 2022

A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
J. Inf. Secur. Appl., 2022

A novel threshold changeable secret sharing scheme.
Frontiers Comput. Sci., 2022

CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Lightweight and flexible key distribution schemes for secure group communications.
Wirel. Networks, 2021

PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations.
IEEE Syst. J., 2021

Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks.
Peer-to-Peer Netw. Appl., 2021

Design of ideal secret sharing based on new results on representable quadripartite matroids.
J. Inf. Secur. Appl., 2021

Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks.
IET Commun., 2021

Two Efficient Regulatory Confi dential Transaction Schemes.
IACR Cryptol. ePrint Arch., 2021

Novel generic construction of leakage-resilient PKE scheme with CCA security.
Des. Codes Cryptogr., 2021

Novel Public-Key Encryption with Continuous Leakage Amplification.
Comput. J., 2021

Face Template Protection through Residual Learning Based Error-Correcting Codes.
Proceedings of the ICCCV 2021: 4th International Conference on Control and Computer Vision, Macau, SAR, China, August 13, 2021

A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.
Theor. Comput. Sci., 2020

Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.
Secur. Commun. Networks, 2020

An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020

Secret sharing with secure secret reconstruction.
Inf. Sci., 2020

A generic construction of CCA-secure deterministic encryption.
Inf. Process. Lett., 2020

CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution.
Int. J. Found. Comput. Sci., 2020

Lightweight group key distribution schemes based on pre-shared pairwise keys.
IET Commun., 2020

Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
Comput. J., 2020

Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks.
IEEE Access, 2020

Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN.
IEEE Access, 2020

Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features.
Proceedings of the ICMLT 2020: 5th International Conference on Machine Learning Technologies, 2020

Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019

An alternative approach to public cloud data auditing supporting data dynamics.
Soft Comput., 2019

Anonymous and Updatable Identity-Based Hash Proof System.
IEEE Syst. J., 2019

A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019

Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019

Privacy-preserving raw data collection without a trusted authority for IoT.
Comput. Networks, 2019

Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

Cryptanalysis of Raindrop and FBC.
Proceedings of the Network and System Security - 13th International Conference, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing.
Secur. Commun. Networks, 2018

Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Framework for practical and receipt-free remote voting.
IET Inf. Secur., 2018

Continuous leakage-resilient access control for wireless sensor networks.
Ad Hoc Networks, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks.
Proceedings of the Information Security Practice and Experience, 2018

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
How to Share Secret Efficiently over Networks.
Secur. Commun. Networks, 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Secur. Appl., 2017

A secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2017

Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
A Privacy-Preserving Health Data Aggregation Scheme.
KSII Trans. Internet Inf. Syst., 2016

Editorial: Special issue on security and dependability of internet of things.
J. Inf. Secur. Appl., 2016

Secure Index for Resource-Constraint Mobile Devices in Cloud Computing.
IEEE Access, 2016

Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Solving the Discrete Logarithm Problem for Packing Candidate Preferences.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Prêt á Voter with Write-Ins.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Authentication Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Focus group views on Prêt à Voter 1.0.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

2010
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Prêt à voter: a voter-verifiable voting system.
IEEE Trans. Inf. Forensics Secur., 2009

Experiences Gained from the first Prêt à Voter Implementation.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

2008
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2007
Threat Analysis of a Practical Voting Scheme with Receipts.
Proceedings of the E-Voting and Identity, First International Conference, 2007


  Loading...