Shaoquan Jiang
Citat de
Citat de
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
Optimal Secure Message Transmission by Public Discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE Transactions on Information Theory 57 (1), 572-585, 2011
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference (COCOON), 479-491, 2011
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
Deniable authentication on the internet
S Jiang
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
Improved algorithm of Louvain communities dipartition
ZF Wu, PF Wang, ZG Qin, SQ Jiang
Journal of University of Electronic Science and Technology of China 42 (1 …, 2013
Message authentication code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
On interleaved sequences over finite fields
S Jiang, Z Dai, G Gong
Discrete mathematics 252 (1-3), 161-178, 2002
Group key agreement with local connectivity
S Jiang
IEEE Transactions on Dependable and Secure Computing 13 (3), 326-339, 2015
Timed encryption with application to deniable key exchange
S Jiang
Theoretical Computer Science 560, 172-189, 2014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20