Urmăriți
Shaoquan Jiang
Titlu
Citat de
Citat de
Anul
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
1262004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
782012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
292008
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
262012
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
252014
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
232000
Optimal Secure Message Transmission by Public Discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE Transactions on Information Theory 57 (1), 572-585, 2011
212011
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
192005
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
192004
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
152015
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
142018
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference (COCOON), 479-491, 2011
142011
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
142003
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
132018
Deniable authentication on the internet
S Jiang
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
132008
Improved algorithm of Louvain communities dipartition
ZF Wu, PF Wang, ZG Qin, SQ Jiang
Journal of University of Electronic Science and Technology of China 42 (1 …, 2013
122013
Message authentication code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
112015
On interleaved sequences over finite fields
S Jiang, Z Dai, G Gong
Discrete mathematics 252 (1-3), 161-178, 2002
112002
Group key agreement with local connectivity
S Jiang
IEEE Transactions on Dependable and Secure Computing 13 (3), 326-339, 2015
92015
Timed encryption with application to deniable key exchange
S Jiang
Theoretical Computer Science 560, 172-189, 2014
92014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20