default search action
Hu Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j144]Erqiang Deng, Li You, Fazlullah Khan, Guosong Zhu, Zhen Qin, Saru Kumari, Hu Xiong, Ryan Alturki:
Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models. Appl. Soft Comput. 165: 111964 (2024) - [j143]Rashad Elhabob, Mazin Taha, Hu Xiong, Muhammad Khurram Khan, Saru Kumari, Pradeep Chaudhary:
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles. Comput. Electr. Eng. 116: 109140 (2024) - [j142]Abdalla Hadabi, Zheng Qu, Rashad Elhabob, Sachin Kumar, Kuo-Hui Yeh, Saru Kumari, Hu Xiong:
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT. Comput. Electr. Eng. 116: 109164 (2024) - [j141]Abdalla Hadabi, Zheng Qu, Mohammed Amoon, Chien-Ming Chen, Saru Kumari, Hu Xiong:
Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption. Comput. Electr. Eng. 118: 109373 (2024) - [j140]Abdalla Hadabi, Zheng Qu, Rashad Elhabob, Sachin Kumar, Saru Kumari, Hu Xiong:
Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT. Trans. Emerg. Telecommun. Technol. 35(6) (2024) - [j139]Guosong Zhu, Erqiang Deng, Zhen Qin, Fazlullah Khan, Wei Wei, Gautam Srivastava, Hu Xiong, Saru Kumari:
Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening. Inf. Fusion 111: 102510 (2024) - [j138]Yingzhe Hou, Yue Cao, Hu Xiong, Yulin Hu, Mahmoud Hashem Eiza:
Heterogeneous Signcryption Scheme With Group Equality Test for Satellite-Enabled IoVs. IEEE Internet Things J. 11(6): 10666-10681 (2024) - [j137]Jingxue Chen, Zengxiang Wang, Gautam Srivastava, Turki Ali Alghamdi, Fazlullah Khan, Saru Kumari, Hu Xiong:
Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training. J. Ind. Inf. Integr. 39: 100593 (2024) - [j136]Ruoxia Li, Zengxiang Wang, Liming Fang, Changgen Peng, Weizheng Wang, Hu Xiong:
Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse. IEEE Trans. Consumer Electron. 70(1): 3770-3780 (2024) - [j135]Qian Mei, Hu Xiong, Yeh-Cheng Chen, Chien-Ming Chen:
Blockchain-Enabled Privacy-Preserving Authentication Mechanism for Transportation CPS With Cloud-Edge Computing. IEEE Trans. Engineering Management 71: 12463-12474 (2024) - [j134]Zheng Qu, Saru Kumari, Mohammad S. Obaidat, Bander A. Alzahrani, Hu Xiong:
Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System. IEEE J. Biomed. Health Informatics 28(9): 5033-5042 (2024) - 2023
- [j133]Saru Kumari, Hu Xiong, Lyes Khoukhi, Joel J. P. C. Rodrigues:
Safety and security of autonomous vehicles. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j132]Jun Feng, Hu Xiong, Jinhao Chen, Yang Xiang, Kuo-Hui Yeh:
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6, March 15): 4815-4829 (2023) - [j131]Hu Xiong, Zheng Qu, Xin Huang, Kuo-Hui Yeh:
Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things. IEEE J. Sel. Areas Commun. 41(10): 3306-3317 (2023) - [j130]Kwabena Owusu-Agyemang, Zhen Qin, Hu Xiong, Yao Liu, Tianming Zhuang, Zhiguang Qin:
MSDP: multi-scheme privacy-preserving deep learning via differential privacy. Pers. Ubiquitous Comput. 27(2): 221-233 (2023) - [j129]Jianfei Sun, Guowen Xu, Tianwei Zhang, Hu Xiong, Hongwei Li, Robert H. Deng:
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing. IEEE Trans. Cloud Comput. 11(1): 822-838 (2023) - [j128]Xin Huang, Hu Xiong, Jinhao Chen, Minghao Yang:
Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things. IEEE Trans. Cloud Comput. 11(2): 1273-1285 (2023) - [j127]Qian Mei, Minghao Yang, Jinhao Chen, Lili Wang, Hu Xiong:
Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT. IEEE Trans. Dependable Secur. Comput. 20(3): 2625-2640 (2023) - [j126]Lili Wang, Ye Lin, Ting Yao, Hu Xiong, Kaitai Liang:
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 20(6): 5130-5142 (2023) - [j125]Hu Xiong, Hanxiao Wang, Weizhi Meng, Kuo-Hui Yeh:
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System. IEEE Trans. Ind. Informatics 19(11): 10977-10986 (2023) - [j124]Yingzhe Hou, Yue Cao, Hu Xiong, Yujie Song, Lexi Xu:
An Efficient Online/Offline Heterogeneous Signcryption Scheme With Equality Test for IoVs. IEEE Trans. Veh. Technol. 72(9): 12047-12062 (2023) - [c22]Yang Zhao, Xingyu Ke, Yuwei Pang, Hu Xiong, Guobin Zhu, Kuo-Hui Yeh:
Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls. BDTA 2023: 79-94 - 2022
- [j123]Hu Xiong, Saru Kumari, Yue Cao:
Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov). Comput. Electr. Eng. 102: 108246 (2022) - [j122]Wenchao Li, Chuanjie Jin, Saru Kumari, Hu Xiong, Sachin Kumar:
Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - [j121]Hu Xiong, Tianang Yao, Hanxiao Wang, Jun Feng, Shui Yu:
A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT. IEEE Internet Things J. 9(1): 401-418 (2022) - [j120]Hu Xiong, Xin Huang, Minghao Yang, Lili Wang, Shui Yu:
Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(4): 3097-3111 (2022) - [j119]Haleh Amintoosi, Mahdi Nikooghadam, Saru Kumari, Feng Jun, Hu Xiong, Sachin Kumar, Joel J. P. C. Rodrigues:
Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems. IEEE Internet Things J. 9(7): 5368-5379 (2022) - [j118]Hu Xiong, Lili Wang, Zhida Zhou, Zetong Zhao, Xin Huang, Saru Kumari:
Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message. IEEE Internet Things J. 9(13): 11248-11260 (2022) - [j117]Prince Silas Kwesi Oberko, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong:
A survey on multi-authority and decentralized attribute-based encryption. J. Ambient Intell. Humaniz. Comput. 13(1): 515-533 (2022) - [j116]Wei Zhang, Zhishuo Zhang, Hu Xiong, Zhiguang Qin:
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. J. Ambient Intell. Humaniz. Comput. 13(1): 613-627 (2022) - [j115]Prince Silas Kwesi Oberko, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong, Saru Kumari:
A survey on Attribute-Based Signatures. J. Syst. Archit. 124: 102396 (2022) - [j114]Negalign Wake Hundera, Chuanjie Jin, Dagmawit Mesfin Geressu, Muhammad Umar Aftab, Oluwasanmi Ariyo Olanrewaju, Hu Xiong:
Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city. Multim. Tools Appl. 81(21): 29673-29697 (2022) - [j113]Hu Xiong, Yingzhe Hou, Xin Huang, Yanan Zhao, Chien-Ming Chen:
Heterogeneous Signcryption Scheme From IBC to PKI With Equality Test for WBANs. IEEE Syst. J. 16(2): 2391-2400 (2022) - [j112]Hu Xiong, Zhida Zhou, Lili Wang, Zetong Zhao, Xin Huang, Hao Zhang:
An Anonymous Authentication Protocol With Delegation and Revocation for Content Delivery Networks. IEEE Syst. J. 16(3): 4118-4129 (2022) - [j111]Hu Xiong, Minghao Yang, Ting Yao, Jinhao Chen, Saru Kumari:
Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs. IEEE Syst. J. 16(4): 5424-5432 (2022) - [j110]Hu Xiong, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. IEEE Trans. Big Data 8(1): 1-13 (2022) - [j109]Hu Xiong, Jinhao Chen, Qian Mei, Yanan Zhao:
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs. IEEE Trans. Dependable Secur. Comput. 19(3): 2089-2104 (2022) - [j108]Hu Xiong, Chuanjie Jin, Mamoun Alazab, Kuo-Hui Yeh, Hanxiao Wang, Thippa Reddy Gadekallu, Weizheng Wang, Chunhua Su:
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT. IEEE J. Biomed. Health Informatics 26(5): 1977-1986 (2022) - [j107]Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - [c21]Guofeng He, Qing Lu, Guangqiang Yin, Hu Xiong:
Network Intrusion Detection Based on Hybrid Neural Network. WASA (2) 2022: 644-655 - 2021
- [j106]Lyes Khoukhi, Hu Xiong, Saru Kumari, Nicolas Puech:
The Internet of vehicles and smart cities. Ann. des Télécommunications 76(9-10): 545-546 (2021) - [j105]Izwa Altaf, Muhammad Arslan Akram, Khalid Mahmood, Saru Kumari, Hu Xiong, Muhammad Khurram Khan:
A novel authentication and key-agreement scheme for satellite communication network. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j104]Yingzhe Hou, Xin Huang, Yanan Chen, Sachin Kumar Gupta, Hu Xiong:
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j103]Yingzhe Hou, Hu Xiong, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things. IEEE Internet Things J. 8(11): 8935-8948 (2021) - [j102]Hu Xiong, Yanan Zhao, Yingzhe Hou, Xin Huang, Chuanjie Jin, Lili Wang, Saru Kumari:
Heterogeneous Signcryption With Equality Test for IIoT Environment. IEEE Internet Things J. 8(21): 16142-16152 (2021) - [j101]Wei Zhang, Yi Wu, Hu Xiong, Zhiguang Qin:
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. KSII Trans. Internet Inf. Syst. 15(1): 302-322 (2021) - [j100]Wenchao Li, Hu Xiong:
Efficient Proxy Re-encryption Scheme for E-Voting System. KSII Trans. Internet Inf. Syst. 15(5): 1847-1870 (2021) - [j99]Yi Wu, Wei Zhang, Hu Xiong, Zhiguang Qin, Kuo-Hui Yeh:
Efficient access control with traceability and user revocation in IoT. Multim. Tools Appl. 80(20): 31487-31508 (2021) - [j98]Qian Mei, Hu Xiong, Jinhao Chen, Minghao Yang, Saru Kumari, Muhammad Khurram Khan:
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV. IEEE Syst. J. 15(1): 245-256 (2021) - [j97]Hu Xiong, Zhiqing Kang, Jinhao Chen, Junyi Tao, Chen Yuan, Saru Kumari:
A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity. IEEE Syst. J. 15(2): 2156-2167 (2021) - [j96]Zhiguang Qin, Yan Wu, Hu Xiong:
Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data". IEEE Trans. Cloud Comput. 9(4): 1675-1677 (2021) - [j95]Jianfei Sun, Hu Xiong, Xuyun Nie, Yinghui Zhang, Pengfei Wu:
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2518-2519 (2021) - [j94]Zhen Qin, Gu Huang, Hu Xiong, Zhiguang Qin, Kim-Kwang Raymond Choo:
A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics. IEEE Trans. Fuzzy Syst. 29(3): 549-559 (2021) - [j93]Lei Meng, Haitao Xu, Hu Xiong, Xuewang Zhang, Xianwei Zhou, Zhu Han:
An Efficient Certificateless Authenticated Key Exchange Protocol Resistant to Ephemeral Key Leakage Attack for V2V Communication in IoV. IEEE Trans. Veh. Technol. 70(11): 11736-11747 (2021) - [j92]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Mohammed Ramadan, Zhiguang Qin:
Equality test with an anonymous authorization in cloud computing. Wirel. Networks 27(2): 1063-1076 (2021) - [c20]Qian Mei, Hu Xiong, Yanan Zhao, Kuo-Hui Yeh:
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating. DSC 2021: 1-8 - [c19]Yang Zhao, Guohang Dan, Ankang Ruan, Jicheng Huang, Hu Xiong:
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks. DSC 2021: 1-7 - 2020
- [j91]Rashad Elhabob, Yanan Zhao, Nabeil Eltayieb, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 23(2): 1085-1101 (2020) - [j90]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j89]Muhammad Asad Saleem, Shafiq Ahmed, Khalid Mahmood, Saru Kumari, Hu Xiong:
An enhanced authentication protocol for client server environment. Frontiers Comput. Sci. 14(6): 146810 (2020) - [j88]Shufan Zhang, Lili Wang, Hu Xiong:
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability. Int. J. Inf. Sec. 19(3): 323-341 (2020) - [j87]Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong:
Identity Based Key-Insulated Encryption with Outsourced Equality Test. Int. J. Netw. Secur. 22(2): 257-264 (2020) - [j86]Muhammad Arslan Akram, Khalid Mahmood, Saru Kumari, Hu Xiong:
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0". IEEE Internet Things J. 7(5): 4676-4681 (2020) - [j85]Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng:
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet Things J. 7(7): 6566-6575 (2020) - [j84]Hu Xiong, Yan Wu, Chuanjie Jin, Saru Kumari:
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT. IEEE Internet Things J. 7(12): 11713-11724 (2020) - [j83]Jianfei Sun, Hu Xiong, Hao Zhang, Li Peng:
Mobile access and flexible search over encrypted cloud data in heterogeneous systems. Inf. Sci. 507: 1-15 (2020) - [j82]Hu Xiong, Yan Wu, Chunhua Su, Kuo-Hui Yeh:
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things. J. Inf. Secur. Appl. 53: 102507 (2020) - [j81]Negalign Wake Hundera, Qian Mei, Hu Xiong, Dagmawit Mesfin Geressu:
A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing. KSII Trans. Internet Inf. Syst. 14(1): 455-472 (2020) - [j80]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
An efficient certificateless public key cryptography with authorized equality test in IIoT. J. Ambient Intell. Humaniz. Comput. 11(3): 1065-1083 (2020) - [j79]R. Shashidhara, Sriramulu Bojjagani, Anup Kumar Maurya, Saru Kumari, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 13(6): 1943-1966 (2020) - [j78]Hu Xiong, Qian Mei, Yanan Zhao:
Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments. IEEE Syst. J. 14(1): 310-320 (2020) - [j77]Chanapha Butpheng, Kuo-Hui Yeh, Hu Xiong:
Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review. Symmetry 12(7): 1191 (2020) - [j76]Yan Wu, Hu Xiong, Chuanjie Jin:
A multi-use unidirectional certificateless proxy re-signature scheme. Telecommun. Syst. 73(3): 455-467 (2020) - [j75]Hu Xiong, Yangyang Bao, Xuyun Nie, Yakubu Issifu Asoor:
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(2): 1013-1023 (2020) - [j74]Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng:
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(11): 12938-12950 (2020) - [j73]Hu Xiong, Yingzhe Hou, Xin Huang, Yanan Zhao:
Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles. Veh. Commun. 26: 100264 (2020) - [j72]Rashad Elhabob, Yanan Zhao, Alzubair Hassan, Hu Xiong:
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT. Wirel. Pers. Commun. 113(1): 313-335 (2020) - [c18]Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. SPDE 2020: 369-383 - [i9]Wei Zhang, Yi Wu, Zhishuo Zhang, Hu Xiong, Zhiguang Qin:
Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability. CoRR abs/2009.04748 (2020) - [i8]Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. IACR Cryptol. ePrint Arch. 2020: 553 (2020) - [i7]Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 1027 (2020)
2010 – 2019
- 2019
- [j71]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles. IEEE Access 7: 68957-68969 (2019) - [j70]Yang Zhao, Mao Ren, Songquan Jiang, Guobin Zhu, Hu Xiong:
An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing 101(8): 1041-1065 (2019) - [j69]Hu Xiong, Yan Wu, Zhenyu Lu:
A Survey of Group Key Agreement Protocols with Constant Rounds. ACM Comput. Surv. 52(3): 57:1-57:32 (2019) - [j68]Hu Xiong, Yanan Zhao, Li Peng, Hao Zhang, Kuo-Hui Yeh:
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 97: 453-461 (2019) - [j67]Qian Mei, Yanan Zhao, Hu Xiong:
A New Provably Secure Certificateless Signature with Revocation in the Standard Model. Informatica 30(4): 711-728 (2019) - [j66]Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong:
Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(9): 4742-4770 (2019) - [j65]Hu Xiong, Hao Zhang, Jianfei Sun:
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing. IEEE Syst. J. 13(3): 2739-2750 (2019) - [j64]Hu Xiong, Yi Wang, Wenchao Li, Chien-Ming Chen:
Flexible, Efficient, and Secure Access Delegation in Cloud Computing. ACM Trans. Manag. Inf. Syst. 10(1): 2:1-2:20 (2019) - [c17]Jianfei Sun, Hu Xiong, Robert H. Deng, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. DSC 2019: 1-8 - [i6]Shufan Zhang, Hu Xiong:
Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels. CoRR abs/1905.05562 (2019) - 2018
- [j63]Qiang Wang, Li Peng, Hu Xiong, Jianfei Sun, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing. IEEE Access 6: 760-771 (2018) - [j62]Jianfei Sun, Yangyang Bao, Xuyun Nie, Hu Xiong:
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing. IEEE Access 6: 31621-31629 (2018) - [j61]Fuhu Deng, Yali Wang, Li Peng, Hu Xiong, Ji Geng, Zhiguang Qin:
Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records. IEEE Access 6: 39473-39486 (2018) - [j60]Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin:
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. Int. J. Netw. Secur. 20(1): 95-109 (2018) - [j59]Qiang Wang, Hao Zhang, Jianfei Sun, Hu Xiong, Zhiguang Qin:
Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud". Inf. Process. Lett. 140: 34-36 (2018) - [j58]Yanan Chen, Zhenyu Lu, Hu Xiong, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. Secur. Commun. Networks 2018: 1378583:1-1378583:14 (2018) - 2017
- [j57]Hu Xiong, Junyi Tao, Chen Yuan:
Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity. IEEE Access 5: 5648-5661 (2017) - [j56]Zhen Qin, Jianfei Sun, Abubaker Wahaballa, Wentao Zheng, Hu Xiong, Zhiguang Qin:
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stand. Interfaces 54: 55-60 (2017) - [j55]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Ahmed Abdalla Ali, Mohammed Ramadan, Zhiguang Qin:
Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. Int. J. Netw. Secur. 19(1): 27-38 (2017) - [j54]Yang Chen, Yang Zhao, Hu Xiong, Feng Yue:
A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability. Int. J. Netw. Secur. 19(4): 573-582 (2017) - [j53]Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong:
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. Int. J. Netw. Secur. 19(4): 623-630 (2017) - [j52]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet. Int. J. Netw. Secur. 19(6): 940-949 (2017) - [j51]Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong:
Revocable ABE with Bounded Ciphertext in Cloud Computing. Int. J. Netw. Secur. 19(6): 973-983 (2017) - [j50]Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong:
Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare. Int. J. Netw. Secur. 19(6): 1044-1052 (2017) - [j49]Hu Xiong, Qiang Wang, Jianfei Sun:
Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation". Inf. Process. Lett. 127: 67-70 (2017) - [j48]Zhen Qin, Jianfei Sun, Dajiang Chen, Hu Xiong:
Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things. Mob. Inf. Syst. 2017: 7514867:1-7514867:15 (2017) - [j47]Hu Xiong, Jianfei Sun:
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing". IEEE Trans. Dependable Secur. Comput. 14(4): 461-462 (2017) - 2016
- [j46]Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Philip Avornyo, Zhiguang Qin:
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. Int. J. Netw. Secur. 18(2): 235-243 (2016) - [j45]Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin:
An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment. Int. J. Netw. Secur. 18(3): 481-486 (2016) - [j44]Abubaker Wahaballa, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin:
Secure mobile agent-based English auction protocol using identity-based signature scheme. Int. J. Secur. Networks 11(4): 175-187 (2016) - [j43]Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong:
On the security of two identity-based signature schemes based on pairings. Inf. Process. Lett. 116(6): 416-418 (2016) - [j42]Hu Xiong, Junyi Tao, Yanan Chen:
A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems. J. Medical Syst. 40(11): 228:1-228:12 (2016) - [j41]Dong-fen Li, Rui-Jin Wang, Fengli Zhang, Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Huayi Zhan:
A noise immunity controlled quantum teleportation protocol. Quantum Inf. Process. 15(11): 4819-4837 (2016) - [j40]Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long:
Fuzzy certificateless signature. Secur. Commun. Networks 9(16): 3658-3669 (2016) - [c16]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. BigCom 2016: 387-395 - [c15]Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Zhiguang Qin:
Measuring Trust in Online Social Networks. ICADIWT 2016: 26-39 - [i5]Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. IACR Cryptol. ePrint Arch. 2016: 501 (2016) - 2015
- [j39]Yanan Chen, Weixiang Xu, Hu Xiong:
Strongly secure certificateless key-insulated signature secure in the standard model. Ann. des Télécommunications 70(9-10): 395-405 (2015) - [j38]Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li:
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 17(2): 129-134 (2015) - [j37]Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu:
Cryptanalysis of Attribute-based Ring Signcryption Scheme. Int. J. Netw. Secur. 17(2): 224-228 (2015) - [j36]Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin:
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme. Int. J. Netw. Secur. 17(6): 779-786 (2015) - [j35]Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene, Songyang Wu, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. KSII Trans. Internet Inf. Syst. 9(3): 1246-1259 (2015) - [j34]Hu Xiong, Zhiguang Qin:
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 10(7): 1442-1455 (2015) - [j33]Hu Xiong, Songyang Wu, Fagen Li, Zhiguang Qin:
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes. Wirel. Pers. Commun. 80(4): 1671-1685 (2015) - [j32]Edward Yellakuor Baagyere, Zhen Qin, Hu Xiong, Zhiguang Qin:
Characterization of Complex Networks for Epidemics Modeling. Wirel. Pers. Commun. 83(4): 2835-2858 (2015) - [c14]Zhiguang Qin, Shikun Wu, Hu Xiong:
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing. BigCom 2015: 205-216 - [c13]Xuyun Nie, Bo Liu, Hu Xiong, Gang Lu:
Cubic Unbalance Oil and Vinegar Signature Scheme. Inscrypt 2015: 47-56 - 2014
- [j31]Hu Xiong, Yanan Chen, Guobin Zhu, Zhiguang Qin:
Analysis and improvement of a provable secure fuzzy identity-based signature scheme. Sci. China Inf. Sci. 57(9): 1-5 (2014) - [j30]Juan Bi, Zhiguang Qin, Hu Xiong, Jia Huang:
Simultaneous community discovery and user interests extraction in social network based on probabilistic model. Int. J. Intell. Inf. Database Syst. 8(3): 260-279 (2014) - [j29]Zhiguang Qin, Hu Xiong, Fagen Li:
A Provably Secure Certificate Based Ring Signature Without Pairing. Int. J. Netw. Secur. 16(4): 278-285 (2014) - [j28]Shengke Zeng, Hu Xiong:
Privacy-enhanced Designated Confirmer Signature without Random Oracles. Int. J. Netw. Secur. 16(5): 331-339 (2014) - [j27]Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. Inf. Sci. 268: 447-457 (2014) - [j26]Hu Xiong:
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 9(12): 2327-2339 (2014) - [j25]Guobin Zhu, Hu Xiong, Zhiguang Qin:
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol. Wirel. Pers. Commun. 74(2): 883-889 (2014) - [j24]Guobin Zhu, Hu Xiong, Zhiguang Qin:
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model. Wirel. Pers. Commun. 79(2): 1401-1416 (2014) - [i4]Hu Xiong:
Toward Certificateless Signcryption Scheme Without Random Oracles. IACR Cryptol. ePrint Arch. 2014: 162 (2014) - 2013
- [j23]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j22]Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng:
An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. Int. J. Netw. Secur. 15(3): 161-170 (2013) - [j21]Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013) - [j20]Qinyi Li, Hu Xiong, Fengli Zhang:
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. Int. J. Secur. Networks 8(1): 1-12 (2013) - [j19]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j18]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - [j17]Hu Xiong, Fagen Li, Zhiguang Qin:
Certificateless threshold signature secure in the standard model. Inf. Sci. 237: 73-81 (2013) - [j16]Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2): 927-932 (2013) - 2012
- [j15]Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3): 573-581 (2012) - [j14]Hu Xiong, Zhong Chen, Fagen Li:
Bidder-anonymous English auction protocol based on revocable ring signature. Expert Syst. Appl. 39(8): 7062-7066 (2012) - [j13]Hu Xiong, Xiaofeng Wang, Fagen Li:
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 256-258 (2012) - [j12]Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin:
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 6(1): 20-27 (2012) - [j11]Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. Int. J. Netw. Secur. 14(5): 297-300 (2012) - [j10]Hu Xiong, Zhong Chen, Fagen Li:
Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3-4): 1213-1221 (2012) - [j9]Hu Xiong, Zhong Chen, Fagen Li:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. Secur. Commun. Networks 5(12): 1441-1451 (2012) - [c12]Fengli Zhang, Qinyi Li, Hu Xiong:
Efficient Revocable Key-Policy Attribute Based Encryption with Full Security. CIS 2012: 477-481 - 2011
- [j8]Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li:
On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2): 129-135 (2011) - [j7]Hu Xiong, Zhiguang Qin, Fagen Li:
Cryptanalysis of an Identity Based Signcryption without Random Oracles. Fundam. Informaticae 107(1): 105-109 (2011) - [j6]Hu Xiong, Zhong Chen, Zhiguang Qin:
Efficient three-party authenticated key agreement protocol in certificateless cryptography. Int. J. Comput. Math. 88(13): 2707-2716 (2011) - [j5]Hu Xiong, Zhiguang Qin, Fagen Li:
A Certificateless Proxy Ring Signature Scheme with Provable Security. Int. J. Netw. Secur. 12(2): 92-106 (2011) - [c11]Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 - [c10]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen:
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381 - [c9]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen:
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature. FSKD 2011: 2217-2221 - [c8]Hu Xiong, Qianhong Wu, Zhong Chen:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. INCoS 2011: 92-99 - [c7]Zhi Guan, Hu Xiong, Suke Li, Zhong Chen:
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 - [c6]Hu Xiong, Qianhong Wu, Zhong Chen:
Toward Pairing-Free Certificateless Authenticated Key Exchanges. ISC 2011: 79-94 - 2010
- [j4]Hu Xiong, Zhiguang Qin, Fagen Li:
Identity-based Threshold Signature Secure in the Standard Model. Int. J. Netw. Secur. 10(1): 75-80 (2010) - [j3]Hu Xiong, Fagen Li, Zhiguang Qin:
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography. Informatica 21(2): 277-294 (2010) - [c5]Yong Deng, Zhonghai Wu, Cong Tang, Huayou Si, Hu Xiong, Zhong Chen:
A Hybrid Movie Recommender Based on Ontology and Neural Networks. GreenCom/CPSCom 2010: 846-851 - [c4]Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication. ICC 2010: 1-6 - [i3]Hu Xiong, Jian-bin Hu, Tao Yang, Wei Xin, Zhong Chen:
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy. CoRR abs/1008.5015 (2010) - [i2]Hu Xiong, Zhong Chen:
Privacy-Preserving English Auction Protocol with Round Efficiency. CoRR abs/1010.5642 (2010)
2000 – 2009
- 2009
- [j2]Hu Xiong, Zhiguang Qin, Fagen Li:
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature. Int. J. Netw. Secur. 8(3): 235-242 (2009) - [c3]Jing Jin, Zhiguang Qin, Hu Xiong, Juan Wang, Zhigang Wu:
DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets. FCST 2009: 722-727 - [i1]Hu Xiong, Matei Ripeanu, Zhiguang Qin:
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications. CoRR abs/0909.1590 (2009) - 2008
- [j1]Hu Xiong, Zhiguang Qin, Fagen Li:
An Improved Certificateless Signature Scheme Secure in the Standard Model. Fundam. Informaticae 88(1-2): 193-206 (2008) - [c2]Hu Xiong, Zhiguang Qin, Fagen Li:
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles. CIS (2) 2008: 308-313 - 2007
- [c1]Zhang Xunxie, Wang Xin, Shao Lianjun, Sun Qiang, Hu Xiong, Xu Li, Giulio Ruffini, D. Stephen, François Soulat:
First results of GNSS-R coastal experiment in China. IGARSS 2007: 5088-5092
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint