关注
Shaoquan Jiang
标题
引用次数
引用次数
年份
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
1262004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
902012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
302008
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
262014
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
262012
Optimal Secure Message Transmission by Public Discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE Transactions on Information Theory 57 (1), 572-585, 2011
212011
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
202000
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
192005
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
172004
Improved algorithm of Louvain communities dipartition
ZF Wu, PF Wang, ZG Qin, SQ Jiang
Journal of University of Electronic Science and Technology of China 42 (1 …, 2013
162013
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
152015
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
142018
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference (COCOON), 479-491, 2011
142011
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
142003
Deniable authentication on the internet
S Jiang
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
132008
Message Authentication Code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
122015
On interleaved sequences over finite fields
S Jiang, Z Dai, G Gong
Discrete mathematics 252 (1-3), 161-178, 2002
122002
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
112018
Corruption-localizing hashing
GD Crescenzo, S Jiang, R Safavi-Naini
European Symposium on Research in Computer Security (ESORICS), 489-504, 2009
11*2009
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
S Jiang, G Gong, J He, K Nguyen, H Wang
IACR international conference on public-key cryptography, 396-427, 2020
102020
系统目前无法执行此操作,请稍后再试。
文章 1–20