dblp.uni-trier.dewww.uni-trier.de

Kefei Chen Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
87EEZheng Huang, Weidong Qiu, Qiang Li, Kefei Chen: Efficient Secure Multiparty Computation Protocol in Asynchronous Network. ISA 2009: 152-158
86EEXuan Hong, Kefei Chen: Secure multiple-times proxy signature scheme. Computer Standards & Interfaces 31(1): 19-23 (2009)
85EEMi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Wei-Dong Qiu: A key management protocol with robust continuity for sensor networks. Computer Standards & Interfaces 31(4): 642-647 (2009)
84EEMi Wen, Ling Dong, Yanfei Zheng, Kefei Chen: Towards Provable Security for Data Transmission Protocols in Sensor Network. J. Inf. Sci. Eng. 25(1): 319-333 (2009)
83EEWei Han, Kefei Chen, Dong Zheng: Receipt-Freeness for Groth e-Voting Schemes. J. Inf. Sci. Eng. 25(2): 517-530 (2009)
2008
82 Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Springer 2008
81EERobert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17
80EEJian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220
79EEWei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen: A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344
78EELizhen Yang, Ling Dong, Kefei Chen: New Upper Bounds on Sizes of Permutation Arrays CoRR abs/0801.3983: (2008)
77EELizhen Yang, Kefei Chen, Luo Yuan: New Lower Bounds on Sizes of Permutation Arrays CoRR abs/0801.3986: (2008)
76EELizhen Yang, Kefei Chen, Luo Yuan: New Constructions of Permutation Arrays CoRR abs/0801.3987: (2008)
75EEXiahong Lin, Lin Gao, Kefei Chen, David K. Y. Chiu: MOHCS: Towards Mining Overlapping Highly Connected Subgraphs CoRR abs/0806.3215: (2008)
74EEZheng Gong, Xuejia Lai, Kefei Chen: A synthetic indifferentiability analysis of some block-cipher-based hash functions. Des. Codes Cryptography 48(3): 293-305 (2008)
73EEYongguo Liu, Zhang Yi, Hong Wu, Mao Ye, Kefei Chen: A tabu search approach for the minimum sum-of-squares clustering problem. Inf. Sci. 178(12): 2680-2704 (2008)
72EEJian Weng, Xiangxue Li, Kefei Chen, Shengli Liu: Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008)
71EEZheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen: A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. J. Inf. Sci. Eng. 24(5): 1347-1360 (2008)
2007
70EEXiangxue Li, Dong Zheng, Kefei Chen: Efficient Blind Signatures from Linear Feedback Shift Register. CDVE 2007: 423-425
69EEDong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li: Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727
68EEShiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345
67EEXiangxue Li, Dong Zheng, Kefei Chen: Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ICA3PP 2007: 95-106
66EEShengli Liu, Kefei Chen, Weidong Qiu: Identity-Based Threshold Decryption Revisited. ISPEC 2007: 329-343
65EEMi Wen, Ling Dong, Yanfei Zheng, Kefei Chen: A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. PAISI 2007: 288-294
64EEHui Li, Yanfei Zheng, Mi Wen, Kefei Chen: A Secure Time Synchronization Protocol for Sensor Network. PAKDD Workshops 2007: 515-526
63EEMi Wen, Yanfei Zheng, Hui Li, Kefei Chen: A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. PAKDD Workshops 2007: 608-620
62EEZheng Gong, Yu Long, Kefei Chen: Efficient Partially Blind Signature from LFSR. SNPD (2) 2007: 717-722
61EEZheng Gong, Yu Long, Xuan Hong, Kefei Chen: Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD (3) 2007: 188-193
60EELing Dong, Kefei Chen, Mi Wen, Yanfei Zheng: Protocol Engineering Principles for Cryptographic Protocols Design. SNPD (3) 2007: 641-646
59EEYu Long, Kefei Chen, Shengli Liu: ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Computers & Electrical Engineering 33(3): 166-176 (2007)
58EEYu Long, Kefei Chen: Certificateless threshold cryptosystem secure against chosen-ciphertext attack. Inf. Sci. 177(24): 5620-5637 (2007)
57EEZhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang: Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. Informatica, Lith. Acad. Sci. 18(3): 375-394 (2007)
56EEJian Weng, Shengli Liu, Kefei Chen: Pirate decoder for the broadcast encryption schemes from Crypto 2005. Science in China Series F: Information Sciences 50(3): 318-323 (2007)
2006
55 Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006
54 Xuejia Lai, Kefei Chen: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings Springer 2006
53 David Pointcheval, Yi Mu, Kefei Chen: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings Springer 2006
52EEJian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480
51EEZheng Gong, Xiangxue Li, Kefei Chen: Efficient Partially Blind Signature Scheme with Provable Security. COCOON 2006: 378-386
50EEShiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209
49EEHui Li, Kefei Chen, Yanfei Zheng, Mi Wen: A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. ICSNC 2006: 29
48EEJian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423
47EEJie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372
46EEFeiyu Lei, Wen Chen, Kefei Chen: A Non-committing Encryption Scheme Based on Quadratic Residue. ISCIS 2006: 972-980
45EELing Dong, Kefei Chen: A Practical Clumped-Tree Multicast Encryption Scheme. ISPEC 2006: 165-176
44EEJian Weng, Shengli Liu, Kefei Chen, Xiangxue Li: Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26
43EEYongguo Liu, Jun Peng, Kefei Chen, Yi Zhang: An Improved Hybrid Genetic Clustering Algorithm. SETN 2006: 192-202
42EEChangshe Ma, Shiqun Li, Kefei Chen, Shengli Liu: Analysis and improvement of fair certified e-mail delivery protocol. Computer Standards & Interfaces 28(4): 467-474 (2006)
41EELibin Wang, Kefei Chen: Comments on an access control model in semantic grid. Future Generation Comp. Syst. 22(1-2): 3-5 (2006)
40EELibin Wang, Kefei Chen: Comments on a theorem on grid access control. Future Generation Comp. Syst. 22(4): 381-384 (2006)
39EEZhenjie Huang, Kefei Chen, Yumin Wang: Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. Informatica, Lith. Acad. Sci. 17(3): 347-362 (2006)
38EEYu Long, Kefei Chen, Shengli Liu: Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. Informatica, Lith. Acad. Sci. 17(4): 519-534 (2006)
2005
37EEYongguo Liu, Yan Liu, Kefei Chen: Clustering with Noising Method. ADMA 2005: 209-216
36EEZhenjie Huang, Kefei Chen, Yumin Wang: Efficient Identity-Based Signatures and Blind Signatures. CANS 2005: 120-133
35EEYongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen: A Novel Clustering Technique Based on Improved Noising Method. CIARP 2005: 81-92
34EEYongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen: A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. Discovery Science 2005: 380-382
33EEYongguo Liu, Libin Wang, Kefei Chen: A Tabu Search Based Method for Minimum Sum of Squares Clustering. ICAPR (1) 2005: 248-256
32EEShiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu: Identity Based Conference Key Distribution Scheme from Parings. ICCNMC 2005: 845-852
31 Xiaoyun Wang, Kefei Chen: An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196
30EEWei Wei, Xuhua Ding, Kefei Chen: Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. ICICS 2005: 269-279
29EELongjun Zhang, Han Wei, Dong Zheng, Kefei Chen: A Security Solution of WLAN Based on Public Key Cryptosystem. ICPADS (2) 2005: 422-427
28EEChangshe Ma, Kefei Chen, Dong Zheng, Shengli Liu: Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243
27EEShiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563
26EEYongguo Liu, Yan Liu, Libin Wang, Kefei Chen: A Hybrid Tabu Search Based Clustering Algorithm. KES (2) 2005: 186-192
25EERuishan Zhang, Kefei Chen: An Efficient Asynchronous Proactive RSA Scheme. PDCAT 2005: 376-380
24 Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng: Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56
23EEWeidong Qiu, Kefei Chen: Identity oriented signature scheme based on quadratic residues. Applied Mathematics and Computation 168(1): 235-242 (2005)
22EEXiangxue Li, Kefei Chen: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation 169(1): 437-450 (2005)
21EEYu Long, Zhenfu Cao, Kefei Chen: A dynamic threshold commercial key escrow scheme based on conic. Applied Mathematics and Computation 171(2): 972-982 (2005)
20EEGuilin Wang, Feng Bao, Changshe Ma, Kefei Chen: Efficient Authenticated Encryption Schemes with Public Verifiability CoRR abs/cs/0504019: (2005)
19EERuishan Zhang, Kefei Chen: Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security 24(1): 76-82 (2005)
18EELuo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen: Some new characters on the wire-tap channel of type II. IEEE Transactions on Information Theory 51(3): 1222-1229 (2005)
2004
17EEDong Zheng, Huang Zheng, Kefei Chen, Weidong Kou: ID-Based Proxy Blind Signature. AINA (2) 2004: 380-383
16EEXiaoyun Wang, Lizhen Yang, Kefei Chen: SDD: Secure Distributed Diffusion Protocol for Sensor Networks. ESAS 2004: 205-214
15EEXiangxue Li, Kefei Chen: Identity Based Proxy-Signcryption Scheme from Pairings. IEEE SCC 2004: 494-497
14EEXiangxue Li, Kefei Chen, Longjun Zhang, Shiqun Li: Proxy Structured Multisignature Scheme from Bilinear Pairings. ISPA 2004: 705-714
13EEQing Yang, Kefei Chen: Digital Image Authentication Based on Turbo Codes. MIPS 2004: 276-286
12EEXiangxue Li, Kefei Chen, Shiqun Li: Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. PDCAT 2004: 591-595
11EEShengli Liu, Fangguo Zhang, Kefei Chen: Authenticating Tripartite Key Agreement Protocol with Pairings. J. Comput. Sci. Technol. 19(2): 169-176 (2004)
10EEYongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang: A genetic clustering method for intrusion detection. Pattern Recognition 37(5): 927-942 (2004)
2003
9EELibin Wang, Kefei Chen: A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ACISP 2003: 154-165
8EEXianfeng Zhao, Weinong Wang, Kefei Chen: On the Noninvertibility of Adaptive Digital Watermarking. DEXA Workshops 2003: 347-351
7EEXianfeng Zhao, Weinong Wang, Kefei Chen: Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. WAIM 2003: 483-494
6EEKefei Chen, Sheng Zhong: Attacks on the (enhanced) Yang-Shieh authentication. Computers & Security 22(8): 725-727 (2003)
2002
5EEZheng Huang, Kefei Chen: Electronic Payment in Mobile Environment. DEXA Workshops 2002: 413-417
4EEWeidong Qiu, Kefei Chen, Dawu Gu: A New Offline Privacy Protecting E-cash System with Revokable Anonymity. ISC 2002: 177-190
3EEXianfeng Zhao, Weinong Wang, Kefei Chen: Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. WAIM 2002: 430-440
2EEDong Zheng, Kefei Chen, Jinyuan You: Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. J. Comput. Sci. Technol. 17(6): 749-756 (2002)
1995
1 Kefei Chen: A New Identification Algorithm. Cryptography: Policy and Algorithms 1995: 244-249

Coauthor Index

1Joonsang Baek [82]
2Shane Balfe [50]
3Feng Bao [20] [82]
4Zhenfu Cao [21]
5Wen Chen [46]
6Xiaofeng Chen [79]
7David K. Y. Chiu [75]
8Robert H. Deng (Robert Huijie Deng) [47] [55] [81]
9Xuhua Ding [30]
10Ling Dong [45] [60] [65] [78] [84]
11Lin Gao [75]
12Zheng Gong [51] [61] [62] [71] [74]
13Dawu Gu [4]
14Jie Guo [47]
15Wei Han [79] [83]
16Tao Hao [79]
17Xuan Hong [61] [86]
18Rufen Huang [57]
19Zheng Huang [5] [87]
20Zhenjie Huang [36] [39] [57]
21Weidong Kou [17]
22Xuejia Lai [54] [55] [74] [82]
23Feiyu Lei [46]
24Hui Li [49] [63] [64]
25Jianhua Li [69]
26Qiang Li [87]
27Shiqun Li [12] [14] [27] [32] [34] [42] [50] [68]
28Xiangxue Li [12] [14] [15] [22] [27] [32] [44] [51] [67] [69] [70] [71] [72]
29Yingjiu Li [47]
30Xiaofeng Liao [10]
31Xiahong Lin [75]
32Xuanzhi Lin [57]
33Shengli Liu [11] [24] [28] [38] [42] [44] [48] [52] [56] [59] [66] [72] [80] [81]
34Yan Liu (Yan (Jenny) Liu) [26] [37]
35Yongguo Liu [10] [26] [33] [34] [35] [37] [43] [73]
36Yu Long [21] [38] [58] [59] [61] [62]
37Rongxing Lu [32]
38Changshe Ma [20] [24] [28] [42] [48] [52]
39Chaichana Mitrpant [18]
40Yi Mu [53]
41Jun Peng [43]
42David Pointcheval [53]
43Wei-Dong Qiu [85]
44Weidong Qiu [4] [23] [66] [80] [87]
45A. J. Han Vinck [18]
46Guilin Wang [20] [68]
47Libin Wang [9] [26] [33] [34] [40] [41]
48Weinong Wang [3] [7] [8]
49Xiaoyun Wang [16] [31]
50Yumin Wang [36] [39]
51Han Wei [29]
52Wei Wei [30]
53Mi Wen [49] [60] [63] [64] [65] [84] [85]
54Jian Weng [44] [48] [52] [56] [72] [80] [81]
55Hong Wu [73]
56Lizhen Yang [16] [76] [77] [78]
57Qing Yang [13]
58Mao Ye [73]
59Wen-jun Ye [85]
60Zhang Yi [73]
61Jinyuan You [2]
62Luo Yuan [18] [76] [77]
63Fangguo Zhang [11]
64Longjun Zhang [14] [29]
65Ruishan Zhang [19] [25]
66Wei Zhang [10] [35]
67Yi Zhang [43]
68Xianfeng Zhao [3] [7] [8]
69Dong Zheng [2] [17] [24] [28] [29] [34] [35] [67] [69] [70] [71] [79] [80] [83]
70Huang Zheng [17]
71Yanfei Zheng [49] [60] [63] [64] [65] [84] [85]
72Sheng Zhong [6]
73Jianying Zhou [27] [50] [55] [68]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)