Xiaofeng Chen
Xiaofeng Chen
Professor, Xidian University, China
Verified email at xidian.edu.cn - Homepage
TitleCited byYear
Secure deduplication with efficient and reliable convergent key management
J Li, X Chen, M Li, J Li, PPC Lee, W Lou
IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013
5432013
A hybrid cloud approach for secure authorized deduplication
J Li, YK Li, X Chen, PPC Lee, W Lou
IEEE Transactions on Parallel and Distributed Systems 26 (5), 1206-1216, 2014
3772014
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
3602013
New algorithms for secure outsourcing of modular exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013
3552013
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
IEEE Transactions on computers 64 (2), 425-437, 2013
3112013
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
2302018
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
2252015
A New ID-based Group Signature Scheme from Bilinear Pairings.
X Chen, F Zhang, K Kim
IACR Cryptology ePrint Archive 2003, 116, 2003
1792003
Certificateless remote anonymous authentication schemes for wirelessbody area networks
J Liu, Z Zhang, X Chen, KS Kwak
IEEE Transactions on parallel and distributed systems 25 (2), 332-342, 2013
1722013
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
1602017
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
1592014
Fine-grained access control system based on outsourced attribute-based encryption
J Li, X Chen, J Li, C Jia, J Ma, W Lou
European Symposium on Research in Computer Security, 592-609, 2013
1562013
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
1442014
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
1432017
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1432011
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1312015
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1122015
Outsourcing encryption of attribute-based encryption with mapreduce
J Li, C Jia, J Li, X Chen
International Conference on Information and Communications Security, 191-201, 2012
992012
Public integrity auditing for shared dynamic cloud data with group user revocation
T Jiang, X Chen, J Ma
IEEE Transactions on Computers 65 (8), 2363-2373, 2015
982015
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
952017
The system can't perform the operation now. Try again later.
Articles 1–20