Остановите войну!
for scientists:
default search action
Haifeng Qian
- > Home > Persons > Haifeng Qian
Publications
- 2021
- [j56]Shengfeng Xu, Xiangxue Li, Haifeng Qian, Kefei Chen:
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN. Theor. Comput. Sci. 885: 91-103 (2021) - [c78]Jianfeng Ma, Xiangxue Li, Haifeng Qian:
LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW. TrustCom 2021: 1039-1048 - 2020
- [c75]Chenlong Yang, Xiangxue Li, Jingjing Li, Haifeng Qian:
Linear Scalability from Sharding and PoS. ICA3PP (1) 2020: 548-562 - [c72]Qi Wang, Ming Xu, Xiangxue Li, Haifeng Qian:
Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2020: 305-312 - [c71]Yuan Linghu, Ming Xu, Xiangxue Li, Haifeng Qian:
Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network. MSN 2020: 479-487 - 2018
- [c61]Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
CCA Secure Multi-recipient KEM from LPN. ICICS 2018: 513-529 - [c60]Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. ICICS 2018: 756-766 - 2017
- [j40]Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c55]Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. WASA 2017: 210-219 - 2016
- [j38]Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian:
New application of partitioning methodology: identity-based dual receiver encryption. Secur. Commun. Networks 9(18): 5789-5802 (2016) - [c53]Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou:
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. ACISP (1) 2016: 293-309 - [c52]Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279 - 2015
- [j35]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. Secur. Commun. Networks 8(17): 3067-3082 (2015) - 2014
- [j34]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen:
PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(2): 685-689 (2014) - [j33]Xiangxue Li, Haifeng Qian, Yuan Zhou:
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 276: 290-294 (2014) - [j32]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. Secur. Commun. Networks 7(10): 1552-1559 (2014) - [c43]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. CCS 2014: 1457-1459 - [c42]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. CCS 2014: 1460-1462 - 2013
- [j30]Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu:
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math. Comput. Model. 57(3-4): 503-511 (2013) - [c38]Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201 - [c37]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184 - 2012
- [j28]Xiangxue Li, Haifeng Qian, Yuan Zhou:
Pitfalls in identity based encryption using an elliptic curve combined public key. Appl. Math. Lett. 25(8): 1111-1113 (2012) - [j27]Haifeng Qian, Xiangxue Li, Xinli Huang:
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. Informatica 23(3): 443-460 (2012) - [c36]Yong Zhang, Xiangxue Li, Haifeng Qian:
An anonymous remote attestation for trusted cloud computing. CCIS 2012: 426-429 - [c34]Yu Yu, Xiangxue Li, Haifeng Qian:
Two-source extractors for leaky sources. ITW 2012: 452-456 - 2011
- [c28]Yuan Zhou, Haifeng Qian, Xiangxue Li:
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. ISC 2011: 341-354 - 2009
- [j19]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Jianhua Li:
Toward optimizing cauchy matrix for cauchy reed-solomon code. IEEE Commun. Lett. 13(8): 603-605 (2009) - 2007
- [j12]Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures. Inf. Sci. 177(6): 1382-1394 (2007) - 2005
- [c12]Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. CIS (2) 2005: 104-109
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-18 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint