default search action
Xiao Tan 0003
Person information
- affiliation: Hangzhou Normal University, Key Laboratory of Cryptography and Network Security, China
- affiliation (PhD 2014): City University of Hong Kong, Department of Computer Science, Hong Kong
Other persons with the same name
- Xiao Tan — disambiguation page
- Xiao Tan 0001 — Baidu Inc., Department of Computer Vision Technology, Beijing, China (and 2 more)
- Xiao Tan 0002 — KTH Royal Institute of Technology, Division of Decision and Control Systems, Stockholm, Sweden
- Xiao Tan 0004 — University of Science and Technology of China, School of Engineering Science, Anhui, Hefei, China
- Xiao Tan 0005 — Southeast University, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Xin Zhou, Shengbao Wang, Kang Wen, Bin Hu, Xiao Tan, Qi Xie:
Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare. IEEE Internet Things J. 11(6): 9599-9609 (2024) - [j20]Qi Xie, Zixuan Ding, Qingyun Xie, Xiao Tan, Debiao He, Wen Tang:
Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs. IEEE Internet Things J. 11(19): 31068-31079 (2024) - 2023
- [j19]Jiahao Jiang, Xiao Tan, Lidong Han, Qi Xie, Shengbao Wang:
CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage. IEEE Access 11: 86243-86251 (2023) - [j18]Xiao Tan, Qi Xie, Lidong Han, Shengbao Wang, Wenhao Liu:
Proof of retrievability with flexible designated verification for cloud storage. Comput. Secur. 135: 103486 (2023) - [j17]Yuqin Sun, Lidong Han, Jingguo Bi, Xiao Tan, Qi Xie:
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud. J. Cloud Comput. 12(1): 77 (2023) - [j16]Qi Xie, Zixuan Ding, Wen Tang, Debiao He, Xiao Tan:
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs. IEEE Trans. Veh. Technol. 72(12): 15200-15212 (2023) - 2022
- [i2]Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. IACR Cryptol. ePrint Arch. 2022: 581 (2022) - 2021
- [j15]Qi Xie, Keheng Li, Xiao Tan, Lidong Han, Wen Tang, Bin Hu:
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP J. Wirel. Commun. Netw. 2021(1): 119 (2021) - 2020
- [j14]Xikun Liang, Xiao Tan, Limin Tao:
Plaintext related image hybrid encryption scheme using algebraic interpolation and generalized chaotic map. Multim. Tools Appl. 79(3-4): 2719-2743 (2020)
2010 – 2019
- 2019
- [j13]Xikun Liang, Xiao Tan, Limin Tao, Bin Hu:
Image Hybrid Encryption Based on Matrix Nonlinear Operation and Generalized Arnold Transformation. Int. J. Pattern Recognit. Artif. Intell. 33(6): 1954022:1-1954022:17 (2019) - 2018
- [j12]Lidong Han, Xiao Tan, Shengbao Wang, Xikun Liang:
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-Peer Netw. Appl. 11(1): 63-73 (2018) - 2017
- [j11]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017) - [j10]Anjia Yang, Xiao Tan, Joonsang Baek, Duncan S. Wong:
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. IEEE Trans. Serv. Comput. 10(2): 165-175 (2017) - [j9]Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong:
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks. Wirel. Pers. Commun. 96(4): 5881-5896 (2017) - 2015
- [j8]Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong:
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79: 18-26 (2015) - [j7]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa:
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Trans. Cloud Comput. 3(2): 195-205 (2015) - [j6]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent signature without random oracles. Theor. Comput. Sci. 562: 194-212 (2015) - [c5]Wenhao Liu, Shengbao Wang, Xiao Tan, Qi Xie, Qizhen Wang:
Identity-Based One Round Key Agreement Protocol without Bilinear Pairings. 3PGCIC 2015: 470-473 - 2014
- [j5]Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. Secur. Commun. Networks 7(8): 1264-1273 (2014) - [j4]Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014) - [j3]Xiao Tan, Qiong Huang, Duncan S. Wong:
Extending concurrent signature to multiple parties. Theor. Comput. Sci. 548: 54-67 (2014) - [j2]Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu:
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Wirel. Pers. Commun. 74(2): 601-614 (2014) - [c4]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - 2013
- [j1]Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Inf. Technol. Control. 42(3): 231-237 (2013) - [c3]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong:
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. INCoS 2013: 93-98 - 2012
- [c2]Xiao Tan, Duncan S. Wong:
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. ACISP 2012: 247-260 - [c1]Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246 - [i1]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2012: 576 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint