


default search action
Qi Xie 0001
Person information
- affiliation: Hangzhou Normal University (HZNU), School of Mathematics, Key Laboratory of Cryptography and Network Security, China
- affiliation (2012): City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation (2009-2010): University of Birmingham, Department of Computer Science, UK
- affiliation (PhD 2005): Zhejiang University, China
Other persons with the same name
- Qi Xie — disambiguation page
- Qi Xie 0002
— Xi'an Jiaotong University, School of Mathematics and Statistics, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j42]Lanfang Gao
, Wei Zhao, Fuqun Wang
, Qi Xie
:
A Level-Aware Multi-Key Relinearization Method for MKHE. IEEE Access 14: 43907-43919 (2026)
[j41]Xiao Tan
, Qi Xie
, Lidong Han
, Shengbao Wang
:
Public auditing with semantic secure data privacy for low-entropy files in cloud storage. Comput. Secur. 163: 104826 (2026)
[j40]Junyu Li
, Fei Zhou
, Qi Xie
, Nankun Mu
, Yi-Ning Liu
:
Efficient Conditional Privacy-Preserving Heterogeneous Broadcast Signcryption for Collision Warning in VANETs. IEEE Trans. Netw. Serv. Manag. 23: 224-238 (2026)
[j39]Shucheng Ying
, Xiumei Li
, Qi Xie
:
Secure and efficient V2ES authentication protocol and faster-RCNN based object detection scheme for connected autonomous vehicles. Veh. Commun. 58: 100997 (2026)- 2025
[j38]Qi Xie
, Yuanyuan Zhao, Qingyun Xie
, Xiumei Li
, Debiao He
, Kefei Chen
:
A Multiserver Authentication Protocol With Integrated Monitoring for IoMT-Based Healthcare System. IEEE Internet Things J. 12(2): 2265-2278 (2025)
[j37]Yingying Li
, Feng Li, Gaopan Hou
, Yu Guan
, Zhiquan Liu
, Qi Xie
:
SCRM: Secure and Controllable Similarity Retrieval in Multiuser Settings. IEEE Internet Things J. 12(14): 28165-28176 (2025)
[j36]Yingying Li
, Feng Li
, Fuqun Wang
, Zhiquan Liu
, Yan Zhu
, Qi Xie
, Song Han:
Efficient Privacy-Preserving Similarity Retrieval With Fine-Grained Access Control. IEEE Internet Things J. 12(19): 40054-40067 (2025)
[j35]Qi Xie
, Jilin Zhang:
Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones. Symmetry 17(4): 556 (2025)
[j34]Huige Wang
, Kefei Chen
, Qi Xie
, Qian Meng:
Post-Quantum Secure Identity-Based Matchmaking Encryption. IEEE Trans. Dependable Secur. Comput. 22(1): 833-844 (2025)
[j33]Yi Liu
, Jiusun Zeng
, Zidong Wang
, Weiguo Sheng
, Chuanhou Gao
, Qi Xie
, Lei Xie:
Structured Pattern Discovery Using Dictionary Learning for Incipient Fault Detection and Isolation. IEEE Trans. Ind. Informatics 21(9): 6679-6689 (2025)- 2024
[j32]Xin Zhou
, Shengbao Wang
, Kang Wen, Bin Hu, Xiao Tan
, Qi Xie
:
Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare. IEEE Internet Things J. 11(6): 9599-9609 (2024)
[j31]Qingyun Xie
, Qi Xie
:
Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System. IEEE Internet Things J. 11(8): 15038-15042 (2024)
[j30]Qi Xie
, Zixuan Ding
, Qingyun Xie
, Xiao Tan
, Debiao He
, Wen Tang:
Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs. IEEE Internet Things J. 11(19): 31068-31079 (2024)- 2023
[j29]Jiahao Jiang, Xiao Tan
, Lidong Han
, Qi Xie
, Shengbao Wang
:
CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage. IEEE Access 11: 86243-86251 (2023)
[j28]Qi Xie
, Zhengyang Sun, Qingyun Xie
, Zixuan Ding
:
A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain. IEEE Access 11: 97840-97851 (2023)
[j27]Xiao Tan
, Qi Xie
, Lidong Han, Shengbao Wang, Wenhao Liu:
Proof of retrievability with flexible designated verification for cloud storage. Comput. Secur. 135: 103486 (2023)
[j26]Zixuan Ding
, Qi Xie
:
Provably secure and lightweight three-factor authentication scheme for industrial medical CPS. J. Inf. Secur. Appl. 79: 103656 (2023)
[j25]Yuqin Sun, Lidong Han, Jingguo Bi, Xiao Tan
, Qi Xie:
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud. J. Cloud Comput. 12(1): 77 (2023)
[j24]Lidong Han
, Guangwu Xu
, Qi Xie
:
Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage". IEEE Trans. Inf. Forensics Secur. 18: 3934-3935 (2023)
[j23]Zijian Bao, Debiao He
, Muhammad Khurram Khan
, Min Luo
, Qi Xie:
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1524-1534 (2023)
[j22]Qi Xie
, Zixuan Ding
, Panpan Zheng:
Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 24(7): 7318-7327 (2023)
[j21]Qi Xie
, Zixuan Ding
, Wen Tang, Debiao He
, Xiao Tan
:
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs. IEEE Trans. Veh. Technol. 72(12): 15200-15212 (2023)- 2022
[j20]Yi Yang, Debiao He
, Pandi Vijayakumar
, Brij B. Gupta
, Qi Xie:
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System. IEEE Trans. Green Commun. Netw. 6(3): 1520-1531 (2022)
[j19]Quanrun Li, Debiao He
, Zhichao Yang, Qi Xie, Kim-Kwang Raymond Choo
:
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network. IEEE Trans. Veh. Technol. 71(4): 4336-4347 (2022)
[i2]Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. IACR Cryptol. ePrint Arch. 2022: 581 (2022)- 2021
[j18]Lidong Han
, Junling Guo, Guang Yang, Qi Xie
, Chengliang Tian
:
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time. IEEE Access 9: 151245-151253 (2021)
[j17]Qi Xie
, Keheng Li, Xiao Tan
, Lidong Han, Wen Tang, Bin Hu:
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP J. Wirel. Commun. Netw. 2021(1): 119 (2021)
[j16]Qi Xie
, Zixuan Ding
, Bin Hu
:
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. Secur. Commun. Networks 2021: 4799223:1-4799223:12 (2021)
2010 – 2019
- 2019
[j15]Qi Xie
, Lingfeng Hwang
:
Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city. Neurocomputing 347: 131-138 (2019)- 2017
[j14]Qi Xie
, Zhixiong Tang, Kefei Chen:
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput. Electr. Eng. 59: 218-230 (2017)
[j13]Debiao He, Ding Wang
, Qi Xie, Kefei Chen:
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Sci. China Inf. Sci. 60(5): 52104 (2017)
[j12]Lidong Han, Qi Xie, Wenhao Liu:
An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem. Int. J. Netw. Secur. 19(3): 469-478 (2017)
[j11]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan
, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017)
[j10]Lidong Han, Qi Xie, Wenhao Liu, Shengbao Wang:
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme. Wirel. Pers. Commun. 95(3): 3391-3406 (2017)
[j9]Qi Xie, Bin Hu, Xiao Tan
, Duncan S. Wong:
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks. Wirel. Pers. Commun. 96(4): 5881-5896 (2017)- 2015
[j8]Shengbao Wang, Zhenfu Cao
, Qi Xie, Wenhao Liu:
Practical identity-based encryption in multiple private key generator (PKG) environments. Secur. Commun. Networks 8(1): 43-50 (2015)
[c2]Wenhao Liu, Shengbao Wang, Xiao Tan, Qi Xie, Qizhen Wang:
Identity-Based One Round Key Agreement Protocol without Bilinear Pairings. 3PGCIC 2015: 470-473- 2014
[j7]Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme. Concurr. Comput. Pract. Exp. 26(5): 1038-1051 (2014)
[j6]Wenhao Liu, Qi Xie, Shengbao Wang, Lidong Han, Bin Hu:
Pairing-Free Certificateless Signature with Security Proof. J. Comput. Networks Commun. 2014: 792063:1-792063:6 (2014)
[j5]Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu:
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care. J. Medical Syst. 38(9): 91 (2014)
[j4]Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. Secur. Commun. Networks 7(8): 1264-1273 (2014)
[j3]Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu:
Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Wirel. Pers. Commun. 74(2): 601-614 (2014)- 2013
[j2]Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Inf. Technol. Control. 42(3): 231-237 (2013)
[j1]Guilin Wang, Jiangshan Yu
, Qi Xie:
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. IEEE Trans. Ind. Informatics 9(1): 294-302 (2013)- 2012
[c1]Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen:
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme. INCoS 2012: 360-364
[i1]Guilin Wang, Jiangshan Yu, Qi Xie:
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks. IACR Cryptol. ePrint Arch. 2012: 107 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-01 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







