What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chunxiang Xu
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage.
Changsong Jiang
Chunxiang Xu
Xinfeng Dong
Kefei Chen
Guomin Yang
2025
journals/tifs
Threshold Password-Hardening Updatable Oblivious Key Management.
Changsong Jiang
Chunxiang Xu
Zhen Liu
Xinfeng Dong
Wenzheng Zhang
2025
journals/tifs
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication.
Changsong Jiang
Chunxiang Xu
Guomin Yang
Zhao Zhang
Jie Chen
2025
conf/acisp
Strong Federated Authentication With Password-Based Credential Against Identity Server Corruption.
Changsong Jiang
Chunxiang Xu
Guomin Yang
Li Duan
Jing Wang
2025
journals/istr
Towards subversion-resistant password-protected encryption for deduplicated cloud storage.
Shanshan Li
Mengfan Ma
Yunxia Han
Chunxiang Xu
2024
journals/tifs
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates.
Changsong Jiang
Chunxiang Xu
Yunxia Han
Zhao Zhang
Kefei Chen
2024
journals/tifs
Hardening Password-Based Credential Databases.
Yaqing Song
Chunxiang Xu
Yuan Zhang
Shiyu Li
2024
journals/tifs
Privacy-Preserving Cryptocurrency With Threshold Authentication and Regulation.
Zhao Zhang
Chunxiang Xu
Yunxia Han
2024
conf/esorics
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication.
Changsong Jiang
Chunxiang Xu
Guomin Yang
2023
journals/istr
GAIN: Decentralized Privacy-Preserving Federated Learning.
Changsong Jiang
Chunxiang Xu
Chenchen Cao
Kefei Chen
2023
journals/istr
ttPAKE: Typo tolerance password-authenticated key exchange.
Yunxia Han
Chunxiang Xu
Shanshan Li
Changsong Jiang
Kefei Chen
2022
journals/tifs
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens.
Shanshan Li
Chunxiang Xu
Yuan Zhang
Jianying Zhou
2021
journals/tifs
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
Shiyu Li
Yuan Zhang
Chunxiang Xu
Kefei Chen
2021
journals/tifs
Security Analysis of a Path Validation Scheme With Constant-Size Proof.
Yangyang Wu
Changsong Jiang
Chunxiang Xu
Kefei Chen
2020
journals/tifs
On the Security of a Key Agreement and Key Protection Scheme.
Yunxia Han
Chunxiang Xu
Debiao He
Kefei Chen
2019
journals/istr
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
Shanshan Li
Chunxiang Xu
Yuan Zhang
2019
journals/istr
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
Jining Zhao
Chunxiang Xu
Kefei Chen
2018
journals/istr
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
Lixue Sun
Chunxiang Xu
Yuan Zhang
2018
conf/icics
Blockchain-Based Secure Data Provenance for Cloud Storage.
Yuan Zhang
Xiaodong Lin
Chunxiang Xu
2017
journals/tifs
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
Yuan Zhang
Chunxiang Xu
Xiaohui Liang
Hongwei Li
Yi Mu
Xiaojun Zhang
2015
journals/istr
Cryptanalysis of an integrity checking scheme for cloud data sharing.
Yuan Zhang
Chunxiang Xu
Jining Zhao
Xiaojun Zhang
Junwei Wen
Coauthors
Changsong Jiang
(9)
Chenchen Cao
(1)
Chunxiang Xu
(21)
Debiao He
(1)
Guomin Yang
(4)
Hongwei Li
(1)
Jianying Zhou
(1)
Jie Chen
(1)
Jing Wang
(1)
Jining Zhao
(2)
Junwei Wen
(1)
Kefei Chen
(8)
Li Duan
(1)
Lixue Sun
(1)
Mengfan Ma
(1)
Shanshan Li
(3)
Shanshan Li
(1)
Shiyu Li
(2)
Wenzheng Zhang
(1)
Xiaodong Lin
(1)
Xiaohui Liang
(1)
Xiaojun Zhang
(2)
Xinfeng Dong
(2)
Yangyang Wu
(1)
Yaqing Song
(1)
Yi Mu
(1)
Yuan Zhang
(8)
Yunxia Han
(5)
Zhao Zhang
(3)
Zhen Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to