Follow
Xiaofeng Chen
Xiaofeng Chen
Professor, Xidian University, China
Verified email at xidian.edu.cn - Homepage
Title
Cited by
Cited by
Year
Secure deduplication with efficient and reliable convergent key management
J Li, X Chen, M Li, J Li, PPC Lee, W Lou
IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013
8232013
A hybrid cloud approach for secure authorized deduplication
J Li, YK Li, X Chen, PPC Lee, W Lou
IEEE transactions on parallel and distributed systems 26 (5), 1206-1216, 2014
5722014
New algorithms for secure outsourcing of modular exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013
5412013
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
computers & security 72, 1-12, 2018
5192018
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4982013
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
IEEE Transactions on computers 64 (2), 425-437, 2013
4582013
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
4082017
Certificateless remote anonymous authentication schemes for wirelessbody area networks
J Liu, Z Zhang, X Chen, KS Kwak
IEEE Transactions on parallel and distributed systems 25 (2), 332-342, 2013
3522013
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
3282015
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2972017
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
2812017
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
2802014
Multiobjective cloud workflow scheduling: A multiple populations ant colony system approach
ZG Chen, ZH Zhan, Y Lin, YJ Gong, TL Gu, F Zhao, HQ Yuan, X Chen, ...
IEEE transactions on cybernetics 49 (8), 2912-2926, 2018
2712018
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
2602014
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
2302011
Public integrity auditing for shared dynamic cloud data with group user revocation
T Jiang, X Chen, J Ma
IEEE Transactions on Computers 65 (8), 2363-2373, 2015
2252015
Fine-grained access control system based on outsourced attribute-based encryption
J Li, X Chen, J Li, C Jia, J Ma, W Lou
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
2122013
New ID-based group signature from pairings
X Chen, F Zhang, K Kim
Journal of Electronics (China) 23 (6), 892-900, 2006
2102006
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1992015
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1882015
The system can't perform the operation now. Try again later.
Articles 1–20