Xiaofeng Chen

From MaRDI portal
Person:301842

Available identifiers

zbMath Open chen.xiaofengMaRDI QIDQ301842

List of research outcomes

PublicationDate of PublicationType
Towards secure asynchronous messaging with forward secrecy and mutual authentication2024-05-02Paper
Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability2024-02-29Paper
Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks2024-02-13Paper
Distributed dual objective control of an energy storage system under jointly connected switching networks2023-06-26Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy2023-05-26Paper
Multistability analysis of quaternion-valued neural networks with cosine activation functions2023-04-21Paper
Forward-Secure Group Encryptions from Lattices2023-04-13Paper
Additive properties for the pseudo core inverse of morphisms in an additive category2023-01-02Paper
New Practical Public-Key Deniable Encryption2022-12-21Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
The pseudo core inverses of differences and products of projections in rings with involution2022-06-29Paper
On the weighted pseudo Drazin invertible elements in associative rings and Banach algebras2022-06-07Paper
Rank equalities related to a class of outer generalized inverse2022-06-03Paper
Robust stability analysis of impulsive quaternion-valued neural networks with distributed delays and parameter uncertainties2022-03-07Paper
Effects of parallel importation and power structures on price competition in duopolistic supply chains2022-01-24Paper
Location-price game in a dual-circle market with different demand levels2022-01-24Paper
Exclusivity or competitor retail? Impacts of channel structures on multinational supply chains considering green manufacturing2022-01-21Paper
Robust asymptotical stability and stabilization of fractional-order complex-valued neural networks with delay2022-01-11Paper
Two-player location-price game in a spoke market with linear transportation cost2022-01-11Paper
An Efficient Contact Search Algorithm for Three-Dimensional Sphere Discontinuous Deformation Analysis2021-12-16Paper
Global exponential synchronization via nonlinear feedback control for delayed inertial memristor-based quaternion-valued neural networks with impulses2021-11-10Paper
Generalized WG inverse2021-11-05Paper
https://portal.mardi4nfdi.de/entity/Q33811152021-09-29Paper
Right core inverses of a product and a companion matrix2021-09-13Paper
The \((b, c)\)-inverse in semigroups and rings with involution2021-06-24Paper
Optimal preventive ``maintenance-first or -last policies with generalized imperfect maintenance models2021-06-09Paper
https://portal.mardi4nfdi.de/entity/Q49846182021-04-26Paper
Global Analysis of an Asymmetric Continuous Piecewise Linear Differential System with Three Linear Zones2021-03-12Paper
Two-player location game in a closed-loop market with quantity competition2020-10-21Paper
New publicly verifiable computation for batch matrix multiplication2020-10-07Paper
Privacy preserving multi-party computation delegation for deep learning in cloud computing2020-09-09Paper
Global Dynamics of a Planar Filippov System with Symmetry2020-08-18Paper
Robust stability analysis of quaternion-valued neural networks with time delays and parameter uncertainties2020-05-18Paper
Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four2020-03-09Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing2020-02-06Paper
https://portal.mardi4nfdi.de/entity/Q51937162019-09-20Paper
https://portal.mardi4nfdi.de/entity/Q51941202019-09-20Paper
Parameter-range-dependent robust stability conditions for quaternion-valued neural networks with time delays2019-05-20Paper
Multistability of complex-valued neural networks with time-varying delays2019-03-27Paper
Global \(\mu\)-stability of complex-valued neural networks with unbounded time-varying delays2019-02-14Paper
Global \(\mu\)-stability of impulsive complex-valued neural networks with leakage delay and mixed delays2019-02-14Paper
Robust stability analysis of quaternion-valued neural networks via LMI approach2019-01-21Paper
Robust stability analysis of impulsive complex-valued neural networks with mixed time delays and parameter uncertainties2019-01-17Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
Efficient request-based comparable encryption scheme based on sliding window method2017-09-08Paper
Stability analysis of nonlinear fractional-order systems with variable-time impulses2017-06-07Paper
Identity-Based Encryption with Outsourced Revocation in Cloud Computing2017-05-16Paper
Verifiable Computation over Large Database with Incremental Updates2017-05-16Paper
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability2017-05-16Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures2016-08-31Paper
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption2016-07-06Paper
Essential sign change numbers of full sign pattern matrices2016-07-04Paper
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks2016-05-06Paper
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach2016-01-27Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts2015-09-29Paper
Secure deduplication storage systems supporting keyword search2015-08-31Paper
Verifiable Computation over Large Database with Incremental Updates2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
A Secure Three-Party Computational Protocol for Triangle Area2014-07-24Paper
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage2014-07-24Paper
https://portal.mardi4nfdi.de/entity/Q51661532014-06-30Paper
https://portal.mardi4nfdi.de/entity/Q28584762013-11-19Paper
New Algorithms for Secure Outsourcing of Modular Exponentiations2013-10-23Paper
Discrete logarithm based chameleon hashing and signatures without key exposure2013-05-31Paper
Non-interactive Deniable Authentication Protocols2013-01-07Paper
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves2012-11-01Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
A Short Non-delegatable Strong Designated Verifier Signature2012-09-07Paper
Global exponential stability of antiperiodic solutions for discrete-time neural networks with mixed delays and impulses2012-08-14Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring2011-07-29Paper
https://portal.mardi4nfdi.de/entity/Q30166832011-07-19Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 052010-08-20Paper
https://portal.mardi4nfdi.de/entity/Q35709912010-07-08Paper
Attack on an ID-based authenticated group key agreement scheme from PKC 20042009-07-21Paper
The ring authenticated encryption scheme-how to provide a clue wisely2009-03-24Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels2009-01-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature2008-06-10Paper
Generalization of functional equation for the square root spiral2007-01-11Paper
Information Security2006-10-16Paper
Information Security2006-10-16Paper
https://portal.mardi4nfdi.de/entity/Q57184102006-01-16Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security Practice and Experience2005-09-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46544532005-03-04Paper
https://portal.mardi4nfdi.de/entity/Q48252582004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q47956672003-10-20Paper
https://portal.mardi4nfdi.de/entity/Q47087472003-06-18Paper
https://portal.mardi4nfdi.de/entity/Q27068802001-07-26Paper
https://portal.mardi4nfdi.de/entity/Q27196112001-06-25Paper
https://portal.mardi4nfdi.de/entity/Q34894881989-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Xiaofeng Chen