default search action
Xiaoming Hu 0002
Person information
- affiliation: Shanghai Polytechnic University, College of Computer and Information Engineering, China
Other persons with the same name
- Xiaoming Hu — disambiguation page
- Xiaoming Hu 0001 — KTH Royal Institute of Technology, Stockholm, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c8]Wei Zhang, Yufei Zhang, Yilin Huang, Fangshu Chen, Jiahui Wang, Xiaoming Hu:
GUFAD: A Graph-based Unsupervised Fraud Account Detection Framework. ICMLCA 2023: 401-406
2010 – 2019
- 2019
- [j11]Xiaoming Hu, Huajie Xu, Jian Wang, WenAn Tan, Yinchun Yang:
A generic construction of identity-based proxy signature scheme in the standard model. Int. J. Inf. Comput. Secur. 11(1): 83-100 (2019) - [j10]Huajie Xu, Qinghua Wu, Xiaoming Hu:
基于轨迹多特性的隐私保护算法 (Privacy Protection Algorithm Based on Multi-characteristics of Trajectory). 计算机科学 46(1): 190-195 (2019) - [c7]Xiaoming Hu, Wenan Tan, Chengcheng Yu, Chuang Ma, Huajie Xu:
Security Anlysis of Certificateless Aggregate Signature Scheme in VANETs. CISP-BMEI 2019: 1-6 - 2018
- [c6]Xiaoming Hu, Wenrong Jiang, Chuang Ma, Chengcheng Yu:
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme. CISP-BMEI 2018: 1-9 - [c5]Xiaoming Hu, Wenrong Jiang, Chuang Ma, Chengcheng Yu:
Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme. ICCNS 2018: 12-16 - 2017
- [j9]Xiaoming Hu, Jian Wang, Huajie Xu, Yinchun Yang, Xiaolin Xu:
An improved efficient identity-based proxy signature in the standard model. Int. J. Comput. Math. 94(1): 22-38 (2017) - [j8]Xiaoming Hu, Chuang Ma, Taozhi Si, Wenrong Jiang, Huajie Xu, Wenan Tan:
改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier). 计算机科学 44(8): 168-175 (2017) - [j7]Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang, Chuang Ma:
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. Secur. Commun. Networks 2017: 7921782:1-7921782:9 (2017) - 2016
- [j6]Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang:
Short and provably secure designated verifier proxy signature scheme. IET Inf. Secur. 10(2): 69-79 (2016) - [j5]Xiaoming Hu, Huajie Xu, Yan Liu, Jian Wang, WenAn Tan, Xiaojun Zhang:
An efficient designated verifier signature scheme with pairing-free and low cost. Secur. Commun. Networks 9(18): 5724-5732 (2016) - [c4]Xiaoming Hu, Chuang Ma, Jian Wang, Huajie Xu, WenAn Tan:
An undeniable strong DSVS scheme with no bilinear pairings. CISP-BMEI 2016: 1944-1948 - [c3]Xiaoming Hu, Jian Wang, Huajie Xu, Yan Liu, Xiaojun Zhang:
Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks. ICIC (3) 2016: 11-20 - 2015
- [j4]Xiaoming Hu, Yinchun Yang, Jian Wang, Huajie Xu, WenAn Tan:
Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 758-761 (2015) - [j3]Xiaoming Hu, Jian Wang, Huajie Xu, WenAn Tan:
A short and highly efficient identity-based designated verifier proxy signature scheme. Secur. Commun. Networks 8(6): 907-916 (2015) - [c2]Xiaoming Hu, Hong Lu, Huajie Xu, Jian Wang, Yinchun Yang:
An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction. CISIS-ICEUTE 2015: 309-319 - 2014
- [j2]Xiaoming Hu, Jian Wang, Huajie Xu, Yinchun Yang:
Constant Size Ciphertext and Private Key HIBE without Random Oracles. J. Inf. Sci. Eng. 30(2): 333-345 (2014) - 2013
- [j1]Xiaoming Hu, Huajie Xu, Jian Wang, Yinchun Yang, Xiaolin Xu:
Short Hierarchical Identity-based Encryption in the Selective-ID Model. J. Softw. 8(7): 1613-1619 (2013) - 2010
- [c1]Xiaoming Hu, Tong Wang, Huajie Xu:
Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles. MVHI 2010: 389-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint