37Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang. AFRICACRYPT 2012, 53-66. Web SearchBibTeXDownload
36On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen. IACR Cryptology ePrint Archive (2012): 245 (2012). Web SearchBibTeXDownload
35Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment. Longbin Lai, Linfeng Shen, Yanfei Zheng, Kefei Chen, Jing Zhang. IJCAC (2): 71-82 (2012). Web SearchBibTeXDownload
34Annihilators of Fast Discrete Fourier Spectra Attacks. Jingjing Wang, Kefei Chen, Shixiong Zhu. IWSEC 2012, 182-196. Web SearchBibTeXDownload
33YI Cloud: Improving user privacy with secret key recovery in cloud storage. Zheng Huang, Qiang Li, Dong Zheng, Kefei Chen, Xiangxue Li. SOSE 2011, 268-272. Web SearchBibTeXDownload
32CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. IACR Cryptology ePrint Archive (2010): 265 (2010). Web SearchBibTeXDownload
31Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. Xiangxue Li, Weidong Qiu, Dong Zheng, Kefei Chen, Jianhua Li. IEEE Transactions on Industrial Electronics (57): 793-800 (2010). Web SearchBibTeXDownload
30Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. Jian Weng, Min-Rong Chen, Kefei Chen, Robert H. Deng. IEICE Transactions (93-A): 854-856 (2010). Web SearchBibTeXDownload
29Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen. Inf. Sci. (180): 5077-5089 (2010). Web SearchBibTeXDownload
28CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. SCIENCE CHINA Information Sciences (53): 593-606 (2010). Web SearchBibTeXDownload
27Democratic group signatures with collective traceability. Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li. Computers & Electrical Engineering (35): 664-672 (2009). Web SearchBibTeXDownload
26Efficient Secure Multiparty Computation Protocol in Asynchronous Network. Zheng Huang, Weidong Qiu, Qiang Li, Kefei Chen. ISA 2009, 152-158. Web SearchBibTeXDownload
25Extended PEG Algorithm for High Rate LDPC Codes. Zhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li. ISPA 2009, 494-498. Web SearchBibTeXDownload
24Receipt-Freeness for Groth e-Voting Schemes. Wei Han, Kefei Chen, Dong Zheng. J. Inf. Sci. Eng. (25): 517-530 (2009). Web SearchBibTeXDownload
23Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen. CANS 2008, 1-17. Web SearchBibTeXDownload
22Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang. IACR Cryptology ePrint Archive (2008): 509 (2008). Web SearchBibTeXDownload
21Democratic Group Signatures with Threshold Traceability. Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li. IACR Cryptology ePrint Archive (2008): 112 (2008). Web SearchBibTeXDownload
20A tabu search approach for the minimum sum-of-squares clustering problem. Yongguo Liu, Zhang Yi, Hong Wu, Mao Ye, Kefei Chen. Inf. Sci. (178): 2680-2704 (2008). Web SearchBibTeXDownload
19A Tamper-Evident Voting Machine Resistant to Covert Channels. Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen. ProvSec 2008, 335-344. Web SearchBibTeXDownload
18Linkable Ring Signatures from Linear Feedback Shift Register. Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li. EUC Workshops 2007, 716-727. Web SearchBibTeXDownload
17Filling the Gap between Voters and Cryptography in e-Voting. Wei Han, Dong Zheng, Kefei Chen. IACR Cryptology ePrint Archive (2007): 266 (2007). Web SearchBibTeXDownload
16A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. Mi Wen, Yanfei Zheng, Hui Li, Kefei Chen. PAKDD Workshops 2007, 608-620. Web SearchBibTeXDownload
15A Secure Time Synchronization Protocol for Sensor Network. Hui Li, Yanfei Zheng, Mi Wen, Kefei Chen. PAKDD Workshops 2007, 515-526. Web SearchBibTeXDownload
14Efficient Receipt-Free Electronic Auction Protocol. Zheng Huang, Weidong Qiu, Haibin Guan, Kefei Chen. SITIS 2007, 1023-1028. Web SearchBibTeXDownload
13Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. Wei Han, Dong Zheng, Kefei Chen. IACR Cryptology ePrint Archive (2006): 129 (2006). Web SearchBibTeXDownload
12A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen. ICSNC 2006, 29. Web SearchBibTeXDownload
11Rights Protection for Data Cubes. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen. ISC 2006, 359-372. Web SearchBibTeXDownload
10An Improved Hybrid Genetic Clustering Algorithm. Yongguo Liu, Jun Peng, Kefei Chen, Zhang Yi. SETN 2006, 192-202. Web SearchBibTeXDownload
9Clustering with Noising Method. Yongguo Liu, Yan Liu, Kefei Chen. ADMA 2005, 209-216. Web SearchBibTeXDownload
8A Novel Clustering Technique Based on Improved Noising Method. Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen. CIARP 2005, 81-92. Web SearchBibTeXDownload
7Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. Wei Wei, Xuhua Ding, Kefei Chen. ICICS 2005, 269-279. Web SearchBibTeXDownload
6A Hybrid Tabu Search Based Clustering Algorithm. Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen. KES (2) 2005, 186-192. Web SearchBibTeXDownload
5Digital Image Authentication Based on Turbo Codes. Qing Yang, Kefei Chen. MIPS 2004, 276-286. Web SearchBibTeXDownload
4A genetic clustering method for intrusion detection. Yongguo Liu, Kefei Chen, Xiaofeng Liao, Wei Zhang. Pattern Recognition (37): 927-942 (2004). Web SearchBibTeXDownload
3Attacks on the (enhanced) Yang-Shieh authentication. Kefei Chen, Sheng Zhong. Computers & Security (22): 725-727 (2003). Web SearchBibTeXDownload
2Electronic Payment in Mobile Environment. Zheng Huang, Kefei Chen. DEXA Workshops 2002, 413-417. Web SearchBibTeXDownload
1Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. Dong Zheng, Kefei Chen, Jinyuan You. J. Comput. Sci. Technol. (17): 749-756 (2002). Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research