近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
期刊论文:
YanweiZhou,BoYang,YiMu,ZheXia.Continuousleakage-resilientidentity-basedencryptionwithleakageamplification.ToappearatDesigns,CodesandCryptography.(CCFB)
YanweiZhou,BoYang,ZheXia,YiMu,TaoWang.Anonymousandupdatableidentity-basedhashproofsystem.ToappearatIEEESystemJournal.
TaoWang,BoYang,HongyuLiu,YongYu,GuoyongQiu,ZheXia.Analternativeapproachtopublicclouddataauditingsupportingdatadynamics.ToappearatSoftComputing.(CCFC)
XinWang,BoYang,ZheXia.AsecuredatasharingschemewithcheatingdetectionbasedonChaum-Pedersenprotocolforcloudstorage.ToappearatFrontiersofInformationTechnology&ElectronicEngineering.
ZheXia,YiningLiu,Ching-FangHsu,Chin-ChenChang.Aninformationtheoreticallysecuree-lotteryschemebasedonsymmetricbivariatepolynomials.Symmetry11(1):88,2019.
YiningLiu,YanpingWang,XiaofenWang,ZheXia,JingfangXu.Privacy-preservingrawdatacollectionwithoutatrustedauthorityforIoT.ComputerNetworks148:340-348,2019.(CCFB)
YanweiZhou,BoYang,YiMu,ZheXia.Continuousleakage-resilientaccesscontrolforwirelesssensornetworks.AdHocNetworks80:41-53,2018.(CCFC)
XinWang,BoYang,ZheXia,YanqiZhao,HuifangYu.Acheatingdetectableprivacy-preservingdatasharingschemeforcloudcomputing.SecurityandCommunicationNetworks6174830:1-6174830:13,2018.(CCFC)
QiqiLai,BoYang,YongYu,ZheXia,YanweiZhou,YuanChen.Updatableidentity-basedhashproofsystembasedonlatticesanditsapplicationtoleakage-resilientpublic-keyencryptionschemes.JournalofComputerScienceandTechnology33(6):1243-1260,2018.
MingwuZhang,JiajunHuang,HuaShen,ZheXia,YongDing.Consecutiveleakage-resilientandupdatablelossytrapdoorfunctionsandapplicationinsensitivebig-dataenvironments.IEEEAccess6:43936-43945,2018.
ZheXia,ZhengTong,MinXiao,Chin-ChenChang.Aframeworkforpracticalandreceipt-freeremotevoting.IETInformationSecurity,12(4):326-3312018.(CCFC)
LeinHarn,Ching-FangHsu,ZheXia,JunweiZhou.Howtosharesecretefficientlyovernetworks.SecurityandCommunicationNetworks.2017.(CCFC)
HanbingYao,NanaXing,JunweiZhou,ZheXia.SecureIndexforResource-ConstraintMobileDevicesinCloudComputing.IEEEAccess.DOI:10.1109/ACCESS.2016.2622299.
YiningLiu,QiZhong,ZheXia,DibiaoHe.ASecureDataBackupSchemeUsingMulti-FactorAuthentication.IETInformationSecurity.2016.(CCFC)
YiningLiu,GaoLin,ChiCheng,ZheXia.APrivacy-PreservingHealthDataAggregationScheme.KSIITransactionsonInternetandInformationSystems.2016
MorganLlewellyn,SteveSchneider,ZheXia,ChrisCulnane,JamesHeather,PeterY.A.Ryan,ShriramkrishnanSrinivasan.Testingvoters'understandingofasecuritymechanismusedinverifiablevoting.USENIXJournalofElectionTechnologyandSystems(JETS).2013.
PeterY.A.Ryan,DavidBismark,JamesHeather,SteveSchneiderandZheXia.PrêtàVoter:aVoter-VerifiableVotingSystem.InIEEETransactionsonInformationForensicsandSecurity(SpecialIssueonElectronicVoting),volume4,number4,pages662—673.December2009.(CCFA)
DavidLundin,HelenTreharne,PeterY.A.Ryan,SteveSchneider,JamesHeatherandZheXia.Tearanddestroy:chainvotinganddestructionproblemssharedbyPrêtàVoterandPunchscanandasolutionusingvisualencryption.IntheEATCSFundamentaInformaticae(JournalofFundamentalInformatics),2006,pp1001-1019.
会议论文:
ZheXia,ZhenYang,ShengwuXiong,ChingfangHsu.Game-basedsecurityproofsforsecretsharingschemes.Inthe2ndInternationalConferenceonSecurityandIntelligentComputingandBig-DataServices(SICBS2018),December14-16,2018,Guilin,China.
ZheXia,BoYang,MingwuZhang,YiMu.Anefficientandprovablysecureprivatepolynomialevaluationscheme.Inthe14thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2018).September25-27,2018,TokyoJapan.
YiningLiu,YanpingWang,XiaofenWang,ZheXia.Privacy-preservingdatacollectionformobilephonesensingtasks.Inthe14thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2018).September25-27,2018,TokyoJapan.
ZheXia,LiuyingSun,BoYang,YanweiZhou,MinwuZhang.Verifiablesecretsharingbasedonhyperplanegeometrywithitsapplicationstooptimalresilientproactivecryptosystems.Inthe23stAustralasianConferenceonInformationSecurityandPrivacy(ACISP2018).July11-13,2018,Wollongong,Australia.(CCFC)
LiuyingSun,AnthonyHo,ZheXia,JiagengChen,XuzheHuang,YidanZhang.DetectionandClassificationofMaliciousPatternsinNetworkTrafficusingBenford'sLaw.Asia-PacificSignalandInformationProcessingAssociationAnnualSummitandConference2017(APSIPAASC2017).
ZheXia,BassomaDiallo,MinXiao.ALightweightPrivacyPreservingSchemeforSmartGrid.2016InternationalConferenceonComputing,AnalyticsandSecurityTrends.
ZheXia,XiaoyunYang,MinXiaoandDebiaoHe.ProvablySecureThresholdPaillierEncryptionBasedonHyperplaneGeometry.Inthe21stAustralasianConferenceonInformationSecurityandPrivacy(ACISP2016).July4-6,2016,Melbourne,Australia.(CCFC)
PengyuZhou,MinXiaoandZheXia.Amessageauthenticationmethodforwirelesssensornetworksusingpolynomialinterpolation.Inthe2ndInternationalSymposiumonDependableComputingandInternetofThings(DCIT2015),November2015,WuhanChina.
XiaoyunYang,ZheXiaandMinXiao.Verifiablesecretsharinganddistributedkeygenerationbasedonhyperplanegeometry.Inthe2ndInternationalSymposiumonDependableComputingandInternetofThings(DCIT2015),November2015,WuhanChina.
SriramkrishnanSrinivasan,ChrisCulnane,JamesHeather,SteveSchneiderandZheXia.CounteringballotstuffingandincorporatingeligibilityverifiabilityinHelios.Inthe8thInternationalConferenceonNetworkandSystemSecurity(NSS2014),volumn8792ofLectureNotesofComputerScience.October,2014.Xi'an,China.
XiaoYang,ZhengTong,ZheXiaandYiningLiu.Generatingverifiablerandomnumberswithoutatrustedparty.Inthe2014ChinaCommunicationsSecurityConference(CSC2014),May2014.Beijing,China.
JamesHeather,ChrisCulnane,SteveSchneider,SriramkrishnanSrinivasanandZheXia.Solvingthediscretelogarithmproblemforpackingcandidatepreferences.Inthe8thInternationalConferenceonAvailability,ReliabilityandSecurity(CD-ARES2013),volumn8128ofLectureNotesinComputerScience.IEEEComputerSociety.September2013.Regensburg,Germany.
MorganLlewellyn,SteveSchneider,ZheXia,ChrisCulnane,JamesHeather,PeterY.A.Ryan,ShriramkrishnanSrinivasan.Testingvoters'understandingofasecuritymechanismusedinverifiablevoting.Inthe2013USENIXElectronicVotingTechnologyWorkshop(EVT2013),collaboratedwithUSENIXSecuritySymposium2013.August2013,Washinton,D.C.,US.
CraigBurton,ChrisCulnane,JamesHeather,TheaPeacock,PeterY.A.Ryan,SteveSchneider,SriramkrishnanSrinivasan,VanessaTeague,RolandWenandZheXia.UsingPrêtàVoterintheVictorianStateelections.Inthe2012USENIXElectronicVotingTechnologyWorkshop(EVT2012),collaboratedwithUSENIXSecuritySymposium2012.August2012.Bellevue,WA,US.
CraigBurton,ChrisCulnane,JamesHeather,TheaPeacock,PeterY.A.Ryan,SteveSchneider,SriramkrishnanSrinivasan,VanessaTeague,RolandWenandZheXia.AsupervisedverifiablevotingprotocolfortheVictorianElectoralCommission.Inthe5thInternationalConferenceonElectronicVoting(EVOTE2012).ManuelJ.Kripp,MelanieVolkamer,RüdigerGrimm(Eds),volume205ofLectureNotesinInformatics(LNI).July2012.Bregenz,Austria.
SteveSchneider,SriramkrishnanSrinivasan,ChrisCulnane,JamesHeatherandZheXia.PrêtàVoterwithwrite-ins.Inthe3rdInternationalConferenceonE-votingandIdentity(VOTE-ID2011).volume7985ofLectureNotesofComputerScience,Springer-Verlag.September2011.Tallinn,Estonia.
ChrisCulnane,DavidBismark,JamesHeather,SteveSchneider,SriramkrishnanSrinivasanandZheXia.Authenticationcodes.Inthe2011USENIXElectronicVotingTechnologyWorkshop(EVT2011),collaboratedwithUSENIXSecuritySymposium2011.August2011.SanFrancisco,California,US.
SteveSchneider,MorganLlewellyn,ChrisCulnane,JamesHeather,SriramkrishnanSrinivasanandZheXia.FocusgroupviewsonPrêtàVoter1.0.Inthe2ndInternationalWorkshoponRequirementsEngineeringforE-votingSystems(RE-Vote2011).August2011.Trento,Italy.
ZheXia,ChrisCulnane,JamesHeather,HugoJonker,PeterY.A.Ryan,SteveSchneiderandSriramkrishnanSrinivasan.VersatilePrêtàVoter:handlingmultipleelectionmethodswithaunifiedinterface.Inthe11thInternationalConferenceonCryptologyinIndia(Indocrypt2010).Volume6498ofLectureNotesofComputerScience,pages98-114,Springer-Verlag.December2010,Hyderabad,India.
DavidBismark,JamesHeather,RogerPeel,PeterY.A.Ryan,SteveSchneiderandZheXia.ExperiencesgainedfromthefirstPrêtàVoterimplementation.Inthe1stInternationalWorkshoponRequirementsEngineeringforE-votingSystems(RE-Vote2009).August2009.Atlanta,Georgia,US.
ZheXia,SteveSchneider,JamesHeatherandJacquesTraoré.Analysis,improvementandsimplificationofthePrêtàVoterwithPaillierencryption.Inthe2008USENIXElectronicVotingTechnologyWorkshop(EVT2008),collaboratedwithUSENIXSecuritySymposium2008,.July2008.SanJose,California,US.
SebastienFoulle,SteveSchneider,JacquesTraoréandZheXia.Threatanalysisofapracticalvotingschemewithreceipts.Inthe1stInternationalConferenceonE-votingandIdentity(VOTE-ID2007).Volume4896ofLectureNotesofComputerScience,pages156-165,Springer-Verlag.October2007.Bochum,Germany.
ZheXia,SteveSchneider,JamesHeather,PeterY.A.Ryan,DavidLundin,RogerPeelandPhilipHoward.PrêtàVoter:All-In-One.InIAVoSSWorkshoponTrustworthyElections(WOTE2007),June2007.Ottawa,Canada.
ZheXiaandSteveSchneider.Anewreceipt-freee-votingschemebasedonblindsignature.InIAVoSSWorkshoponTrustworthyElections(WOTE2006).June2006.Cambridge,UK.