Volgen
Chi Cheng
Titel
Geciteerd door
Geciteerd door
Jaar
A practical privacy-preserving data aggregation (3PDA) scheme for smart grid
Y Liu, W Guo, CI Fan, L Chang, C Cheng
IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2019
2732019
Securing the Internet of Things in a quantum world
C Cheng, R Lu, A Petzoldt, T Takagi
IEEE Communications Magazine 55 (2), 116-120, 2017
2482017
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Q Wang, D Wang, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2021
1352021
A Lightweight Authenticated Communication Scheme for Smart Grid
Yining Liu, Chi Cheng*, Tianlong Gu, Tao Jiang
IEEE Sensors Journal 16 (3), 836-842, 2016
107*2016
An improved authenticated group key transfer protocol based on secret sharing
Y Liu, C Cheng, J Cao, T Jiang
IEEE Transactions on Computers 62 (11), 2335-2336, 2013
612013
Privacy-aware smart city: A case study in collaborative filtering recommender systems
F Zhang, VE Lee, R Jin, S Garg, KKR Choo, M Maasberg, L Dong, ...
Journal of Parallel and Distributed Computing 127, 145-159, 2019
572019
Security analysis and improvements on two homomorphic authentication schemes for network coding
C Cheng, J Lee, T Jiang, T Takagi
IEEE Transactions on Information Forensics and Security 11 (5), 993-1002, 2016
542016
A secure data backup scheme using multi‐factor authentication
Y Liu, Q Zhong, L Chang, Z Xia, D He, C Cheng
IET Information security 11 (5), 250-255, 2017
452017
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Y Qin, C Cheng, J Ding
24th European Symposium on Research in Computer Security (Esorics …, 2019
432019
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Y Qin, C Cheng, X Zhang, Y Pan, L Hu, J Ding
Asiacrypt 2021, 2021
422021
An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding
C Cheng, T Jiang
IEEE Transactions on Computers 62 (10), 2096-2100, 2013
422013
TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding
C Cheng, T Jiang, Q Zhang
IEEE Journal on Selected Areas in Communications 31 (9), 291-298, 2013
402013
A privacy-preserving health data aggregation scheme
Y Liu, G Liu, C Cheng, Z Xia, J Shen
KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3852-3864, 2016
292016
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Y Qin, C Cheng, J Ding
Eprint, 2019
282019
Lighting the way to a smart world: Lattice-based cryptography for Internet of Things
R Xu, C Cheng, Y Qin, T Jiang
arXiv preprint arXiv:1805.04880, 2018
282018
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet
M Hussain, C Cheng, R Xu, M Afzal
Information Sciences 631, 328-345, 2023
272023
Find the bad apples: An efficient method for perfect key recovery under imperfect sca oracles–a case study of kyber
M Shen, C Cheng, X Zhang, Q Guo, T Jiang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 89-112, 2023
242023
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era
C Cheng, Y Qin, R Lu, T Jiang, T Takagi
IEEE Transactions on Smart Grid 10 (6), 6386 - 6395, 2019
212019
Further analysis and improvements of a lattice-based anonymous PAKE scheme
R Ding, C Cheng, Y Qin
IEEE Systems Journal 16 (3), 5035-5043, 2022
192022
A novel homomorphic MAC scheme for authentication in network coding
C Cheng, T Jiang
IEEE Communications Letters, 15 (11), 1228-1230, 2011
182011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20