Artykuły udostępnione publicznie: - Shaoquan JiangWięcej informacji
Niedostępne w żadnym miejscu: 3
On message authentication channel capacity over a wiretap channel
D Chen, S Jiang, N Zhang, L Liu, KKR Choo
IEEE Transactions on Information Forensics and Security 17, 3107-3122, 2022
Upoważnienia: National Natural Science Foundation of China
Lower bounds on the share size of leakage resilient cheating detectable secret sharing
S Dutta, S Jiang, R Safavi-Naini
International Conference on Cryptology and Network Security, 468-493, 2023
Upoważnienia: Natural Sciences and Engineering Research Council of Canada
A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes
S Dutta, S Jiang, R Safavi-Naini
International Conference on New Advances in Designs, Codes and Cryptography …, 2022
Upoważnienia: Natural Sciences and Engineering Research Council of Canada
Dostępne w jakimś miejscu: 12
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
S Jiang, G Gong, J He, K Nguyen, H Wang
IACR international conference on public-key cryptography, 396-427, 2020
Upoważnienia: Natural Sciences and Engineering Research Council of Canada
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
Upoważnienia: Chinese Academy of Sciences
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
Upoważnienia: National Natural Science Foundation of China
Message Authentication Code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
Upoważnienia: National Natural Science Foundation of China
Timed encryption with application to deniable key exchange
S Jiang
Theoretical Computer Science 560, 172-189, 2014
Upoważnienia: National Natural Science Foundation of China
On the size of source space in a secure MAC
S Jiang
IEEE Transactions on Information Forensics and Security 10 (9), 2007-2015, 2015
Upoważnienia: Chinese Academy of Sciences
On Unconditional ϵ-Security of Private Key Encryption
S Jiang
The Computer Journal 57 (10), 1570-1579, 2014
Upoważnienia: National Natural Science Foundation of China
A new framework for deniable secure key exchange
S Jiang, YM Chee, S Ling, H Wang, C Xing
Information and Computation 285, 104866, 2022
Upoważnienia: National Natural Science Foundation of China
On τ-time secure key agreement
SQ Jiang
Science China Information Sciences 58, 1-13, 2015
Upoważnienia: National Natural Science Foundation of China
On message authentication with a correlated setup
S Jiang
Information Processing Letters 116 (4), 289-293, 2016
Upoważnienia: Chinese Academy of Sciences
Efficient approximate message authentication scheme
S Jiang, J Li, Y Liao
IET Information Security 12 (1), 100-106, 2018
Upoważnienia: Chinese Academy of Sciences
Bounds for Message Authentication with Distortion
S Jiang
The Computer Journal 60 (4), 497-506, 2017
Upoważnienia: Chinese Academy of Sciences
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy