Shaoquan Jiang
Shaoquan Jiang
Verified email at uwindsor.ca - Homepage
Title
Cited by
Cited by
Year
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
992004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
612012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
International Conference on Financial Cryptography and Data Security, 47-52, 2008
222008
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
222000
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
202012
On optimal secure message transmission by public discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE transactions on information theory 57 (1), 572-585, 2010
202010
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
182005
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
172014
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
152003
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference, 479-491, 2011
132011
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
132004
Deniable authentication on the internet
S Jiang
International Conference on Information Security and Cryptology, 298-312, 2007
122007
Immunochemistry
CA King
Nature 246 (5427), 49-49, 1973
121973
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
112018
More efficient DDH pseudorandom generators
H Shi, S Jiang, Z Qin
Designs, Codes and Cryptography 55 (1), 45-64, 2010
92010
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
82015
Improved algorithm of Louvain communities dipartition
WU Zu-feng, W Peng-fei, QIN Zhi-guang, J Shao-quan
电子科技大学学报 42 (1), 105-108, 2013
82013
Message Authentication Code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
72015
Timed encryption with application to deniable key exchange
S Jiang
Theoretical Computer Science 560, 172-189, 2014
72014
Corruption-localizing hashing
G Di Crescenzo, S Jiang, R Safavi-Naini
European Symposium on Research in Computer Security, 489-504, 2009
72009
The system can't perform the operation now. Try again later.
Articles 1–20