Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search
Xu, Lei, Xu, Chengzhi, Liu, Jianghua, Dou, Bennian, Jin, Xiaocan
Published in Wireless networks (01.07.2024)
Published in Wireless networks (01.07.2024)
Get full text
Journal Article
Code-based Sequential Aggregate Signature Scheme
Dou, Bennian, Xu, Lei, Yu, Xiaoling, Mei, Lin, Zuo, Cong
Published in Computers, materials & continua (2022)
Published in Computers, materials & continua (2022)
Get full text
Journal Article
Searchable Encryption with Access Control on Keywords in Multi-User Setting
Li, Lei, Xu, Chungen, Yu, Xiaoling, Dou, Bennian, Zuo, Cong
Published in Journal of cyber security (Henderson, Nev.) (2020)
Published in Journal of cyber security (Henderson, Nev.) (2020)
Get full text
Journal Article
Identity-Based Sequential Aggregate Signature from RSA
Bennian Dou, Hong Zhang, Chungen Xu, Mu Han
Published in 2009 Fourth ChinaGrid Annual Conference (01.08.2009)
Published in 2009 Fourth ChinaGrid Annual Conference (01.08.2009)
Get full text
Conference Proceeding
Cyclic codes over R=Fp+uFp+⋯+uk−1Fp with length psn
Han, Mu, Ye, Youpei, Zhu, Shixin, Xu, Chungen, Dou, Bennian
Published in Information sciences (15.02.2011)
Published in Information sciences (15.02.2011)
Get full text
Journal Article
Cyclic codes over R = F p + uF p +a<[macr]+ u ka degree 1 F p with length p s n
Han, Mu, Ye, Youpei, Zhu, Shixin, Xu, Chungen, Dou, Bennian
Published in Information sciences (15.02.2011)
Published in Information sciences (15.02.2011)
Get full text
Journal Article
Cyclic codes over R = F p + uF p +⋯+ u k−1 F p with length p s n
Han, Mu, Ye, Youpei, Zhu, Shixin, Xu, Chungen, Dou, Bennian
Published in Information sciences (2011)
Published in Information sciences (2011)
Get full text
Journal Article
Authenticated Session Key Distribution Protocol with Zero-Knowledge
Yang, Yan Jiong, Dou, Ben Nian, Xu, Chun Gen
Published in Applied Mechanics and Materials (01.01.2011)
Published in Applied Mechanics and Materials (01.01.2011)
Get full text
Journal Article
Private data verification method based on subset
MEI LIN, DOU BENNIAN, XU CHENGZHI, KIM HYO CHAN, XU LEI, LIU JIANGHUA, XU CHUNGEN
Year of Publication 11.11.2022
Get full text
Year of Publication 11.11.2022
Patent