default search action
Gongliang Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j21]Shuang Hu, Renjun Zhang, Fuqun Wang, Kefei Chen, Bin Lian, Gongliang Chen:
A sanitizable signcryption scheme with public verifiability via chameleon hash function. J. Inf. Secur. Appl. 71: 103371 (2022) - 2021
- [j20]Bin Lian, Gongliang Chen, Jialin Cui, Maode Ma:
Compact E-Cash with Efficient Coin-Tracing. IEEE Trans. Dependable Secur. Comput. 18(1): 220-234 (2021) - [c12]Qun Zhang, Shilin Wang, Gongliang Chen:
Speaker-Independent Lipreading By Disentangled Representation Learning. ICIP 2021: 2493-2497 - 2020
- [j19]Bin Lian, Gongliang Chen, Lang Wang, Jialin Cui, Ping Yu, Dake He:
A practical solution to clone problem in anonymous information system. Inf. Sci. 516: 158-191 (2020)
2010 – 2019
- 2019
- [j18]Zahid Mehmood, Anwar Ghani, Gongliang Chen, Ahmed S. Alghamdi:
Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics. IEEE Access 7: 113385-113397 (2019) - [j17]Shiyong Zhang, Gongliang Chen:
New results on the state cycles of Trivium. Des. Codes Cryptogr. 87(1): 149-162 (2019) - [j16]Bin Lian, Gongliang Chen, Jialin Cui, Dake He:
Compact E-Cash with Practical and Complete Tracing. KSII Trans. Internet Inf. Syst. 13(7): 3733-3755 (2019) - [c11]Jianjian Yu, Lei Fan, Gongliang Chen:
A New Structure of Blockchain to Simplify the Verification. BlockSys 2019: 33-46 - 2018
- [c10]Dali Zhu, Renjun Zhang, Shuang Hu, Gongliang Chen:
Public-Key Encryption with Selective Opening Security from General Assumptions. Inscrypt 2018: 510-530 - [c9]Shuang Hu, Lin Hou, Gongliang Chen, Jian Weng, Jianhua Li:
Reputation-based Distributed Knowledge Sharing System in Blockchain. MobiQuitous 2018: 476-481 - 2017
- [j15]Shiyong Zhang, Gongliang Chen:
Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems. Int. J. Distributed Sens. Networks 13(2) (2017) - [j14]ZahidMehmood, Gongliang Chen, Jianhua Li, Aiiad Albeshri:
An Untraceable ECC-Based Remote User Authentication Scheme. KSII Trans. Internet Inf. Syst. 11(3): 1742-1760 (2017) - 2016
- [j13]Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols without bilinear pairings. Inf. Sci. 367-368: 176-193 (2016) - [c8]Shiyong Zhang, Gongliang Chen, Jianhua Li:
State Recovering Attack Against Quavium. AINA Workshops 2016: 361-364 - [c7]Siye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen:
A challenge-response authentication for RFID using Enhanced-Trivium. SSIC 2016: 1-5 - [c6]Shiyong Zhang, Gongliang Chen, Jianhua Li:
Cube attack on reduced-round Enhanced-Bivium. SSIC 2016: 1-4 - 2015
- [j12]Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li:
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential. IEEE Trans. Inf. Forensics Secur. 10(3): 543-557 (2015) - 2014
- [j11]Bin Lian, Gongliang Chen, Jianhua Li:
Provably secure E-cash system with practical and efficient complete tracing. Int. J. Inf. Sec. 13(3): 271-289 (2014) - [j10]Xiao-ning Xie, Gongliang Chen, Yin Li:
Novel bit-parallel multiplier for GF(2m) defined by all-one polynomial using generalized Karatsuba algorithm. Inf. Process. Lett. 114(3): 140-146 (2014) - 2013
- [j9]Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci. China Inf. Sci. 56(8): 1-14 (2013) - [j8]Liang Ni, Gongliang Chen, Jianhua Li:
Escrowable identity-based authenticated key agreement protocol with strong security. Comput. Math. Appl. 65(9): 1339-1349 (2013) - [c5]Yue Wu, Zhangyin Qian, Michel Riguidel, Gongliang Chen:
CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS. NOF 2013: 1-4 - [i5]Shiyong Zhang, Gongliang Chen, Lei Fan:
The Algorithm of AAES. IACR Cryptol. ePrint Arch. 2013: 116 (2013) - 2012
- [j7]Yun Tian, Gongliang Chen, Jianhua Li:
A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE Commun. Lett. 16(5): 702-705 (2012) - [j6]Yun Tian, Gongliang Chen, Jianhua Li:
Quavium - A New Stream Cipher Inspired by Trivium. J. Comput. 7(5): 1278-1283 (2012) - [i4]Yin Li, Gongliang Chen, Xiao-ning Xie:
Low complexity bit-parallel GF(2m) multiplier for all-one polynomials. IACR Cryptol. ePrint Arch. 2012: 414 (2012) - 2011
- [j5]Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols. Comput. Electr. Eng. 37(2): 205-217 (2011) - [j4]Yin Li, Gongliang Chen, Jianhua Li:
An alternative class of irreducible polynomials for optimal extension fields. Des. Codes Cryptogr. 60(2): 171-182 (2011) - [j3]Yin Li, Gongliang Chen, Jianhua Li:
Speedup of bit-parallel Karatsuba multiplier in GF(2m) generated by trinomials. Inf. Process. Lett. 111(8): 390-394 (2011) - 2010
- [j2]Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen:
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme. Informatica 21(1): 117-122 (2010) - [j1]Yin Li, Gongliang Chen, Yi-yang Chen, Jianhua Li:
An extension of TYT inversion algorithm in polynomial basis. Inf. Process. Lett. 110(8-9): 300-303 (2010) - [c4]Yin Li, Gongliang Chen, Jianhua Li:
Fast Forth Power and Its Application in Inversion Computation for a Special Class of Trinomials. ICCSA (2) 2010: 14-24
2000 – 2009
- 2009
- [i3]Yun Tian, Gongliang Chen, Jianhua Li:
On the Design of Trivium. IACR Cryptol. ePrint Arch. 2009: 431 (2009) - 2008
- [i2]Xun Sun, Jianhua Li, Gongliang Chen, Shutang Yang:
Identity-Based Directed Signature Scheme from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2008: 305 (2008) - 2007
- [c3]Liming Hao, Shutang Yang, Songnian Lu, Gongliang Chen:
A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology. GLOBECOM 2007: 332-337 - 2006
- [c2]Miaomiao Zhang, Gongliang Chen, Jianhua Li:
Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. IMSCCS (2) 2006: 135-141 - [i1]Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. IACR Cryptol. ePrint Arch. 2006: 113 (2006) - 2005
- [c1]Yijuan Shi, Gongliang Chen, Jianhua Li:
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. ITCC (1) 2005: 757-761
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint