default search action
Lanxiang Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Rongsheng Cai, Lanxiang Chen, Yizhao Zhu:
Using private set intersection to achieve privacy-preserving authorization for IoT systems. J. Inf. Secur. Appl. 83: 103759 (2024) - [j28]Yizhao Zhu, Lanxiang Chen, Yi Mu:
Practical and malicious private set intersection with improved efficiency. Theor. Comput. Sci. 991: 114443 (2024) - [j27]Mengdi Hu, Lanxiang Chen, Gaolin Chen, Yi Mu, Robert H. Deng:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. IEEE Trans. Inf. Forensics Secur. 19: 6351-6363 (2024) - 2023
- [j26]Yulin Wu, Lanxiang Chen:
Structured encryption for triangle counting on graph data. Future Gener. Comput. Syst. 145: 200-210 (2023) - [j25]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. IEEE Trans. Cloud Comput. 11(1): 217-228 (2023) - [j24]Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Authenticable Data Analytics Over Encrypted Data in the Cloud. IEEE Trans. Inf. Forensics Secur. 18: 1800-1813 (2023) - [j23]Lanxiang Chen, Lingfang Zeng, Yi Mu, Leilei Chen:
Global Combination and Clustering Based Differential Privacy Mixed Data Publishing. IEEE Trans. Knowl. Data Eng. 35(11): 11437-11448 (2023) - [j22]Lanxiang Chen, Yujie Xue, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. IEEE Trans. Serv. Comput. 16(2): 1011-1022 (2023) - [j21]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. IEEE Trans. Serv. Comput. 16(3): 1664-1672 (2023) - [c13]Xiangqian Kong, Lanxiang Chen:
Enhanced Public-Key Searchable Encryption Scheme for Cloud-Based EHR Systems. HealthCom 2023: 336-341 - 2022
- [j20]Lanxiang Chen, Qingxiao Fu, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Min-Shiang Hwang:
Blockchain-based random auditor committee for integrity verification. Future Gener. Comput. Syst. 131: 183-193 (2022) - [j19]Yujie Xue, Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Structured encryption for knowledge graphs. Inf. Sci. 605: 43-70 (2022) - 2021
- [j18]Wai-Kong Lee, Lanxiang Chen, Chinchen Chang, Zhi-Qiang Yao:
Post-quantum blockchain for secure communication in IoT-based smart home services. Int. J. Embed. Syst. 14(5): 509-524 (2021) - [j17]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen:
Secure and Efficient Data Aggregation for IoT Monitoring Systems. IEEE Internet Things J. 8(10): 8056-8063 (2021) - 2020
- [j16]Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, Kim-Kwang Raymond Choo:
Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing 102(6): 1521-1545 (2020) - [j15]Mengjie Lv, Shuming Zhou, Gaolin Chen, Lanxiang Chen, Jiafei Liu, Chin-Chen Chang:
On Reliability of Multiprocessor System Based on Star Graph. IEEE Trans. Reliab. 69(2): 715-724 (2020)
2010 – 2019
- 2019
- [j14]Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, Nan Zhang:
Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95: 420-429 (2019) - [j13]Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen:
Enhanced secure data backup scheme using multi-factor authentication. IET Inf. Secur. 13(6): 649-658 (2019) - [j12]Zehui Shao, Zepeng Li, Pu Wu, Lanxiang Chen, Xiaosong Zhang:
Multi-factor combination authentication using fuzzy graph domination model. J. Intell. Fuzzy Syst. 37(4): 4979-4985 (2019) - [j11]Zehui Shao, Pu Wu, Enqiang Zhu, Lanxiang Chen:
On Metric Dimension in Some Hex Derived Networks. Sensors 19(1): 94 (2019) - [c12]Lanxiang Chen, Zhenchao Chen:
Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption. CANS 2019: 163-183 - 2018
- [j10]Wai-Kong Lee, Raphael C.-W. Phan, Bok-Min Goi, Lanxiang Chen, Xiujun Zhang, Naixue Xiong:
Parallel and High Speed Hashing in GPU for Telemedicine Applications. IEEE Access 6: 37991-38002 (2018) - [j9]Lanxiang Chen, Nan Zhang, Kuan-Ching Li, Shuibing He, Linbing Qiu:
Improving file locality in multi-keyword top-k search based on clustering. Soft Comput. 22(9): 3111-3121 (2018) - [c11]Yongsheng Rao, Pu Wu, Zehui Shao, Ramy Shaheen, Seyed Mahmoud Sheikholeslami, Lanxiang Chen:
The Rainbow Restrained Domination in Torus Network. CyberC 2018 - [c10]Zehui Shao, Pu Wu, Enqiang Zhu, Lanxiang Chen:
Metric Dimension and Robot Navigation in Specific Sensor Networks. CyberC 2018 - 2017
- [j8]Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Wenbo Shi, Nan Zhang:
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data. Soft Comput. 21(16): 4829-4841 (2017) - 2016
- [j7]Shuming Zhou, Sulin Song, Xiaoxue Yang, Lanxiang Chen:
On conditional fault tolerance and diagnosability of hierarchical cubic networks. Theor. Comput. Sci. 609: 421-433 (2016) - [c9]Lanxiang Chen, Nan Zhang:
Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud. CloudComp 2016: 173-183 - 2015
- [j6]Yong Yu, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen, Hongyu Liu:
Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52: 77-85 (2015) - 2014
- [j5]Lanxiang Chen, Gongde Guo, Zhen Peng:
A hill cipher-based remote data possession checking in cloud storage. Secur. Commun. Networks 7(3): 511-518 (2014) - [c8]Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. ISPEC 2014: 359-372 - 2013
- [j4]Lanxiang Chen, Shuming Zhou, Xinyi Huang, Li Xu:
Data dynamics for remote data possession checking in cloud storage. Comput. Electr. Eng. 39(7): 2413-2424 (2013) - [j3]Lanxiang Chen:
Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29(7): 1709-1715 (2013) - 2012
- [j2]Shuming Zhou, Lanxiang Chen, Jun-Ming Xu:
Conditional Fault Diagnosability of Dual-Cubes. Int. J. Found. Comput. Sci. 23(8): 1729-1748 (2012) - [c7]Lanxiang Chen, Zhen Peng:
The Design Principles for User-centered Remote Data Possession Checking. CIS 2012: 615-618 - 2011
- [c6]Lanxiang Chen:
Using Algebraic Signatures for Remote Data Possession Checking. CyberC 2011: 289-294 - 2010
- [j1]Lanxiang Chen, Dan Feng, Yu Zhang, Lingfang Zeng, Zhongying Niu:
Integrating FPGA/ASIC into cryptographic storage systems to avoid re-encryption. Int. J. Parallel Emergent Distributed Syst. 25(2): 105-122 (2010)
2000 – 2009
- 2009
- [c5]Lanxiang Chen, Dan Feng, Zhan Shi, Feng Zhou:
Using Session Identifiers as Authentication Tokens. ICC 2009: 1-5 - 2007
- [c4]Dan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu:
FPGA/ASIC based Cryptographic Object Store System. IAS 2007: 267-272 - [c3]Lanxiang Chen, Dan Feng, Liang Ming:
The Security Threats and Corresponding Measures to Distributed Storage Systems. APPT 2007: 551-559 - [c2]Lanxiang Chen, Dan Feng:
An Efficient Credential-Based Scheme for Cross-Domain File Sharing. CIS 2007: 614-617 - [c1]Lanxiang Chen, Dan Feng, Lingfang Zeng, Yu Zhang:
A Direction to Avoid Re-encryption in Cryptographic File Sharing. NPC 2007: 375-383
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint