default search action
Zhe Xia
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e2]Zhe Xia, Jiageng Chen:
Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings. Lecture Notes in Computer Science 15053, Springer 2025, ISBN 978-981-97-9052-4 [contents] - 2024
- [j64]Ching-Fang Hsu, Zhe Xia, Tianshu Cheng, Lein Harn:
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. Comput. J. 67(3): 840-850 (2024) - [j63]Ze Zhang, Chingfang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, Zhe Xia, Zhuo Zhao:
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones. Comput. Networks 238: 110118 (2024) - [j62]Zhuo Zhao, Ching-Fang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu:
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. Cybersecur. 7(1): 50 (2024) - [j61]Zirui Qiao, Kui Ma, Yanwei Zhou, Qiliang Yang, Zhe Xia, Bo Yang, Mingwu Zhang:
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET. IEEE Internet Things J. 11(7): 11232-11245 (2024) - [j60]Yu Han, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang:
An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme. IEEE Internet Things J. 11(7): 12252-12265 (2024) - [j59]Ran Xu, Yanwei Zhou, Qiliang Yang, Kunwei Yang, Yu Han, Bo Yang, Zhe Xia:
An efficient and secure certificateless aggregate signature scheme. J. Syst. Archit. 147: 103030 (2024) - [j58]Yanwei Zhou, Lei Cao, Zirui Qiao, Ran Xu, Yu Han, Junsheng Xing, Bo Yang, Zhe Xia, Mingwu Zhang:
A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET. IEEE Trans. Veh. Technol. 73(9): 13526-13541 (2024) - [e1]Jiageng Chen, Zhe Xia:
Blockchain Technology and Emerging Applications - Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 577, Springer 2024, ISBN 978-3-031-60036-4 [contents] - 2023
- [j57]Chingfang Hsu, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen:
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks. Comput. J. 66(1): 208-220 (2023) - [j56]Lein Harn, Ching-Fang Hsu, Zhe Xia, Zixuan Li:
Multiple Blind Signature for e-Voting and e-Cash. Comput. J. 66(10): 2331-2338 (2023) - [j55]Yanwei Zhou, Lei Cao, Bo Yang, Zhe Xia, Chunxiang Gu, Mingwu Zhang:
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption. Comput. Stand. Interfaces 83: 103668 (2023) - [j54]Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j53]Zhe Xia, Yu Yang, Fuyou Miao:
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'. IET Inf. Secur. 17(2): 309-314 (2023) - [j52]Yanwei Zhou, Lei Cao, Zirui Qiao, Zhe Xia, Bo Yang, Mingwu Zhang, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023) - [j51]Yanwei Zhou, Ran Xu, Zirui Qiao, Bo Yang, Zhe Xia, Mingwu Zhang:
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET. IEEE Internet Things J. 10(24): 22823-22835 (2023) - [j50]Yanwei Zhou, Ran Xu, Wenzheng Zhang, Zhe Xia, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023) - [j49]Zhe Xia, Qiliang Yang, Zirui Qiao, Feng Feng:
Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud. Inf. Sci. 621: 58-73 (2023) - [j48]Mingwu Zhang, Mingxuan Yang, Gang Shen, Zhe Xia, Yuntao Wang:
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things. Inf. Sci. 623: 293-310 (2023) - [j47]Ching-Fang Hsu, Zhe Xia, Lein Harn, Man Ho Au, Jianqun Cui, Zhuo Zhao:
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Inf. Sci. 647: 119488 (2023) - [j46]Lein Harn, Chingfang Hsu, Zhe Xia, Hang Xu, Shuchang Zeng, Fengling Pang:
Simple and efficient threshold changeable secret sharing. J. Inf. Secur. Appl. 77: 103576 (2023) - [j45]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Tao Wang:
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Syst. J. 17(1): 72-82 (2023) - [j44]Yuan Xu, Yanwei Zhou, Bo Yang, Zirui Qiao, Zhaolong Wang, Zhe Xia, Mingwu Zhang:
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing. IEEE Syst. J. 17(1): 1012-1023 (2023) - [j43]Kui Ma, Yanwei Zhou, Ying Wang, Chunsheng Dong, Zhe Xia, Bo Yang, Mingwu Zhang:
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications. IEEE Syst. J. 17(4): 5636-5647 (2023) - [j42]Hua Shen, Ge Wu, Zhe Xia, Willy Susilo, Mingwu Zhang:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j41]Ching-Fang Hsu, Lein Harn, Zhe Xia, Zhuo Zhao, Hang Xu:
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT. Wirel. Pers. Commun. 129(4): 2403-2417 (2023) - [c33]Meng Zhao, Zhu Di, Zhe Xia, Jing Tian, Jianwen Xiang, Lin Jun:
OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learning. ISPA/BDCloud/SocialCom/SustainCom 2023: 1089-1096 - [c32]Yaorui He, Ting Liang, Pei Huang, Zhe Xia:
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain. BlockTEA 2023: 115-134 - [c31]Ting Liang, Yaorui He, Pei Huang, Zhe Xia:
Blockchain-Based Hierarchical Access Control with Efficient Revocation in mHealth System. BlockTEA 2023: 135-153 - [c30]Pei Huang, Yaorui He, Ting Liang, Zhe Xia:
A Password-Based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN. ML4CS 2023: 56-73 - 2022
- [j40]Lein Harn, Chingfang Hsu, Zhe Xia:
A novel threshold changeable secret sharing scheme. Frontiers Comput. Sci. 16(1): 161807 (2022) - [j39]Wenzheng Zhang, Shiyun Liu, Zhe Xia:
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control. J. Inf. Secur. Appl. 66: 103118 (2022) - [j38]Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai, Ze Zhang:
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. J. Cloud Comput. 11: 89 (2022) - [j37]Zirui Qiao, Yanwei Zhou, Bo Yang, Mingwu Zhang, Tao Wang, Zhe Xia:
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things. IEEE Syst. J. 16(3): 4719-4730 (2022) - [j36]Lein Harn, Chingfang Hsu, Zhe Xia:
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles. Veh. Commun. 34: 100457 (2022) - [c29]Zhe Xia, Shiyun Liu, Yichen Huang, Hua Shen, Mingwu Zhang:
A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks. EISA 2022: 21-36 - [c28]Longmin Deng, Dongdong Zhao, Junwei Zhou, Zhe Xia, Jianwen Xiang:
CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table. QRS 2022: 527-536 - 2021
- [j35]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang:
Novel Public-Key Encryption with Continuous Leakage Amplification. Comput. J. 64(8): 1163-1177 (2021) - [j34]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j33]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Zhuo Zhao:
Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks. IET Commun. 15(2): 328-336 (2021) - [j32]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang, Quanrun Li:
Design of ideal secret sharing based on new results on representable quadripartite matroids. J. Inf. Secur. Appl. 58: 102724 (2021) - [j31]Lein Harn, Zhe Xia, Chingfang Hsu:
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks. Peer-to-Peer Netw. Appl. 14(2): 722-728 (2021) - [j30]Mingwu Zhang, Yu Chen, Zhe Xia, Jiangyi Du, Willy Susilo:
PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations. IEEE Syst. J. 15(1): 759-770 (2021) - [j29]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight and flexible key distribution schemes for secure group communications. Wirel. Networks 27(1): 129-136 (2021) - [c27]Zhe Xia, Yifeng Shu, Hua Shen, Mingwu Zhang:
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks. CSS 2021: 16-35 - [c26]Junwei Zhou, Delong Shang, Huile Lang, Guodong Ye, Zhe Xia:
Face Template Protection through Residual Learning Based Error-Correcting Codes. ICCCV 2021: 112-118 - [i1]Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng:
Two Efficient Regulatory Confi dential Transaction Schemes. IACR Cryptol. ePrint Arch. 2021: 329 (2021) - 2020
- [j28]Qi Cheng, Ching-Fang Hsu, Zhe Xia, Lein Harn:
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN. IEEE Access 8: 71833-71839 (2020) - [j27]Chingfang Hsu, Lein Harn, Zhe Xia, Maoyuan Zhang:
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks. IEEE Access 8: 203965-203971 (2020) - [j26]Yanwei Zhou, Bo Yang, Tao Wang, Zhe Xia, Hong-xia Hou:
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings. Comput. J. 63(4): 508-524 (2020) - [j25]Lein Harn, Chingfang Hsu, Zhe Xia:
Lightweight group key distribution schemes based on pre-shared pairwise keys. IET Commun. 14(13): 2162-2165 (2020) - [j24]Yinxia Sun, Futai Zhang, Anmin Fu, Zhe Xia:
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution. Int. J. Found. Comput. Sci. 31(2): 175-191 (2020) - [j23]Meijuan Huang, Bo Yang, Yi Zhao, Xin Wang, Yanwei Zhou, Zhe Xia:
A generic construction of CCA-secure deterministic encryption. Inf. Process. Lett. 154 (2020) - [j22]Lein Harn, Zhe Xia, Ching-Fang Hsu, Yining Liu:
Secret sharing with secure secret reconstruction. Inf. Sci. 519: 1-8 (2020) - [j21]Hua Shen, Yajing Liu, Zhe Xia, Mingwu Zhang:
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf. Sci. 526: 289-300 (2020) - [j20]Zhe Xia, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. Secur. Commun. Networks 2020: 6183861:1-6183861:8 (2020) - [j19]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [c25]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641 - [c24]Junwei Zhou, Ke Shu, Dongdong Zhao, Zhe Xia:
Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features. ICMLT 2020: 79-85 - [c23]Min Xiao, Zhe Xia:
Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security. SpaCCS Workshops 2020: 533-544
2010 – 2019
- 2019
- [j18]Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu:
Privacy-preserving raw data collection without a trusted authority for IoT. Comput. Networks 148: 340-348 (2019) - [j17]Qiqi Lai, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen, Zhenlong Li:
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model. Int. J. Found. Comput. Sci. 30(4): 589-606 (2019) - [j16]Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou:
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage. Frontiers Inf. Technol. Electron. Eng. 20(6): 787-800 (2019) - [j15]Yanwei Zhou, Bo Yang, Zhe Xia, Yi Mu, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j14]Tao Wang, Bo Yang, Hongyu Liu, Yong Yu, Guoyong Qiu, Zhe Xia:
An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13): 4939-4953 (2019) - [j13]Zhe Xia, Yi-Ning Liu, Ching-Fang Hsu, Chin-Chen Chang:
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials. Symmetry 11(1): 88 (2019) - [c22]Wenwen Yan, Anmin Fu, Yi Mu, Zhe Xia, Shui Yu, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c21]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c20]Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang:
Cryptanalysis of Raindrop and FBC. NSS 2019: 536-551 - [c19]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - [c18]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang:
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features. SocialSec 2019: 57-73 - 2018
- [j12]Mingwu Zhang, Jiajun Huang, Hua Shen, Zhe Xia, Yong Ding:
Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments. IEEE Access 6: 43936-43945 (2018) - [j11]Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j10]Zhe Xia, Zheng Tong, Min Xiao, Chin-Chen Chang:
Framework for practical and receipt-free remote voting. IET Inf. Secur. 12(4): 326-331 (2018) - [j9]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [j8]Xin Wang, Bo Yang, Zhe Xia, Yanqi Zhao, Huifang Yu:
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. Secur. Commun. Networks 2018: 6174830:1-6174830:13 (2018) - [c17]Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. ACISP 2018: 83-100 - [c16]Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu:
Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks. ISPEC 2018: 506-518 - [c15]Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. ISPEC 2018: 595-609 - 2017
- [j7]Yi-Ning Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng:
A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5): 250-255 (2017) - [j6]Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. J. Inf. Secur. Appl. 34: 205-206 (2017) - [j5]Lein Harn, Ching-Fang Hsu, Zhe Xia, Junwei Zhou:
How to Share Secret Efficiently over Networks. Secur. Commun. Networks 2017: 5437403:1-5437403:6 (2017) - [c14]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Xuzhe Huang, Yidan Zhang:
Detection and classification of malicious patterns in network traffic using Benford's law. APSIPA 2017: 864-872 - 2016
- [j4]Hanbing Yao, Nana Xing, Junwei Zhou, Zhe Xia:
Secure Index for Resource-Constraint Mobile Devices in Cloud Computing. IEEE Access 4: 9119-9128 (2016) - [j3]Ning Wang, Zhe Xia, Jianwen Xiang:
Editorial: Special issue on security and dependability of internet of things. J. Inf. Secur. Appl. 31: 1-2 (2016) - [j2]Yi-Ning Liu, Gao Liu, Chi Cheng, Zhe Xia, Jian Shen:
A Privacy-Preserving Health Data Aggregation Scheme. KSII Trans. Internet Inf. Syst. 10(8): 3852-3864 (2016) - [c13]Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He:
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. ACISP (2) 2016: 73-86 - 2014
- [c12]Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia:
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. NSS 2014: 335-348 - 2013
- [c11]James Heather, Chris Culnane, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Solving the Discrete Logarithm Problem for Packing Candidate Preferences. CD-ARES Workshops 2013: 209-221 - [c10]Morgan Llewellyn, Steve A. Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Sriramkrishnan Srinivasan:
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. EVT/WOTE 2013 - 2012
- [c9]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c8]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [c7]Steve A. Schneider, Morgan Llewellyn, Chris Culnane, James Heather, Sriramkrishnan Srinivasan, Zhe Xia:
Focus group views on Prêt à Voter 1.0. REVOTE 2011: 56-65 - [c6]Chris Culnane, David Bismark, James Heather, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Authentication Codes. EVT/WOTE 2011 - [c5]Steve A. Schneider, Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Zhe Xia:
Prêt á Voter with Write-Ins. VoteID 2011: 174-189 - 2010
- [c4]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114
2000 – 2009
- 2009
- [j1]Peter Y. A. Ryan, David Bismark, James Heather, Steve A. Schneider, Zhe Xia:
Prêt à voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4(4): 662-673 (2009) - [c3]David Bismark, James Heather, Roger M. A. Peel, Steve A. Schneider, Zhe Xia, Peter Y. A. Ryan:
Experiences Gained from the first Prêt à Voter Implementation. REVOTE 2009: 19-28 - 2008
- [c2]Zhe Xia, Steve A. Schneider, James Heather, Jacques Traoré:
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008 - 2007
- [c1]Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia:
Threat Analysis of a Practical Voting Scheme with Receipts. VOTE-ID 2007: 156-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint