Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Jinyong
    Last name: Chang
    DBLP: 151/7156
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 16  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang.
    KDM Security for Identity-Based Encryption: Constructions and Separations.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue.
    Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue.
    Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.
    Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue.
    Separations in circular security for arbitrary length key cycles, revisited.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Journal article
    Jinyong Chang, Rui Xue.
    A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding.
    JCM 2015, Volume 10 (0) 2015
    Conference paper
    Jinyong Chang, Rui Xue.
    Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Fei Tang, Hongda Li, Jinyong Chang.
    Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Journal article
    Fei Tang, Hongda Li, Jinyong Chang.
    Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Journal article
    Jinyong Chang, Rui Xue, Anling Zhang.
    The KDM-CCA Security of the Kurosawa-Desmedt Scheme.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Bei Liang, Hongda Li, Jinyong Chang.
    The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
    Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings 2015 (0) 2015
    Show item 1 to 10 of 16  

    Your query returned 16 matches in the database.