[go: up one dir, main page]

Follow
Chi Cheng
Title
Cited by
Cited by
Year
A practical privacy-preserving data aggregation (3PDA) scheme for smart grid
Y Liu, W Guo, CI Fan, L Chang, C Cheng
IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2019
3162019
Securing the Internet of Things in a quantum world
C Cheng, R Lu, A Petzoldt, T Takagi
IEEE Communications Magazine 55 (2), 116-120, 2017
2942017
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Q Wang, D Wang, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2021
1832021
A Lightweight Authenticated Communication Scheme for Smart Grid
Yining Liu, Chi Cheng*, Tianlong Gu, Tao Jiang
IEEE Sensors Journal 16 (3), 836-842, 2016
112*2016
Privacy-aware smart city: A case study in collaborative filtering recommender systems
F Zhang, VE Lee, R Jin, S Garg, KKR Choo, M Maasberg, L Dong, ...
Journal of Parallel and Distributed Computing 127, 145-159, 2019
672019
An improved authenticated group key transfer protocol based on secret sharing
Y Liu, C Cheng, J Cao, T Jiang
IEEE Transactions on Computers 62 (11), 2335-2336, 2013
652013
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Y Qin, C Cheng, X Zhang, Y Pan, L Hu, J Ding
Asiacrypt 2021, 2021
622021
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet
M Hussain, C Cheng, R Xu, M Afzal
Information Sciences 631, 328-345, 2023
612023
Security analysis and improvements on two homomorphic authentication schemes for network coding
C Cheng, J Lee, T Jiang, T Takagi
IEEE Transactions on Information Forensics and Security 11 (5), 993-1002, 2016
572016
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Y Qin, C Cheng, J Ding
24th European Symposium on Research in Computer Security (Esorics …, 2019
472019
A secure data backup scheme using multi‐factor authentication
Y Liu, Q Zhong, L Chang, Z Xia, D He, C Cheng
IET Information security 11 (5), 250-255, 2017
472017
An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding
C Cheng, T Jiang
IEEE Transactions on Computers 62 (10), 2096-2100, 2013
422013
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles–A case study of Kyber
M Shen, C Cheng, X Zhang, Q Guo, T Jiang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 89-112, 2023
392023
TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding
C Cheng, T Jiang, Q Zhang
IEEE Journal on Selected Areas in Communications 31 (9), 291-298, 2013
392013
Further analysis and improvements of a lattice-based anonymous PAKE scheme
R Ding, C Cheng, Y Qin
IEEE Systems Journal 16 (3), 5035-5043, 2022
342022
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Y Qin, C Cheng, J Ding
Eprint, 2019
332019
A privacy-preserving health data aggregation scheme
Y Liu, G Liu, C Cheng, Z Xia, J Shen
KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3852-3864, 2016
322016
Lighting the way to a smart world: Lattice-based cryptography for Internet of Things
R Xu, C Cheng, Y Qin, T Jiang
arXiv preprint arXiv:1805.04880, 2018
302018
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era
C Cheng, Y Qin, R Lu, T Jiang, T Takagi
IEEE Transactions on Smart Grid 10 (6), 6386 - 6395, 2019
272019
A novel class of 2-D binary sequences with zero correlation zone
C Cheng, T Jiang, Y Liu
IEEE Signal Processing Letters 17 (3), 301-304, 2010
192010
The system can't perform the operation now. Try again later.
Articles 1–20