Follow
Xiaolei Dong
Xiaolei Dong
Professor of Computer Science, Shanghai Jiao Tong University
No verified email
Title
Cited by
Cited by
Year
Security and Privacy for Storage and Computation in Cloud Computing
L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos
Information Sciences, 2013
7312013
< formula formulatype=
X Dong, L Wei, H Zhu, Z Cao, L Wang
Vehicular Technology, IEEE Transactions on 60 (2), 580-591, 2011
172*2011
Fuzzy identity based signature with applications to biometric authentication
P Yang, Z Cao, X Dong
Computers & Electrical Engineering 37 (4), 532-540, 2011
1442011
New public key cryptosystems using polynomials over non-commutative rings
Z Cao, X Dong, L Wang
Preprint, 35, 2007
622007
EP2DF: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks
X Dong, L Wei, H Zhu, Z Cao, L Wang
IEEE transactions on vehicular technology 60 (2), 580-591, 2011
51*2011
Identity-based signature scheme based on quadratic residues
ZC Chai, ZF Cao, XL Dong
Science in China Series F: Information Sciences 50 (3), 373-380, 2007
382007
Threshold proxy re-signature
P Yang, Z Cao, X Dong
Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE …, 2008
342008
An application of a lower bound for linear forms in two logarithms to the Terai-Jesmanowicz conjecture
Z Cao, X Dong
Acta Arithmetica 110, 153-164, 2003
342003
AN AUTHENTICATION METHOD, SYSTEM, SERVER AND USER NODE
Z Cao, X Dong, R LU, J Wei
EP Patent 2,093,927, 2009
27*2009
Authentication method, system, server, and user node
Z Cao, X Dong, R Lu, J Wei
US Patent App. 12/497,930, 2009
27*2009
AN AUTHENTICATION METHOD, SYSTEM, SERVER AND USER NODE
Z CAO, X DONG, R LU, J WEI
WO Patent 2,009,059,535, 2009
27*2009
On the Terai-Jesmanowicz conjecture
ZF Cao, XL Dong
Publ. Math. Debrecen 61 (3-4), 253-265, 2002
262002
The Diophantine equation
Z Cao, X Dong
Proceedings of the Japan Academy, Series A, Mathematical Sciences 77 (1), 1-4, 2001
252001
The Terai–Jesmanowicz conjecture concerning the equation ax+ by= cz
XL Dong, ZF Cao
Chinese Math. Ann 21, 709-714, 2000
24*2000
On Terai's conjecture
Z Cao, X Dong
Proceedings of the Japan Academy, Series A, Mathematical Sciences 74 (8 …, 1998
221998
Identity based signature scheme based on cubic residues
DS Xing, ZF Cao, XL Dong
Science China Information Sciences 54 (10), 2001-2012, 2011
202011
Designing efficient proxy signature schemes for mobile communication
RX Lu, XL Dong, ZF Cao
Science in China Series F: Information Sciences 51 (2), 183-195, 2008
202008
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks
P Yang, Z Cao, X Dong, TA Zia
Communications Letters, IEEE 15 (11), 1205-1207, 2011
192011
A new conjecture concerning the Diophantine equation
Z Cao, X Dong, Z Li
Proceedings of the Japan Academy, Series A, Mathematical Sciences 78 (10 …, 2002
182002
Designated verifier proxy signature scheme from bilinear pairings
R Lu, Z Cao, X Dong, R Su
Computer and Computational Sciences, 2006. IMSCCS'06. First International …, 2006
162006
The system can't perform the operation now. Try again later.
Articles 1–20