Follow
haipeng qu
Title
Cited by
Cited by
Year
Certificateless public key encryption with equality test
H Qu, Z Yan, XJ Lin, Q Zhang, L Sun
Information Sciences 462, 76-92, 2018
792018
A typical noisy covert channel in the IP protocol
H Qu, P Su, D Feng
38th Annual 2004 International Carnahan Conference on Security Technology …, 2004
502004
Generic construction of public key encryption, identity-based encryption and signcryption with equality test
XJ Lin, L Sun, H Qu
Information Sciences 453, 111-126, 2018
462018
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications
XJ Lin, L Sun, H Qu
computers & security 48, 142-149, 2015
412015
Public key encryption supporting equality test and flexible authorization without bilinear pairings
XJ Lin, L Sun, H Qu, X Zhang
Computer Communications 170, 190-199, 2021
392021
An efficient RSA-based certificateless public key encryption scheme
XJ Lin, L Sun, H Qu
Discrete Applied Mathematics 241, 39-47, 2018
302018
Identity-based encryption with equality test and datestamp-based authorization mechanism
XJ Lin, Q Wang, L Sun, H Qu
Theoretical Computer Science 861, 117-132, 2021
222021
A passive client-based approach to detect evil twin attacks
Q Lu, H Qu, Y Zhuang, XJ Lin, Y Zhu, Y Liu
2017 IEEE Trustcom/BigDataSE/ICESS, 233-239, 2017
202017
UD-TDMA: A distributed TDMA protocol for underwater acoustic sensor network
Z Li, Z Guo, H Qu, F Hong, P Chen, M Yang
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
192009
Sensitivity Approach of Suboptional Control for a Class of Nonlinear Systems
T Gongyou, Q Haipeng, G Yanming
JOURNAL-OCEAN UNIVERSITY OF QINGDAO 32 (4), 615-620, 2002
182002
Exploiting temperature-varied ECU fingerprints for source identification in in-vehicle network intrusion detection
M Tian, R Jiang, C Xing, H Qu, Q Lu, X Zhou
2019 IEEE 38th International Performance Computing and Communications …, 2019
162019
SLFAT: client-side evil twin detection approach based on arrival time of special length frames
Q Lu, H Qu, Y Ouyang, J Zhang
Security and Communication Networks 2019, 2019
162019
Cryptanalysis of a privacy-preserving smart metering scheme using linkable anonymous credential
H Qu, P Shang, XJ Lin, L Sun
Cryptology ePrint Archive, 2015
142015
Cryptanalysis of a pairing-free certificateless signcryption scheme
XJ Lin, L Sun, H Qu, D Liu
The Computer Journal 61 (4), 539-544, 2018
132018
Real-time risk assessment based on hidden Markov model and security configuration
D Yu-Ting, Q Hai-Peng, T Xi-Long
2014 International Conference on Information Science, Electronics and …, 2014
122014
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks
Q Lu, R Jiang, Y Ouyang, H Qu, J Zhang
Computers & Security 88, 101618, 2020
112020
Advanced temperature-varied ecu fingerprints for source identification and intrusion detection in controller area networks
M Tian, R Jiang, H Qu, Q Lu, X Zhou
Security and Communication Networks 2020, 1-17, 2020
102020
AFLTurbo: Speed up path discovery for greybox fuzzing
L Sun, X Li, H Qu, X Zhang
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
102020
On the security of a certificateless signcryption with known session-specific temporary information security in the standard model
XJ Lin, L Sun, Z Yan, X Zhang, H Qu
The Computer Journal 63 (8), 1259-1262, 2020
102020
Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames
Q Lu, H Qu, Y Zhuang, XJ Lin, Y Ouyang
IEICE TRANSACTIONS on Information and Systems 101 (10), 2465-2473, 2018
102018
The system can't perform the operation now. Try again later.
Articles 1–20