1. Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Multi-Proxy Multi-Signature Binding Positioning Protocol, The 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2015), August 10-12, 2015, Qufu, Shandong, China
2. Fengying Li and Qingshui Xue, Research on community resident autonomous learning based on virtual learning, EEE’15 (The 2015 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government), July 27-30, 2015, Las Vegas, USA
3. Qingshui Xue, Fengying Li and Zhenfu Cao, Proxy Multi-Signature Binding Positioning Protocol, in the Proceedings of IEEE/CIC ICCC 2014 (Symposium on Privacy and Security in Commutations), IEEE Xplore, 13-15 October, 2014, Shanghai, China, pp. 166-170
4. Qingshui Xue, Fengying Li and Zhenfu Cao, Threshold proxy signature based on position, SECURWARE 2014 (The Eighth International Conference on Emerging Security Information, Systems and Technologies), November 16-20, 2014, Lisbon, Portugal. pp. 151-156
5. Qingshui Xue, Fengying Li and Zhenfu Cao, positioning-protocol-based digital signature, WICON 2014 (The 8th International Wireless Internet Conference - Symposium on Wireless and Vehicular Communication), November 13-14, 2014 Lisbon, Portugal
6. Fengying Li, Qingshui Xue and Haixia Li, Research on energy expenditure and strategy of MOOC, Modern Distance Education Research, 2014 (in Chinese)
7. Fengying Li, Qingshui Xue, Jianping Xu, Fuzzy-Identity-Authentication-Based MOOC Online Examination Learner Identity Authentication Pattern and Solution, MEHS 2014 (International Symposium Modern on Education and Human Sciences), 25rd-26th,October,2014, Zhangjiajie,China
8. Fengying Li, Jianping Xu, Qingshui Xue, Research on Authentication Technology Based on Proxy in Mobile Learning, MEHS 2014 (International Symposium Modern on Education and Human Sciences), 25rd-26th,October,2014, Zhangjiajie,China
9. Li Fengying, Qi Yuxin & Xue Qingshui. Research on Security of Virtual Learning Community Based on Big Data:Collaboration Learning System Based on Threshold Proxy Signature, Journal of Distance Education, 76-82, 2013.4
10. Li Fengying, Xue Qingshui & Zhang Jiping. The Model and Solution of Privacy Protection for Mobile Learning Based on Authentication, Modern Distance Education Research, 72-77, 2013.3
11. Li Fengying, Xue Qingshui & Wu Weimin, Collaboration learning research based on threshold proxy signature, e-Education Research, 66-70, 2013.10
12. Lin Juan, Xue Qingshui & Cao Zhenfu. Proxy-based Immediate Attribute Revocation KP-ABE, Computer Engineering, 2013
13. Qingshui Xue, Fengying Li and Zhenfu Cao, Bilinear-pairings Based Designated-verifier Multi-proxy Multi-signature Scheme, ICCASM 2010 (2010 International Conference on Computer Application and System Modeling), Taiyuan, China. October 22-24, 2010
14. Qingshui Xue, Fengying Li and Zhenfu Cao, Some Basic Principles for Proxy Signature Schemes Based on DLP. http://www.paper.edu.cn, 2010
15. Qingshui Xue, Fengying Li and Zhenfu Cao, Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem. http://www.paper.edu.cn, 2010
16. Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009,[WORLDCOMP’09 (The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing)],Las Vegas, Nevada, USA, July 13-16, 2009
17. Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. An ECDLP-based Threshold Proxy Signature Scheme Using Self-certified Public Key System, MobiSec 2009, June 3-5, 2009, Turin, Italy, (LNICST), 2009, pp. 58-70
18. Qingshui Xue and Zhenfu Cao, Factoring Based Proxy Signature Schemes, , Journal of Computational and Applied Mathematics, 195( 2006 ), pp. 229-241
19. Qingshui Xue and Zhenfu Cao, Security analysis and improvement of some threshold proxy signature schemes,Journal of Communication and Computer, Vol 2, No 1, pp.17-25, 2005
20. Qingshui Xue, Zhenfu Cao and Haifeng Qian, A generalized proxy signature scheme based on the RSA cryptosystem, PDCAT ‘04 (The Fifth International Conference on Parallel and Distributed Computing, Applications and Technologies), LNCS 3320, 8-10 December, 2004, Singapore, pp. 662-665
21. Qingshui Xue and Zhenfu Cao, A nonrepudiable multi-proxy multi-signature scheme, IEEE SympoTIC’04 Proceeding (Symposium on Trends in Communications), Bratislava, Slovakia, 24-26 October 2004, pp. 102-105
22. Qingshui Xue, Zhenfu Cao and Haifeng Qian, Cryptanalysis of New Digital Nominative Proxy Signature Schemes for Mobile Communication, 2004 Global Mobile Congress, Shanghai, Oct.11-13, 2004, DELSON GROUP, pp. 302-306
23. Qingshui Xue and Zhenfu Cao, A New Proxy Blind Signature Scheme with Warrant, 2004 IEEE Conference on Cybernetics and Intelligent Systems (CIS and RAM 2004), December 1 to 3, 2004, Singapore
24. Qingshui Xue, Zhenfu Cao and Feilong Tang, An improved threshold proxy signature scheme based on the RSA cryptosystem, PDPTA’04 (The 2004 International Conference on Parallel and Distributed Processing Techniques and Applications), Las Vegas, Nevada, June 21 - 24, 2004, CSREA Press, Volume 2, pp. 901-907
25. Qingshui Xue and Zhenfu Cao, A threshold proxy signature scheme using self-certified public keys, ISPA’2004(Second International Symposium on Parallel and Distributed Processing and Applications), LNCS, Hong Kong, China, 13-15 Dec. 2004
26. Qingshui Xue and Zhenfu Cao, Improvement of Multi-proxy Signature Scheme, The 4th International Conference on Computer and Information Technology (IEEE CIT2004), Wuhan, China, 14-16 September 2004, IEEE Computer Society Press
27. Qingshui Xue, Zhenfu Cao, and Haifeng Qian, Bilinear Pairings-based Threshold Proxy Signature Schemes with Known Signers,DCABES 2004 (2004 International Symposium on Distributed Computing and Application to Business, Engineering and science),Wuhan University of Technology Press ,Wuhan, China, Volume 2, pp. 950-955
28. Qingshui Xue and Zhenfu Cao, Security analysis and improvement of some threshold proxy signature schemes,DCABES 2004 (2004 International Symposium on Distributed Computing and Application to Business, Engineering and science),Wuhan University of Technology Press ,Wuhan, China, Volume 2, pp. 944-949
29. Qingshui Xue, Zhenfu Cao and Haifeng Qian, Generalization of Proxy Signature Based on the RSA Cryptosystem, ISCI2004 (International Symposium on Computing and Information), August 15-18, 2004, Zhuhai, Guangdong, China, Volume 2, pp. 913-917
30. Qingshui Xue and Zhenfu Cao, Factoring Based Proxy Signature Schemes, ISCI2004 (International Symposium on Computing and Information), August 15-18, 2004, Zhuhai, Guangdong, China, Volume 2, pp. 918-922
31. Fengying Li and Qingshui Xue, Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem, EEEE 2010 (2010 Second International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government), Sep. 4-5, Luoyang, China, 2010, pp. 423-426
32. Fengying Li and Qingshui Xue, Online Oral Defense System Based on Threshold Proxy Signature, EEEE 2010 (2010 Second International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government), Sep. 4-5, Luoyang, China, 2010, pp. 427-431
33. Fengying Li, Qingshui Xue and Zhenfu Cao, Some Basic Principles for Proxy Signature Schemes Based on ECDLP, CollaborateCom 2010 (The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing), Chicago, Illinois, USA, October 9-12, 2010
34. Haifeng Qian, Zhenfu Cao and Qingshui Xue, Threshold proxy signature scheme from bilinear pairings, Science in China Series F-Information Sciences, pp.612-622, 2004
35. Haifeng Qian, Zhenfu Cao and Qingshui Xue, Threshold proxy signature scheme from bilinear pairings, science in China Series E-Technological sciences 34(6),pp. 711-720, 2004 (in Chinese)
36. Feilong Tang, Minglu Li, Jian Cao and Qingshui Xue, A Model That Coordinates Short-lived and Long-lived Transactions for Web Services, PDPTA‘04 (The 2004 International Conference on Parallel and Distributed Processing Techniques and Applications), Las Vegas, Nevada, June 21 - 24, 2004, CSREA Press, Volume 2, pp. 908-914.
37. Fengying Li, Qingshui Xue, Jiping Zhang and Zhenfu Cao, About the Security for HW Threshold Proxy Signature Scheme with self-certified Public Key System, CHINACOM 2009 (Int‘l Conference on Communications and Networking), August 26-28, 2009, Xi’an, China
38. Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao. A Model of Bilinear-pairings Based Designated-verifier Proxy Signature Scheme, The Third International Workshop on Trusted Collaboration, 2008 (TrustCol-2008), Orlando, FL, USA, November 13-16, LNICST, 2008, pp. 416-424
39. Fengying Li, Qingshui Xue, Zhenfu Cao. Bilinear-pairings Based Designated-verifier Multi-proxy Signatue Scheme, IT Revolutions 2008, Venice, Italy, December 17-19, IEEE Xplore Publishing, 2008
40. Fengying Li, Qingshui Xue, Zhenfu Cao. Crypanalysis of Kuo and Chen‘s Threshold Proxy Signature Scheme Based on the RSA. (ITNG 2007): 2-4 Apr. 2007, Las Vegas, Nevada, USA., pp. 815-818
41. Haifeng Qian; Zhenfu Cao; Lichen Wang; Qingshui Xue. Efficient non-interactive deniable authentication protocols,CIT 2005 (The Fifth International Conference on Computer and Information Technology). 21-23 Sept. 2005, Shanghai, China IEEE Computer Society, pp. 673 – 679
42. Zhenfu Cao, Qingshui Xue, Strengthen research on cryptology and improve security consciousness, Computer Education, 2005 (in Chinese)
43. Haifeng Qian, Zhenfu Cao and Qingshui Xue, Efficient Pairing-Based Threshold proxy Signature Scheme with Known Signers, Informatica, Vol. 16, No. 2, pp. 261-274, 2005