The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhenhua Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yan Wang, Shuwang Lü, Zhenhua Liu
    A new asymmetric fingerprinting framework based on secret sharing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:29-40 [Conf]
  2. Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen
    An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:342-351 [Conf]
  3. Yan Wang, Shuwang Lü, Zhenhua Liu
    A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:260-268 [Conf]
  4. Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu
    Port and Address Hopping for Active Cyber-Defense. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:295-300 [Conf]

  5. Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges. [Citation Graph (, )][DBLP]

  6. Communication Effectiveness in Global Virtual Teams: A Case Study of Software Outsourcing Industry in China. [Citation Graph (, )][DBLP]

  7. Localizing Jammers in Wireless Networks. [Citation Graph (, )][DBLP]

  8. Secure Proxy Multi-signature Scheme in the Standard Model. [Citation Graph (, )][DBLP]

  9. An Asymptotically Minimal Node-Degree Topology for Load-Balanced Architectures. [Citation Graph (, )][DBLP]

  10. Zeroing-in on network metric minima for sink location determination. [Citation Graph (, )][DBLP]

Search in 0.011secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002