The SCEAS System
Navigation Menu

Search the dblp DataBase


Jun Shao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jun Shao, Qingda Yao
    A Knowledge-Based Query Optimization System. [Citation Graph (0, 0)][DBLP]
    DS-3, 1988, pp:557-566 [Conf]
  2. Lizheng Zhang, Jun Shao, Charlie Chung-Ping Chen
    Non-gaussian statistical parameter modeling for SSTA with confidence interval analysis. [Citation Graph (0, 0)][DBLP]
    ISPD, 2006, pp:33-38 [Conf]
  3. Xiaochuan Chen, Jun Shao, Zhongxu Tian
    Family Cars' Life Cycle Cost (LCC) Estimation Model Based on the Neural Network Ensemble. [Citation Graph (0, 0)][DBLP]
    PROLAMAT, 2006, pp:610-618 [Conf]
  4. Jun Shao, Brian T. Davis
    The Bit-reversal SDRAM Address Mapping. [Citation Graph (0, 0)][DBLP]
    SCOPES, 2005, pp:62-71 [Conf]
  5. Jin Wang, J. Sunil Rao, Jun Shao
    Weighted Jackknife-after-Bootstrap: A Heuristic Approach. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1997, pp:240-245 [Conf]
  6. Jun Shao, Zhenfu Cao
    A traceable threshold signature scheme with multiple signing policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:201-206 [Journal]
  7. Jun Shao, Zhenfu Cao, Rongxing Lu
    Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal]
  8. Jun Shao, Zhenfu Cao, Rongxing Lu
    An improved deniable authentication protocol. [Citation Graph (0, 0)][DBLP]
    Networks, 2006, v:48, n:4, pp:179-181 [Journal]
  9. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
    Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:299-310 [Conf]
  10. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
    Short Group Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:69-82 [Conf]
  11. Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
    An Efficient Certified Email Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:145-157 [Conf]

  12. CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. [Citation Graph (, )][DBLP]

  13. Attribute based proxy re-encryption with delegating capabilities. [Citation Graph (, )][DBLP]

  14. A Burst Scheduling Access Reordering Mechanism. [Citation Graph (, )][DBLP]

  15. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]

  16. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. [Citation Graph (, )][DBLP]

  17. Proxy Re-signature Schemes Without Random Oracles. [Citation Graph (, )][DBLP]

  18. CCA-Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]

  19. Collaborative geospatial web services for multi-dimension remote sensing data. [Citation Graph (, )][DBLP]

  20. Looking Does not Automatically Lead to Booking: Analysis of Clickstreams on a Chinese Travel Agency Website. [Citation Graph (, )][DBLP]

  21. How to Construct State Registries-Matching Undeniability with Public Security. [Citation Graph (, )][DBLP]

Search in 0.019secs, Finished in 0.020secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002