|
Search the dblp DataBase
Jun Shao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jun Shao, Qingda Yao
A Knowledge-Based Query Optimization System. [Citation Graph (0, 0)][DBLP] DS-3, 1988, pp:557-566 [Conf]
- Lizheng Zhang, Jun Shao, Charlie Chung-Ping Chen
Non-gaussian statistical parameter modeling for SSTA with confidence interval analysis. [Citation Graph (0, 0)][DBLP] ISPD, 2006, pp:33-38 [Conf]
- Xiaochuan Chen, Jun Shao, Zhongxu Tian
Family Cars' Life Cycle Cost (LCC) Estimation Model Based on the Neural Network Ensemble. [Citation Graph (0, 0)][DBLP] PROLAMAT, 2006, pp:610-618 [Conf]
- Jun Shao, Brian T. Davis
The Bit-reversal SDRAM Address Mapping. [Citation Graph (0, 0)][DBLP] SCOPES, 2005, pp:62-71 [Conf]
- Jin Wang, J. Sunil Rao, Jun Shao
Weighted Jackknife-after-Bootstrap: A Heuristic Approach. [Citation Graph (0, 0)][DBLP] Winter Simulation Conference, 1997, pp:240-245 [Conf]
- Jun Shao, Zhenfu Cao
A traceable threshold signature scheme with multiple signing policies. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:201-206 [Journal]
- Jun Shao, Zhenfu Cao, Rongxing Lu
Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal]
- Jun Shao, Zhenfu Cao, Rongxing Lu
An improved deniable authentication protocol. [Citation Graph (0, 0)][DBLP] Networks, 2006, v:48, n:4, pp:179-181 [Journal]
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:299-310 [Conf]
- Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
Short Group Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:69-82 [Conf]
- Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
An Efficient Certified Email Protocol. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:145-157 [Conf]
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. [Citation Graph (, )][DBLP]
Attribute based proxy re-encryption with delegating capabilities. [Citation Graph (, )][DBLP]
A Burst Scheduling Access Reordering Mechanism. [Citation Graph (, )][DBLP]
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. [Citation Graph (, )][DBLP]
Proxy Re-signature Schemes Without Random Oracles. [Citation Graph (, )][DBLP]
CCA-Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]
Collaborative geospatial web services for multi-dimension remote sensing data. [Citation Graph (, )][DBLP]
Looking Does not Automatically Lead to Booking: Analysis of Clickstreams on a Chinese Travel Agency Website. [Citation Graph (, )][DBLP]
How to Construct State Registries-Matching Undeniability with Public Security. [Citation Graph (, )][DBLP]
Search in 0.008secs, Finished in 0.009secs
|