The SCEAS System
Navigation Menu

Search the dblp DataBase


Shengli Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shengli Liu, Yumin Wang
    An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:294-301 [Conf]
  2. Fangguo Zhang, Shengli Liu, Kwangjo Kim
    Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:203-213 [Conf]
  3. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-Based Restrictive Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:117-124 [Conf]
  4. Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
    Identity-Based Key-Insulated Signature with Secure Key-Updates. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:13-26 [Conf]
  5. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
    Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:409-423 [Conf]
  6. Shengli Liu, Kefei Chen, Weidong Qiu
    Identity-Based Threshold Decryption Revisited. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:329-343 [Conf]
  7. Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
    Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:233-243 [Conf]
  8. Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
    Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:48-56 [Conf]
  9. Shengli Liu, Henk C. A. van Tilborg, Marten van Dijk
    A Practical Protocol for Advantage Distillation and Information Reconciliation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:30, n:1, pp:39-62 [Journal]
  10. Chenzhong Cao, Hua Yuan, Shengli Liu, Rongjin Zeng
    On Molecular Polarizability: 3. Relationship to the Ionization Potential of Haloalkanes, Amines, Alcohols, and Ethers. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 2000, v:40, n:4, pp:1010-1014 [Journal]
  11. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-based restrictive partially blind signatures and applications. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:164-171 [Journal]
  12. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
    Identity-Based Key-Insulated Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:470-480 [Conf]
  13. Yu Long, Kefei Chen, Shengli Liu
    Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:519-534 [Journal]
  14. Yu Long, Kefei Chen, Shengli Liu
    ID-based threshold decryption secure against adaptive chosen-ciphertext attack. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2007, v:33, n:3, pp:166-176 [Journal]

  15. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]

  16. A Spatial Constraint Template Problem. [Citation Graph (, )][DBLP]

  17. Identity-Based Threshold Key-Insulated Encryption without Random Oracles. [Citation Graph (, )][DBLP]

  18. Efficient CCA-Secure PKE from Identity-Based Techniques. [Citation Graph (, )][DBLP]

  19. RSA-Based Certificateless Public Key Encryption. [Citation Graph (, )][DBLP]

  20. A New-Style Domain Integrating Management of Windows and UNIX. [Citation Graph (, )][DBLP]

  21. Collecting Internet Malware Based on Client-side Honeypot. [Citation Graph (, )][DBLP]

  22. AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002