The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shaoquan Jiang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shaoquan Jiang
    Efficient Primitives from Exponentiation in Zp. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:259-270 [Conf]
  2. Shaoquan Jiang, Guang Gong
    Multi-service Oriented Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:1-11 [Conf]
  3. Shaoquan Jiang, Guang Gong
    A Round and Communication Efficient Secure Ranking Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:350-364 [Conf]
  4. Shaoquan Jiang, Guang Gong
    Efficient Authenticators with Application to Key Exchange. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:81-91 [Conf]
  5. Shaoquan Jiang, Guang Gong
    Password Based Key Exchange with Mutual Authentication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:267-279 [Conf]
  6. Shaoquan Jiang, Dengguo Feng, Sihan Qing
    Analysis and Design of E-voting Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:281-290 [Conf]
  7. Shaoquan Jiang, Zongduo Dai, Guang Gong
    On interleaved sequences over finite fields. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2002, v:252, n:1-3, pp:161-178 [Journal]
  8. Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong
    Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:11, pp:2911-2915 [Journal]
  9. Shaoquan Jiang, Zongduo Dai, Kyoki Imamura
    Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting kappa; symbols within one period. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:1174-1177 [Journal]

  10. Non-interactive conference key distribution and its applications. [Citation Graph (, )][DBLP]


  11. Deniable Authentication on the Internet. [Citation Graph (, )][DBLP]


  12. Plaintext-Awareness of Hybrid Encryption. [Citation Graph (, )][DBLP]


  13. Corruption-Localizing Hashing. [Citation Graph (, )][DBLP]


  14. An Efficient Deniable Key Exchange Protocol (Extended Abstract). [Citation Graph (, )][DBLP]


  15. Optimal Secure Message Transmission by Public Discussion [Citation Graph (, )][DBLP]


  16. Persistent Asymmetric Password-Based Key Exchange [Citation Graph (, )][DBLP]


  17. More efficient DDH pseudorandom generators. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002