The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shujun Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elise de Doncker, Shujun Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa
    Regularization and Extrapolation Methods for Infrared Divergent Loop Integrals. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2005, pp:165-171 [Conf]
  2. Shujun Li, Elise de Doncker, Karlis Kaugars
    On Iterated Numerical Integration. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2005, pp:123-130 [Conf]
  3. Shujun Li, Elise de Doncker, Karlis Kaugars, Haisen S. Li
    A Fast Integration Method and Its Application in a Medical Physics Problem. [Citation Graph (0, 0)][DBLP]
    ICCSA (5), 2006, pp:789-797 [Conf]
  4. Shujun Li, Xuan Zheng
    On the security of an image encryption method. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:925-928 [Conf]
  5. Shujun Li, Li Qi, Li Wenmin, Xuanqin Mou, Cai Yuanlong
    Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:205-221 [Conf]
  6. Shujun Li, Xuanqin Mou, Cai Yuanlong
    Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:316-329 [Conf]
  7. Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen
    Cryptanalysis of a multistage encryption system. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:880-883 [Conf]
  8. Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
    Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2005, pp:630-636 [Conf]
  9. Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
    Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:418-425 [Conf]
  10. Gonzalo Álvarez, Shujun Li
    Breaking network security based on synchronized chaos. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:16, pp:1679-1681 [Journal]
  11. Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou, Cai Yuanlong
    Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  12. Shujun Li, Guanrong Chen, Xuanqin Mou
    On the Security of the Yi-Tan-Siew Chaos-Based Cipher [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  13. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:2, pp:253-258 [Journal]
  14. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1789- [Journal]
  15. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  16. Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, Kwok-Tung Lo
    On the Design of Perceptual MPEG-Video Encryption Algorithms [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  17. Shujun Li, Guanrong Chen, Gonzalo Álvarez
    Return-Map Cryptanalysis Revisited [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  18. Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen
    Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  19. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo
    Cryptanalysis of a chaotic block cipher with external key and its improved version [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  20. Shujun Li, Gonzalo Álvarez, Zhong Li, Wolfgang A. Halang
    Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  21. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang
    Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  22. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez
    Cryptanalysis of a computer cryptography scheme based on a filter bank [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  23. Chengqing Li, Shujun Li, Xiaofeng Liao, Guanrong Chen
    Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  24. Shujun Li, Kwok-Tung Lo
    Security problems with improper implementations of improved FEA-M. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:5, pp:791-794 [Journal]
  25. Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, Kwok-Tung Lo
    On the Design of Perceptual MPEG-Video Encryption Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2007, v:17, n:2, pp:214-223 [Journal]

  26. On the Security of PAS (Predicate-Based Authentication Service). [Citation Graph (, )][DBLP]


  27. hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. [Citation Graph (, )][DBLP]


  28. On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. [Citation Graph (, )][DBLP]


  29. The Visualization of 3D Terrain Based on VRML. [Citation Graph (, )][DBLP]


  30. Interdisciplinary applications of mathematical modeling. [Citation Graph (, )][DBLP]


  31. A method for automatic routing based on comprehensive evaluation on limiting conditions of maneuverability. [Citation Graph (, )][DBLP]


  32. Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [Citation Graph (, )][DBLP]


  33. Security Problems with Improper Implementations of Improved FEA-M [Citation Graph (, )][DBLP]


  34. Permutation Polynomials modulo m [Citation Graph (, )][DBLP]


  35. Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence [Citation Graph (, )][DBLP]


  36. Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps [Citation Graph (, )][DBLP]


  37. A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [Citation Graph (, )][DBLP]


  38. Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps [Citation Graph (, )][DBLP]


  39. An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002