|
Search the dblp DataBase
Yi-Xian Yang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yu-Ying Li, Li-Xiang Li, Qiao-Yan Wen, Yi-Xian Yang
Data Fitting Via Chaotic Ant Swarm. [Citation Graph (0, 0)][DBLP] ICNC (2), 2006, pp:180-183 [Conf]
- Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. [Citation Graph (0, 0)][DBLP] ISI, 2007, pp:129-132 [Conf]
A Simulation Platform of DDoS Attack Based on Network Processor. [Citation Graph (, )][DBLP]
Efficient Universally Composable Password-Based Key Exchange. [Citation Graph (, )][DBLP]
A Novel ID-Based Verifiably Encrypted Signature without Random Oracle. [Citation Graph (, )][DBLP]
Towards Hierarchical-User RBAC model. [Citation Graph (, )][DBLP]
Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|