Search the dblp DataBase
Lili Sun :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hua Wang , Lili Sun , Yanchun Zhang , Jinli Cao Anonymous Access Scheme for Electronic Services. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:295-304 [Conf ] Hua Wang , Lili Sun , Yanchun Zhang , Jinli Cao Authorization Algorithms for the Mobility of User-Role Relationship. [Citation Graph (0, 0)][DBLP ] ACSC, 2005, pp:69-78 [Conf ] Jinli Cao , Lili Sun , Hua Wang Towards Secure XML Document with Usage Control. [Citation Graph (0, 0)][DBLP ] APWeb, 2005, pp:296-307 [Conf ] Lili Sun , Yan Li XML undeniable signatures. [Citation Graph (0, 0)][DBLP ] CIMCA/IAWTIC, 2005, pp:981-985 [Conf ] Lili Sun , Prakash P. Shenoy Using Bayesian networks for bankruptcy prediction: Some methodological issues. [Citation Graph (0, 0)][DBLP ] European Journal of Operational Research, 2007, v:180, n:2, pp:738-753 [Journal ] XML and web services security. [Citation Graph (, )][DBLP ] Privacy preserving on Radio Frequency Identification systems. [Citation Graph (, )][DBLP ] Protecting Disseminative Information in E-Learning. [Citation Graph (, )][DBLP ] High-order open and closed loop iterative learning control scheme with initial state learning. [Citation Graph (, )][DBLP ] Extended K-Anonymity Models Against Attribute Disclosure. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs