The SCEAS System
Navigation Menu

Search the dblp DataBase


Yu Long: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Liang-Jie Zhang, Yu Long, Tian Chao, Henry Chang, John Y. Sayah
    Adaptive integration activity management for on demand business process collaboration. [Citation Graph (0, 0)][DBLP]
    Inf. Syst. E-Business Management, 2004, v:2, n:1, pp:149-166 [Journal]
  2. Yu Long, Zhenfu Cao, Kefei Chen
    A dynamic threshold commercial key escrow scheme based on conic. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:2, pp:972-982 [Journal]
  3. Yu Long, Kefei Chen, Shengli Liu
    Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:4, pp:519-534 [Journal]
  4. Yu Long, Kefei Chen, Shengli Liu
    ID-based threshold decryption secure against adaptive chosen-ciphertext attack. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2007, v:33, n:3, pp:166-176 [Journal]

  5. Kernel Partial Least-Squares Regression. [Citation Graph (, )][DBLP]

  6. Efficient Partially Blind Signature from LFSR. [Citation Graph (, )][DBLP]

  7. Two Certificateless Aggregate Signatures From Bilinear Maps. [Citation Graph (, )][DBLP]

Search in 0.013secs, Finished in 0.013secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002