The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Haifeng Qian: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue
    Efficient Non-interactive Deniable Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:673-679 [Conf]
  2. Haifeng Qian, Sachin S. Sapatnekar
    Hierarchical random-walk algorithms for power grid analysis. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2004, pp:499-504 [Conf]
  3. Haiyong Bao, Zhenfu Cao, Haifeng Qian
    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:26-34 [Conf]
  4. Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
    Certificateless Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:104-109 [Conf]
  5. Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
    A Practical Optimal Padding for Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:112-128 [Conf]
  6. Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
    Random walks in a supply network. [Citation Graph (0, 0)][DBLP]
    DAC, 2003, pp:93-98 [Conf]
  7. Haifeng Qian, Joseph N. Kozhaya, Sani R. Nassif, Sachin S. Sapatnekar
    A chip-level electrostatic discharge simulation strategy. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2004, pp:315-318 [Conf]
  8. Haifeng Qian, Sachin S. Sapatnekar
    A hybrid linear equation solver and its application in quadratic placement. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2005, pp:905-909 [Conf]
  9. Haifeng Qian, Jie Wu
    Unicast, Multicast, and Broadcast on Enhanced Fibonacci Cubes. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1995, pp:158- [Conf]
  10. Haifeng Qian, Eduardo B. Fernández, Jie Wu
    A combined functional and object-oriented approach to software design. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:167-174 [Conf]
  11. Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo
    Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:113-116 [Conf]
  12. Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
    Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:8-12 [Conf]
  13. Haifeng Qian, Zhenfu Cao
    A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:323-331 [Conf]
  14. Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
    Early-stage power grid analysis for uncertain working modes. [Citation Graph (0, 0)][DBLP]
    ISPD, 2004, pp:132-137 [Conf]
  15. Hongliang Chang, Haifeng Qian, Sachin S. Sapatnekar
    The Certainty of Uncertainty: Randomness in Nanometer Design. [Citation Graph (0, 0)][DBLP]
    PATMOS, 2004, pp:36-47 [Conf]
  16. Qingshui Xue, Zhenfu Cao, Haifeng Qian
    A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:662-665 [Conf]
  17. Haifeng Qian, Jie Wu
    Enhanced Fibonacci Cubes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1996, v:39, n:4, pp:331-345 [Journal]
  18. Jie Wu, Haifeng Qian
    Multitriangle: A Constant Node Degree Interconnection Network. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 1997, v:8, n:2, pp:187-0 [Journal]
  19. Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
    Simulatability and security of certificateless threshold signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1382-1394 [Journal]
  20. Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
    Early-stage power grid analysis for uncertain working modes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:5, pp:676-682 [Journal]
  21. Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
    Power grid analysis using random walks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:8, pp:1204-1224 [Journal]
  22. Haifeng Qian, Zhenfu Cao, Qingshui Xue
    Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:261-274 [Journal]

  23. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]


  24. Clustering based pruning for statistical criticality computation under process variations. [Citation Graph (, )][DBLP]


  25. Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP]


  26. An Optimal Blind Signature Padding with Message Recovery. [Citation Graph (, )][DBLP]


  27. A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations. [Citation Graph (, )][DBLP]


  28. A CDH-Based Multi-Signature Scheme with Tight Security Reduction. [Citation Graph (, )][DBLP]


  29. An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. [Citation Graph (, )][DBLP]


  30. Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting. [Citation Graph (, )][DBLP]


  31. Efficient public key encryption with smallest ciphertext expansion from factoring. [Citation Graph (, )][DBLP]


Search in 0.046secs, Finished in 0.049secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002