The SCEAS System
| |||||||

## Search the dblp DataBase
Haifeng Qian:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue
**Efficient Non-interactive Deniable Authentication Protocols.**[Citation Graph (0, 0)][DBLP] CIT, 2005, pp:673-679 [Conf] - Haifeng Qian, Sachin S. Sapatnekar
**Hierarchical random-walk algorithms for power grid analysis.**[Citation Graph (0, 0)][DBLP] ASP-DAC, 2004, pp:499-504 [Conf] - Haiyong Bao, Zhenfu Cao, Haifeng Qian
**On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:26-34 [Conf] - Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
**Certificateless Threshold Signature Schemes.**[Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:104-109 [Conf] - Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
**A Practical Optimal Padding for Signature Schemes.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:112-128 [Conf] - Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
**Random walks in a supply network.**[Citation Graph (0, 0)][DBLP] DAC, 2003, pp:93-98 [Conf] - Haifeng Qian, Joseph N. Kozhaya, Sani R. Nassif, Sachin S. Sapatnekar
**A chip-level electrostatic discharge simulation strategy.**[Citation Graph (0, 0)][DBLP] ICCAD, 2004, pp:315-318 [Conf] - Haifeng Qian, Sachin S. Sapatnekar
**A hybrid linear equation solver and its application in quadratic placement.**[Citation Graph (0, 0)][DBLP] ICCAD, 2005, pp:905-909 [Conf] - Haifeng Qian, Jie Wu
**Unicast, Multicast, and Broadcast on Enhanced Fibonacci Cubes.**[Citation Graph (0, 0)][DBLP] ICCCN, 1995, pp:158- [Conf] - Haifeng Qian, Eduardo B. Fernández, Jie Wu
**A combined functional and object-oriented approach to software design.**[Citation Graph (0, 0)][DBLP] ICECCS, 1995, pp:167-174 [Conf] - Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo
**Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.**[Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:113-116 [Conf] - Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
**Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.**[Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:8-12 [Conf] - Haifeng Qian, Zhenfu Cao
**A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.**[Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:323-331 [Conf] - Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
**Early-stage power grid analysis for uncertain working modes.**[Citation Graph (0, 0)][DBLP] ISPD, 2004, pp:132-137 [Conf] - Hongliang Chang, Haifeng Qian, Sachin S. Sapatnekar
**The Certainty of Uncertainty: Randomness in Nanometer Design.**[Citation Graph (0, 0)][DBLP] PATMOS, 2004, pp:36-47 [Conf] - Qingshui Xue, Zhenfu Cao, Haifeng Qian
**A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.**[Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:662-665 [Conf] - Haifeng Qian, Jie Wu
**Enhanced Fibonacci Cubes.**[Citation Graph (0, 0)][DBLP] Comput. J., 1996, v:39, n:4, pp:331-345 [Journal] - Jie Wu, Haifeng Qian
**Multitriangle: A Constant Node Degree Interconnection Network.**[Citation Graph (0, 0)][DBLP] Int. J. Found. Comput. Sci., 1997, v:8, n:2, pp:187-0 [Journal] - Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
**Simulatability and security of certificateless threshold signatures.**[Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:6, pp:1382-1394 [Journal] - Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
**Early-stage power grid analysis for uncertain working modes.**[Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:5, pp:676-682 [Journal] - Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
**Power grid analysis using random walks.**[Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:8, pp:1204-1224 [Journal] - Haifeng Qian, Zhenfu Cao, Qingshui Xue
**Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers.**[Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:261-274 [Journal] **Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.**[Citation Graph (, )][DBLP]**Clustering based pruning for statistical criticality computation under process variations.**[Citation Graph (, )][DBLP]**Trustworthy Information: Concepts and Mechanisms.**[Citation Graph (, )][DBLP]**An Optimal Blind Signature Padding with Message Recovery.**[Citation Graph (, )][DBLP]**A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations.**[Citation Graph (, )][DBLP]**A CDH-Based Multi-Signature Scheme with Tight Security Reduction.**[Citation Graph (, )][DBLP]**An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.**[Citation Graph (, )][DBLP]**Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting.**[Citation Graph (, )][DBLP]**Efficient public key encryption with smallest ciphertext expansion from factoring.**[Citation Graph (, )][DBLP]
Search in 0.046secs, Finished in 0.049secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |