|
Search the dblp DataBase
Haifeng Qian:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue
Efficient Non-interactive Deniable Authentication Protocols. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:673-679 [Conf]
- Haifeng Qian, Sachin S. Sapatnekar
Hierarchical random-walk algorithms for power grid analysis. [Citation Graph (0, 0)][DBLP] ASP-DAC, 2004, pp:499-504 [Conf]
- Haiyong Bao, Zhenfu Cao, Haifeng Qian
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:26-34 [Conf]
- Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
Certificateless Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:104-109 [Conf]
- Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
A Practical Optimal Padding for Signature Schemes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:112-128 [Conf]
- Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
Random walks in a supply network. [Citation Graph (0, 0)][DBLP] DAC, 2003, pp:93-98 [Conf]
- Haifeng Qian, Joseph N. Kozhaya, Sani R. Nassif, Sachin S. Sapatnekar
A chip-level electrostatic discharge simulation strategy. [Citation Graph (0, 0)][DBLP] ICCAD, 2004, pp:315-318 [Conf]
- Haifeng Qian, Sachin S. Sapatnekar
A hybrid linear equation solver and its application in quadratic placement. [Citation Graph (0, 0)][DBLP] ICCAD, 2005, pp:905-909 [Conf]
- Haifeng Qian, Jie Wu
Unicast, Multicast, and Broadcast on Enhanced Fibonacci Cubes. [Citation Graph (0, 0)][DBLP] ICCCN, 1995, pp:158- [Conf]
- Haifeng Qian, Eduardo B. Fernández, Jie Wu
A combined functional and object-oriented approach to software design. [Citation Graph (0, 0)][DBLP] ICECCS, 1995, pp:167-174 [Conf]
- Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo
Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:113-116 [Conf]
- Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:8-12 [Conf]
- Haifeng Qian, Zhenfu Cao
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:323-331 [Conf]
- Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
Early-stage power grid analysis for uncertain working modes. [Citation Graph (0, 0)][DBLP] ISPD, 2004, pp:132-137 [Conf]
- Hongliang Chang, Haifeng Qian, Sachin S. Sapatnekar
The Certainty of Uncertainty: Randomness in Nanometer Design. [Citation Graph (0, 0)][DBLP] PATMOS, 2004, pp:36-47 [Conf]
- Qingshui Xue, Zhenfu Cao, Haifeng Qian
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:662-665 [Conf]
- Haifeng Qian, Jie Wu
Enhanced Fibonacci Cubes. [Citation Graph (0, 0)][DBLP] Comput. J., 1996, v:39, n:4, pp:331-345 [Journal]
- Jie Wu, Haifeng Qian
Multitriangle: A Constant Node Degree Interconnection Network. [Citation Graph (0, 0)][DBLP] Int. J. Found. Comput. Sci., 1997, v:8, n:2, pp:187-0 [Journal]
- Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
Simulatability and security of certificateless threshold signatures. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:6, pp:1382-1394 [Journal]
- Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
Early-stage power grid analysis for uncertain working modes. [Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:5, pp:676-682 [Journal]
- Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
Power grid analysis using random walks. [Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2005, v:24, n:8, pp:1204-1224 [Journal]
- Haifeng Qian, Zhenfu Cao, Qingshui Xue
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:261-274 [Journal]
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]
Clustering based pruning for statistical criticality computation under process variations. [Citation Graph (, )][DBLP]
Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP]
An Optimal Blind Signature Padding with Message Recovery. [Citation Graph (, )][DBLP]
A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations. [Citation Graph (, )][DBLP]
A CDH-Based Multi-Signature Scheme with Tight Security Reduction. [Citation Graph (, )][DBLP]
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. [Citation Graph (, )][DBLP]
Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting. [Citation Graph (, )][DBLP]
Efficient public key encryption with smallest ciphertext expansion from factoring. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.008secs
|