The SCEAS System
Navigation Menu

Search the dblp DataBase


Daxing Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fanyu Kong, Daxing Li
    A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:223-235 [Conf]
  2. Daxing Li, Shaohan Ma
    Two Notes on Low-Density Subset Sum Algorithms. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1994, pp:164-171 [Conf]
  3. Rupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li
    Key-Insulated Group Signature Scheme with Selective Revocation. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1057-1063 [Conf]
  4. Guowen Li, Jia Yu, Rupeng Li, Daxing Li
    Two Threshold Multisignature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1041-1045 [Conf]
  5. Rupeng Li, Jia Yu, Guowen Li, Daxing Li
    A New Identity-Based Blind Signature Scheme with Batch Verifications. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1051-1056 [Conf]
  6. Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li
    Improved generalized Atkin algorithm for computing square roots in finite fields. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:98, n:1, pp:1-5 [Journal]
  7. Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li
    Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:52-60 [Conf]
  8. Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia
    Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:847-857 [Conf]
  9. Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li
    New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:189-198 [Conf]
  10. Jin Wang, Xi Bai, Jia Yu, Daxing Li
    Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:148-158 [Conf]
  11. Chengyu Hu, Pengtao Liu, Daxing Li
    A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:262-266 [Conf]

  12. An Efficient Threshold Group Signature Scheme. [Citation Graph (, )][DBLP]

  13. A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. [Citation Graph (, )][DBLP]

  14. A Proactive Secure Multisecret Sharing Threshold Scheme. [Citation Graph (, )][DBLP]

  15. Ring Blind Signature Scheme. [Citation Graph (, )][DBLP]

  16. An Approach to Convert Any Threshold Signature into a Threshold Group Signature. [Citation Graph (, )][DBLP]

  17. Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. [Citation Graph (, )][DBLP]

  18. Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. [Citation Graph (, )][DBLP]

  19. Key-Insulated Group Signature Scheme with Verifier-Local Revocation. [Citation Graph (, )][DBLP]

  20. Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]

  21. Forward-Secure Traceable Ring Signature. [Citation Graph (, )][DBLP]

  22. A Biometric Identity Based Signature Scheme with Convenient Verification. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002