The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lihua Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
    Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:198-203 [Conf]
  2. Lihua Wang, Stephen John Turner, Fang Wang
    Interest Management in Agent-Based Distributed Simulations. [Citation Graph (0, 0)][DBLP]
    DS-RT, 2003, pp:20-29 [Conf]
  3. Fang Wang, Stephen John Turner, Lihua Wang
    Agent Communication in Distributed Simulations. [Citation Graph (0, 0)][DBLP]
    MABS, 2004, pp:11-24 [Conf]
  4. Lihua Wang, Stephen John Turner, Fang Wang
    Resolving Mutually Exclusive Interactions in Agent Based Distributed Simulations. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2004, pp:783-791 [Conf]
  5. Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi
    ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:291-303 [Conf]
  6. Gennian Ge, Ying Miao, Lihua Wang
    Combinatorial Constructions for Optimal Splitting Authentication Codes. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2005, v:18, n:4, pp:663-678 [Journal]
  7. Junji Nakazato, Lihua Wang, Akihiro Yamamura
    Privacy Enhancing Credentials. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:55-61 [Conf]

  8. Aspect-oriented formal specification for multimedia systems. [Citation Graph (, )][DBLP]


  9. Image Categorization Based on a Hierarchical Spatial Markov Model. [Citation Graph (, )][DBLP]


  10. Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. [Citation Graph (, )][DBLP]


  11. Combining multiple spatial hidden Markov models in image semantic classification and annotation. [Citation Graph (, )][DBLP]


  12. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]


  13. Solving a 676-Bit Discrete Logarithm Problem in GF(36n). [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002