| Publication | Date of Publication | Type |
|---|
Growing simplicial complex with face dimension selection and preferential attachment Chaos | 2025-01-14 | Paper |
Nonlocal numerical simulation of thermoelectric coupling field by using peridynamic differential operator ZAMP. Zeitschrift für angewandte Mathematik und Physik | 2024-08-08 | Paper |
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data Information Sciences | 2024-07-01 | Paper |
Enabling privacy-preserving non-interactive computation for Hamming distance Information Sciences | 2024-05-27 | Paper |
Reliability evaluation for a class of recursive match networks Theoretical Computer Science | 2024-02-23 | Paper |
Enhancing fault tolerance of balanced hypercube networks by the edge partition method Theoretical Computer Science | 2024-01-16 | Paper |
Symmetric-key based proofs of retrievability supporting public verification Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
Connectivity and constructive algorithms of disjoint paths in dragonfly networks Theoretical Computer Science | 2022-06-13 | Paper |
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures Journal of Computer and System Sciences | 2021-07-06 | Paper |
Blockchain-based two-party fair contract signing scheme Information Sciences | 2021-05-03 | Paper |
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage Information Sciences | 2021-03-31 | Paper |
How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields Information Sciences | 2021-03-18 | Paper |
Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction Information Sciences | 2020-09-08 | Paper |
The reliability analysis of \(k\)-ary \(n\)-cube networks Theoretical Computer Science | 2020-08-17 | Paper |
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data Information Sciences | 2020-02-07 | Paper |
Key-insulated aggregate signature Frontiers of Computer Science | 2018-12-19 | Paper |
IRIBE: intrusion-resilient identity-based encryption Information Sciences | 2018-05-22 | Paper |
One forward-secure signature scheme using bilinear maps and its applications Information Sciences | 2017-01-31 | Paper |
Cloud storage integrity checking scheme with private key recovery capability | 2017-01-06 | Paper |
scientific article; zbMATH DE number 6611879 (Why is no real title available?) | 2016-08-10 | Paper |
Minimum channel capacity required for stability of Markov jump systems based on nonstochastic information theory | 2015-10-28 | Paper |
A multidimensional information model for managing construction information Journal of Industrial and Management Optimization | 2015-06-23 | Paper |
Enabling polarisation filtering in wireless communications: models, algorithms and characteristics IET Communications | 2013-10-18 | Paper |
New forward-secure signature scheme with untrusted update | 2012-10-26 | Paper |
Forward-secure identity-based public-key encryption without random oracles Fundamenta Informaticae | 2012-05-04 | Paper |
A verifiable multi-secret-sharing scheme based on homogeneous linear recursion | 2011-09-29 | Paper |
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges Theoretical Computer Science | 2011-07-14 | Paper |
Efficient unicast in bijective connection networks with the restricted faulty node set Information Sciences | 2011-06-22 | Paper |
Embedding meshes into twisted-cubes Information Sciences | 2011-06-22 | Paper |
Forward-secure identity-based signature: security notions and construction Information Sciences | 2011-01-28 | Paper |
A local construction of the Smith normal form of a matrix polynomial Journal of Symbolic Computation | 2010-11-19 | Paper |
Improved generalized Atkin algorithm for computing square roots in finite fields Information Processing Letters | 2010-01-18 | Paper |
Workflow Scheduling Algorithms for Grid Computing Studies in Computational Intelligence | 2009-02-13 | Paper |
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps Provable Security | 2009-01-27 | Paper |
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 Provable Security | 2009-01-27 | Paper |
A new proactive secret sharing scheme | 2008-06-03 | Paper |
New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems Lecture Notes in Computer Science | 2007-11-13 | Paper |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem Lecture Notes in Computer Science | 2007-11-13 | Paper |
Verifiable secret redistribution for proactive secret sharing schemes Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
An efficient forward secure signature scheme Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |