Zhoujun Li

From MaRDI portal
Person:533184

Available identifiers

zbMath Open li.zhoujunMaRDI QIDQ533184

List of research outcomes





PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q50354892022-02-22Paper
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes2021-03-31Paper
Super root: a new stealthy rooting technique on ARM devices2021-02-23Paper
Program security verification based on abstract invariants2017-05-17Paper
Non-malleable extractors with shorter seeds and their applications2016-01-12Paper
Overcoming weak expectations via the Rényi entropy and the expanded computational entropy2015-09-30Paper
A novel variable precision \((\theta ,\sigma )\)-fuzzy rough set model based on fuzzy granules2015-06-24Paper
Efficient and dynamic key management for multiple identities in identity-based systems2014-08-01Paper
Efficient and provably secure generic construction of client-to-client password-based key exchange protocol2014-05-13Paper
Modeling and verifying time sensitive security protocols with constraints2014-05-13Paper
A novel derivation framework for definite logic program2014-05-13Paper
A provably secure authenticated key agreement protocol for wireless communications2012-10-19Paper
The construction of fuzzy concept lattices based on \((\theta , \sigma )\)-fuzzy rough approximation operators2012-05-04Paper
An efficient dynamic authenticated key exchange protocol with selectable identities2011-09-18Paper
An iterative method for generating loop invariants2011-06-03Paper
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems2011-05-02Paper
Provably secure identity-based authenticated key agreement protocols with malicious private key generators2011-01-28Paper
Server-controlled identity-based authenticated key exchange2009-12-11Paper
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming2009-04-29Paper
Hamiltonian Property on Binary Recursive Networks2009-03-10Paper
Constraints Solution for Time Sensitive Security Protocols2009-03-10Paper
Constraint Abstraction in Verification of Security Protocols2008-06-19Paper
SPVT: an efficient verification tool for security protocols2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q53144362005-09-05Paper
Symbolic transition graph and its early bisimulation checking algorithms for the \(\pi\)-calculus2000-06-13Paper
Universal abstract consistency class and universal refutation1999-09-13Paper
https://portal.mardi4nfdi.de/entity/Q42190481999-02-14Paper

Research outcomes over time

This page was built for person: Zhoujun Li