Zhoujun Li

From MaRDI portal
(Redirected from Person:533184)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
scientific article; zbMATH DE number 7477999 (Why is no real title available?)2022-02-22Paper
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
Information Sciences
2021-03-31Paper
Super root: a new stealthy rooting technique on ARM devices2021-02-23Paper
Program security verification based on abstract invariants2017-05-17Paper
Non-malleable extractors with shorter seeds and their applications
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Overcoming weak expectations via the Rényi entropy and the expanded computational entropy
Lecture Notes in Computer Science
2015-09-30Paper
A novel variable precision \((\theta ,\sigma )\)-fuzzy rough set model based on fuzzy granules
Fuzzy Sets and Systems
2015-06-24Paper
Efficient and dynamic key management for multiple identities in identity-based systems
Information Sciences
2014-08-01Paper
Efficient and provably secure generic construction of client-to-client password-based key exchange protocol
Electronic Notes in Theoretical Computer Science
2014-05-13Paper
Modeling and verifying time sensitive security protocols with constraints
Electronic Notes in Theoretical Computer Science
2014-05-13Paper
A novel derivation framework for definite logic program
Electronic Notes in Theoretical Computer Science
2014-05-13Paper
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
2012-10-19Paper
The construction of fuzzy concept lattices based on \((\theta , \sigma )\)-fuzzy rough approximation operators
Fundamenta Informaticae
2012-05-04Paper
An efficient dynamic authenticated key exchange protocol with selectable identities
Computers & Mathematics with Applications
2011-09-18Paper
An iterative method for generating loop invariants
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
2011-06-03Paper
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems
Fuzzy Sets and Systems
2011-05-02Paper
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Information Sciences
2011-01-28Paper
Server-controlled identity-based authenticated key exchange
Provable Security
2009-12-11Paper
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming
Information Security and Cryptology
2009-04-29Paper
Hamiltonian Property on Binary Recursive Networks
Frontiers in Algorithmics
2009-03-10Paper
Constraints Solution for Time Sensitive Security Protocols
Frontiers in Algorithmics
2009-03-10Paper
Constraint Abstraction in Verification of Security Protocols
Frontiers in Algorithmics
2008-06-19Paper
SPVT: an efficient verification tool for security protocols2006-10-10Paper
scientific article; zbMATH DE number 2202222 (Why is no real title available?)2005-09-05Paper
Symbolic transition graph and its early bisimulation checking algorithms for the \(\pi\)-calculus
Science in China. Series E
2000-06-13Paper
Universal abstract consistency class and universal refutation
Journal of Computer Science and Technology
1999-09-13Paper
scientific article; zbMATH DE number 1223732 (Why is no real title available?)1999-02-14Paper


Research outcomes over time


This page was built for person: Zhoujun Li