The following pages link to Hui Li (Q280927):
Displayed 28 items.
- Efficient multi-party concurrent signature from lattices (Q280930) (← links)
- ID-based authenticated group key agreement from bilinear maps (Q352009) (← links)
- Identity-based key distribution for mobile ad hoc networks (Q352090) (← links)
- The cross-correlation distribution of a \(p\)-ary \(m\)-sequence of period \(p^{2k} - 1\) and its decimated sequence by \(\frac{(p^{k} + 1)^{2}}{2(p^{e} + 1)}\) (Q380680) (← links)
- Group key agreement for secure group communication in dynamic peer systems (Q455985) (← links)
- An efficient MAC scheme for secure network coding with probabilistic detection (Q1762208) (← links)
- Information dissemination model for social media with constant updates (Q2149141) (← links)
- Linear complexity of generalized cyclotomic sequences of order 4 over \(\mathbb{F}_l\) (Q2173752) (← links)
- The optimal upper bound of the number of queries for Laplace mechanism under differential privacy (Q2224923) (← links)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920) (← links)
- A reusable and single-interactive model for secure approximate \(k\)-nearest neighbor query in cloud (Q2293034) (← links)
- Blockchain-based privacy preserving deep learning (Q2331970) (← links)
- Affinity-driven blog cascade analysis and prediction (Q2435723) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- Authenticated asymmetric group key agreement based on certificateless cryptosystem (Q2875291) (← links)
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (Q2948155) (← links)
- Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding” (Q2982376) (← links)
- (Q3169520) (← links)
- (Q3368146) (← links)
- Secure Error-Correction Network Coding in a Randomized Setting (Q3634339) (← links)
- (Q5035543) (← links)
- Efficient signcryption between TPKC and IDPKC and its multi-receiver construction (Q5046385) (← links)
- Short-ciphertext and BDH-based CCA2 secure certificateless encryption (Q5046463) (← links)
- Codes Based Tracing and Revoking Scheme with Constant Ciphertext (Q5200592) (← links)
- Key management for Smart Grid based on asymmetric key-wrapping (Q5259054) (← links)
- (Q5698097) (← links)
- Efficient and privacy-preserving tree-based inference via additive homomorphic encryption (Q6058290) (← links)
- Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting (Q6098292) (← links)