The following pages link to Zhou-Jun Li (Q533184):
Displayed 28 items.
- Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems (Q533185) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- (Q639063) (redirect page) (← links)
- An efficient dynamic authenticated key exchange protocol with selectable identities (Q639064) (← links)
- A provably secure authenticated key agreement protocol for wireless communications (Q714311) (← links)
- Universal abstract consistency class and universal refutation (Q1288438) (← links)
- Symbolic transition graph and its early bisimulation checking algorithms for the \(\pi\)-calculus (Q1962485) (← links)
- Super root: a new stealthy rooting technique on ARM devices (Q2229419) (← links)
- A novel variable precision \((\theta ,\sigma )\)-fuzzy rough set model based on fuzzy granules (Q2351581) (← links)
- Efficient and dynamic key management for multiple identities in identity-based systems (Q2510545) (← links)
- A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes (Q2660907) (← links)
- (Q2882377) (← links)
- Overcoming Weak Expectations via the R$$\acute{e}$$nyi Entropy and the Expanded Computational Entropy (Q2948261) (← links)
- Program security verification based on abstract invariants (Q2987193) (← links)
- An Iterative Method for Generating Loop Invariants (Q3004678) (← links)
- Non-malleable Extractors with Shorter Seeds and Their Applications (Q3460182) (← links)
- Constraint Abstraction in Verification of Security Protocols (Q3507341) (← links)
- Constraints Solution for Time Sensitive Security Protocols (Q3612589) (← links)
- Hamiltonian Property on Binary Recursive Networks (Q3612590) (← links)
- SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming (Q3624272) (← links)
- Server-Controlled Identity-Based Authenticated Key Exchange (Q3651593) (← links)
- (Q4219048) (← links)
- (Q5035489) (← links)
- (Q5314436) (← links)
- A Novel Derivation Framework For Definite Logic Program (Q5415609) (← links)
- Modeling and Verifying Time Sensitive Security Protocols with Constraints (Q5415612) (← links)
- fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol (Q5415623) (← links)
- (Q5491199) (← links)