Zhoujun Li

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
scientific article; zbMATH DE number 7477999 (Why is no real title available?)2022-02-22Paper
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
Information Sciences
2021-03-31Paper
Super root: a new stealthy rooting technique on ARM devices2021-02-23Paper
Program security verification based on abstract invariants2017-05-17Paper
Non-malleable extractors with shorter seeds and their applications
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Overcoming weak expectations via the Rényi entropy and the expanded computational entropy
Lecture Notes in Computer Science
2015-09-30Paper
A novel variable precision \((\theta ,\sigma )\)-fuzzy rough set model based on fuzzy granules
Fuzzy Sets and Systems
2015-06-24Paper
Efficient and dynamic key management for multiple identities in identity-based systems
Information Sciences
2014-08-01Paper
Efficient and provably secure generic construction of client-to-client password-based key exchange protocol
Electronic Notes in Theoretical Computer Science
2014-05-13Paper
Modeling and verifying time sensitive security protocols with constraints
Electronic Notes in Theoretical Computer Science
2014-05-13Paper
A novel derivation framework for definite logic program
Electronic Notes in Theoretical Computer Science
2014-05-13Paper
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
2012-10-19Paper
The construction of fuzzy concept lattices based on \((\theta , \sigma )\)-fuzzy rough approximation operators
Fundamenta Informaticae
2012-05-04Paper
An efficient dynamic authenticated key exchange protocol with selectable identities
Computers & Mathematics with Applications
2011-09-18Paper
An iterative method for generating loop invariants
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
2011-06-03Paper
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems
Fuzzy Sets and Systems
2011-05-02Paper
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Information Sciences
2011-01-28Paper
Server-controlled identity-based authenticated key exchange
Provable Security
2009-12-11Paper
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming
Information Security and Cryptology
2009-04-29Paper
Hamiltonian Property on Binary Recursive Networks
Frontiers in Algorithmics
2009-03-10Paper
Constraints Solution for Time Sensitive Security Protocols
Frontiers in Algorithmics
2009-03-10Paper
Constraint Abstraction in Verification of Security Protocols
Frontiers in Algorithmics
2008-06-19Paper
SPVT: an efficient verification tool for security protocols2006-10-10Paper
scientific article; zbMATH DE number 2202222 (Why is no real title available?)2005-09-05Paper
Symbolic transition graph and its early bisimulation checking algorithms for the \(\pi\)-calculus
Science in China. Series E
2000-06-13Paper
Universal abstract consistency class and universal refutation
Journal of Computer Science and Technology
1999-09-13Paper
scientific article; zbMATH DE number 1223732 (Why is no real title available?)1999-02-14Paper


Research outcomes over time


This page was built for person: Zhoujun Li