Search

Your search keyword '"Xiangxue Li"' showing total 36 results

Search Constraints

Start Over You searched for: Author "Xiangxue Li" Remove constraint Author: "Xiangxue Li" Topic computer.software_genre Remove constraint Topic: computer.software_genre
36 results on '"Xiangxue Li"'

Search Results

1. (Semi-)Automatically Parsing Private Protocols for In-Vehicle ECU Communications

2. Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network

3. Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm

4. Connected Vehicles' Security from the Perspective of the In-Vehicle Network

5. New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group

6. Anonymity for Bitcoin From Secure Escrow Address

7. Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens

8. Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing

9. Building a new secure variant of Rainbow signature scheme

10. Signcryption KEM/tag-KEM, revisited

11. VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes

12. Notes on a group-oriented setting’s multisigncryption scheme with threshold designcryption

13. Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning

14. Robust password changing and DoS resilience for human-centric password authentication

15. Identity-Based Key-Insulated Signcryption

16. Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model

17. An efficient threshold key-insulated signature scheme

18. Cryptanalysis of a certificateless signcryption scheme in the standard model

19. Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards

20. Democratic group signatures with collective traceability

21. Democratic group signatures with threshold traceability

22. Democratic group signatures with linkability from gap Diffie-Hellman group

23. Simulatability and security of certificateless threshold signatures

24. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

25. Efficient democratic group signatures with threshold traceability

26. POSTER

27. Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model

28. An anonymous remote attestation for trusted cloud computing

29. Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator

30. YI Cloud: Improving user privacy with secret key recovery in cloud storage

31. Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security

32. Identity-Based Key-Insulated Signature with Secure Key-Updates

33. Identity Based Conference Key Distribution Scheme from Parings

34. An Authentication Protocol for Pervasive Computing

35. Identity based proxy-signcryption scheme from pairings

36. Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings

Catalog

Books, media, physical & digital resources