Loading...
Images of Fagen Li
(0 from 0 )1
0
0
News
AsiaJCIS : The Asia Joint Conference on Information Security
www.wikicfp.com
AsiaJCIS : The Asia Joint Conference on Information Security
Telephone & Addresses
Certificateless deniably authenticated encryption and its ...
ideas.repec.org
Suggested Citation. Emmanuel Ahene & Chunhua Jin & Fagen Li, " Certificateless deniably authenticated encryption and its application to e-voting system ...
Network Profiles
LinkedIn: Fagen Li | 领英
查看Fagen Li (中国) 的领英档案。加入领英,找找同事同学,结识业界同行,与其他职场人士一起驰骋职场。
LinkedIn: fagen li | 职业档案 - 领英
上领英,在全球领先职业社交平台查看fagen li的职业档案。fagen的工作经历: sleb。查看fagen的完整档案,探索相关职位和人脉。
Fagen Li eBooks - eBooks.com
www.ebooks.com
Fagen Li eBooks. Buy Fagen Li eBooks to read online or download in PDF or ePub on your PC, tablet or mobile device.
Interests
A Taxonomy of Ring Signature Schemes: Theory and Applications
connection.ebscohost.com
Hu Xiong; Zhiguang Qin; Fagen Li. PUB. DATE. July SOURCE. IETE Journal of Research (Medknow Publications & Media Pvt. Ltd.;Jul/Aug2013, Vol.
Business Profiles
Researchgate: Fagen Li
Beijing, China
Private Homepages
DBLife: Fagen Li News Archive
dblife.cs.wisc.edu
Return to Fagen Li's Superhomepage. No news available. DBlife. Developed by the Database Group at the University of Wisconsin and Yahoo! Research.
Education
IEICE SEARCH SYSTEM
search.ieice.org
Analysis of an Identity-Based Signcryption Scheme in the Standard Model Fagen LI Yongjian LIAO Zhiguang QIN Publication
IEICE Trans - An Improved Authenticated Encryption Scheme
search.ieice.org
An Improved Authenticated Encryption Scheme Fagen LI · Jiang DENG · Tsuyoshi TAKAGI Publication IEICE TRANSACTIONS on Information ...
Books & Literature
bokus.com: Fagen Li - Böcker | Bokus bokhandelwww.bokus.com › product_search
Köp böcker av Fagen Li: Frontiers in Cyber Security;
Computer, Informatics, Cybernetics and Applications: Proceedings of...
books.google.de
The Conference on Computer, Informatics, Cybernetics and Applications aims to facilitate an exchange of information on best practices for the latest...
Information Security and Cryptology: First SKLOIS Conference, CISC...
books.google.de
ID-Based Threshold Unsigncryption Scheme from Pairings Fagen Li, Juntao Gao, and Yupu Hu Key Laboratory of Computer Networks and Information Security, ...
Related Documents
CiteSeerX — Identity-Based Hybrid Signcryption
citeseerx.ist.psu.edu
BibTeX @MISC{Li_identity-basedhybrid, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Identity-Based Hybrid Signcryption}, year = {}}
EBSCOhost | | A Survey of Identity-based Signcryption.
web.b.ebscohost.com
Fagen Li and Muhammad Khurram Khan1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu ...
Scientific Publications
An efficient identity-based signature scheme without ...
www.sciencedirect.com
· Fagen Li is a professor in the School of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, P.R. China. He received his Ph.D. degree in Cryptography from Xidian University, Xi’an, P.R. China in
DiSNPindel: improved intra-individual SNP and InDel detection in...
bmcbioinformatics.biomedcentral.com
Jizhong Deng,; Huasheng Huang,; Xiaoli Yu,; Ji Jin,; Weisen Lin,; Fagen Li,; Zhijiao Song,; Mei Li and; Siming GanEmail author.
Fagen Li - dblpdblp.org › Persons
dblp.org
Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li : Certificateless public key encryption with conjunctive keyword search and its ...
Indentity-based broadcast signcryption - ScienceDirectwww.sciencedirect.com › science › article › abs › pii
www.sciencedirect.com
Fagen Li received his Ph.D. degree in Cryptography from Xidian University, Xi'an, P.R. China in He is now a lecturer in the School of Computer Science ...
Publications
bol.com: Fagen Li artikelen kopen? Alle artikelen online - bol.comwww.bol.com › fagen-li
Op zoek naar artikelen van Fagen Li? Artikelen van Fagen Li koop je eenvoudig online bij bol.com ✓ Gratis retourneren ✓ 30 dagen bedenktijd ✓ Snel in huis.
On the Role of PKG for Proxy Re-encryption in Identity Based Setting...
core.ac.uk
... Xiaoyuan Yang and Fagen Li. Abstract. Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3].
MDPI - Publisher of Open Access Journals
www.mdpi.com
MDPI is a publisher of peer-reviewed, open access journals since its establishment in
Reports & Statements
nature.com search
www.nature.com
Zhijiao Song; , Miaomiao Zhang; , Fagen Li; , Qijie Weng; , Chanpin Zhou; , Mei Li; , Jie Li; , Huanhua Huang; , Xiaoyong Mo; […] & Siming Gan; - Show fewer authors. Scientific Reports 6, Rights & permissionsfor article Genome scans for divergent selection in natural populations of the widespread hardwood species ...
Miscellaneous
fagen li | LinkedIn
www.linkedin.com
View fagen li’s professional profile on LinkedIn. LinkedIn is the world's largest business network, helping professionals like fagen li discover inside connections ...
Mingwu Zhang - Google Scholar Citations
scholar.google.com.au
Co-authorsView all… Fagen Li,; Yi Mu,; Chandrashekhar Meshram,; Debiao He · Title1– ...
Mingwu Zhang - Trích dẫn của Google Scholar
scholar.google.hu
Đồng tác giảXem tất cả… Fagen Li,; Yi Mu,; Chandrashekhar Meshram,; Debiao He ...
검색결과 - earticle
www.earticle.net
Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function Xiangjun Xin, Xiaolin Hua, Jianpo Song, Fagen Li
Professional IT advice within hours for just €10!
www.ultihost.nl
Certificateless Hybrid Signcryption, by Fagen Li and Masaaki Shirase and Tsuyoshi Takagi. Fuzzy Identity Based Encryption from Lattices, by Shweta Agrawal ...
Fagen Li
www.infona.pl
Search results for: Fagen Li ... Fagen Li, Masaaki Shirase, Tsuyoshi Takagi · Information Security and Cryptology > Wireless Network Security.
DBLP: Fagen Li
www09.sigmod.org
Fagen Li, Yupu Hu, Chuanrong Zhang: An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. ACNS 2007: : 5: EE: Bo Yang, Yong Yu, Fagen Li, Ying Sun: Provably Secure Identity-Based Threshold Unsigncryption Scheme. ATC 2007: : 4: EE: Fagen Li, Yupu Hu: Security Analysis of the Pomykala-Barabasz Scheme. Fundam.
Con Collector
cc.thinkst.com
Search: Everything Browse: SpeakersConferencesTopicsContributorsAnalyticsFolkloreAboutLogin. Fagen Li [Speaker-Timeline] [Speaker-Links] Tell us about ...
Fagen Li I ResearcherID.comwww.researcherid.com › rid
publons.com
Home Login Search Interactive Map EndNote Publons >. Li, Fagen. Create a ResearcherID badge for this researcher View publications analytics for this ...
Frontiers in Cyber Security by Fagen Li (ebook) - eBooks.com
www.ebooks.com
Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings (Communications in Computer and ...
Cryptanalysis of an Identity Based Proxy Multi-Signature...
journals.flvc.org
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
3PGCIC Conference
www.cs.upc.edu
... Shanghai Jiaotong University, China; Jian Weng, Jinan University, China; Fagen Li, Kyushu University, Japan; Masaaki Shirase, Future University-Hakodate, ...
An Efficient and Provably Secure ID-Based Threshold Signcryption...
eprint.iacr.org
Cryptology ePrint Archive: Report An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme. Fagen Li and Yong Yu
Cryptology ePrint Archive: Report On the Provable Security...
eprint.iacr.org
In another direction, Fagen Li et al. have proposed a pairing based multi-recipient signcryption scheme which works in public key infrastructure (PKI). We show ...
ACNS - List of Accepted Papers
jianying.space
Fagen Li, Yupu Hu, Chuanrong Zhang Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains
An Efficient Identity-Based Deniable Authenticated TIISwww.itiis.org › digital-library › manuscript
www.itiis.org
Weifeng Wu and Fagen Li, "An Efficient Identity-Based Deniable Authenticated Encryption Scheme," KSII Transactions on Internet and ...
50 Most Accessed Articles September | IEEE Sensors ...ieee-sensors.org › 25-most-accessed-articles › 50-most-ac...
ieee-sensors.org
Fagen Li ; Pan Xiong Publication Year: 2013, Page(s): – Cited by: Papers (25) Abstract | Full Pdf. SMDP-Based Radio Resource Allocation Scheme ...
An Efficient Identity-Based Deniable Authenticated Encryption Scheme
www.kpubs.org
An Efficient Identity-Based Deniable Authenticated Encryption Scheme;kpubs;kpubs.org
Bibliography on Secure Vehicular Communications
bbcr.uwaterloo.ca
[XZCL13] Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li, Efficient communication scheme with confidentiality and privacy for vehicular networks, Computers ...
Related search requests for Fagen Li
Debasis Giri |
People Forename "Fagen" (3) Name |
sorted by relevance / date