dblp.uni-trier.dewww.uni-trier.de

Daxing Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
22EEFanyu Kong, Jia Yu, Baodong Qin, Daxing Li: Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. ATC 2007: 52-60
21EEXiaodong Liu, Quan Miao, Daxing Li: A Biometric Identity Based Signature Scheme with Convenient Verification. FGCN (1) 2007: 114-117
20 Chengyu Hu, Daxing Li: An Efficient Threshold Group Signature Scheme. IMECS 2007: 338-340
19EEChengyu Hu, Pengtao Liu, Daxing Li: A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. MCAM 2007: 262-266
18EEGuowen Li, Jia Yu, Rupeng Li, Daxing Li: Two Threshold Multisignature Schemes from Bilinear Pairings. MUE 2007: 1041-1045
17EERupeng Li, Jia Yu, Guowen Li, Daxing Li: A New Identity-Based Blind Signature Scheme with Batch Verifications. MUE 2007: 1051-1056
16EERupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li: Key-Insulated Group Signature Scheme with Selective Revocation. MUE 2007: 1057-1063
15EEFeng Li, Jianwei Shang, Daxing Li: A Proactive Secure Multisecret Sharing Threshold Scheme. SNPD (1) 2007: 105-110
14EEChengyu Hu, Daxing Li: A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. SNPD (1) 2007: 866-868
13EEChengyu Hu, Daxing Li: Ring Blind Signature Scheme. SNPD (1) 2007: 869-871
12EEMing Li, Baodong Qin, Fanyu Kong, Daxing Li: Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. SNPD (2) 2007: 143-148
11EEGuowen Li, Jia Yu, Rupeng Li, Daxing Li: An Approach to Convert Any Threshold Signature into a Threshold Group Signature. SNPD (2) 2007: 723-726
10EEChengyu Hu, Daxing Li: Forward-Secure Traceable Ring Signature. SNPD (3) 2007: 200-204
9EERupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li: Key-Insulated Group Signature Scheme with Verifier-Local Revocation. SNPD (3) 2007: 273-278
8EEBaodong Qin, Ming Li, Fanyu Kong, Daxing Li: Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. SNPD (3) 2007: 279-284
7EEFanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li: Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. SNPD (3) 2007: 923-926
6EEJin Wang, Xi Bai, Jia Yu, Daxing Li: Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. TAMC 2007: 148-158
5EEFanyu Kong, Jia Yu, Zhun Cai, Daxing Li: New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. TAMC 2007: 189-198
2006
4EEJin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia: Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. CIS 2006: 847-857
3EEFanyu Kong, Zhun Cai, Jia Yu, Daxing Li: Improved generalized Atkin algorithm for computing square roots in finite fields. Inf. Process. Lett. 98(1): 1-5 (2006)
2005
2EEFanyu Kong, Daxing Li: A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. CANS 2005: 223-235
1994
1 Daxing Li, Shaohan Ma: Two Notes on Low-Density Subset Sum Algorithms. ISAAC 1994: 164-171

Coauthor Index

1Xi Bai [4] [6]
2Zhun Cai [3] [5]
3Xianghua Du [16]
4Chengyu Hu [10] [13] [14] [19] [20]
5Zhongtian Jia [4]
6Fanyu Kong [2] [3] [5] [7] [8] [12] [22]
7Feng Li [15]
8Guowen Li [9] [11] [16] [17] [18]
9Ming Li [7] [8] [12]
10Rupeng Li [9] [11] [16] [17] [18]
11Pengtao Liu [19]
12Xiaodong Liu [21]
13Shaohan Ma [1]
14Quan Miao [21]
15Baodong Qin [7] [8] [12] [22]
16Jianwei Shang [15]
17Jin Wang [4] [6] [9]
18Jia Yu [3] [4] [5] [6] [7] [9] [11] [16] [17] [18] [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)