dblp.uni-trier.dewww.uni-trier.de

Jiangtao Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEJiangtao Li, Hyo Jong Lee, Gi Sung Cho: Parallel Algorithm for Road Points Extraction from Massive LiDAR Data. ISPA 2008: 308-315
18EEErnie Brickell, Liqun Chen, Jiangtao Li: A New Direct Anonymous Attestation Scheme from Bilinear Maps. TRUST 2008: 166-178
17EERui Xue, Ninghui Li, Jiangtao Li: Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008)
2007
16EEJiangtao Li, Ninghui Li, Rui Xue: Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269
15EEIan Molloy, Jiangtao Li, Ninghui Li: Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223
14EEErnie Brickell, Jiangtao Li: Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. WPES 2007: 21-30
2006
13EEMikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li: Efficient Correlated Action Selection. Financial Cryptography 2006: 296-310
12EEJiangtao Li, Ninghui Li: A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138
11EEKeith B. Frikken, Jiangtao Li, Mikhail J. Atallah: Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. NDSS 2006
10EEKeith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Trans. Computers 55(10): 1259-1270 (2006)
9EEJiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006)
2005
8EEJiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57
7EEJiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. ACNS 2005: 301-317
6EEJiangtao Li, Ninghui Li: Policy-hiding access control in open environment. PODC 2005: 29-38
5EEMikhail J. Atallah, Jiangtao Li: Secure outsourcing of sequence comparisons . Int. J. Inf. Sec. 4(4): 277-287 (2005)
2004
4EEMikhail J. Atallah, Jiangtao Li: Secure Outsourcing of Sequence Comparisons. Privacy Enhancing Technologies 2004: 63-78
3EEMikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara: Private collaborative forecasting and benchmarking. WPES 2004: 103-114
2EEKeith B. Frikken, Mikhail J. Atallah, Jiangtao Li: Hidden access control policies with hidden credentials. WPES 2004: 27
2003
1EEMikhail J. Atallah, Jiangtao Li: Enhanced Smart-card based License Management. CEC 2003: 111-119

Coauthor Index

1Mikhail J. Atallah [1] [2] [3] [4] [5] [10] [11] [13]
2Marina Blanton (Marina Bykova) [3] [13]
3Ernie Brickell [14] [18]
4Liqun Chen [18]
5Gi Sung Cho [19]
6Keith B. Frikken [2] [3] [10] [11] [13]
7Hyo Jong Lee [19]
8Ninghui Li [6] [7] [8] [9] [12] [15] [16] [17]
9Ian Molloy [15]
10Mercan Topkara (Mercan Karahan) [3]
11William H. Winsborough [8]
12Rui Xue [16] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)