2008 |
19 | EE | Jiangtao Li,
Hyo Jong Lee,
Gi Sung Cho:
Parallel Algorithm for Road Points Extraction from Massive LiDAR Data.
ISPA 2008: 308-315 |
18 | EE | Ernie Brickell,
Liqun Chen,
Jiangtao Li:
A New Direct Anonymous Attestation Scheme from Bilinear Maps.
TRUST 2008: 166-178 |
17 | EE | Rui Xue,
Ninghui Li,
Jiangtao Li:
Algebraic Construction for Zero-Knowledge Sets.
J. Comput. Sci. Technol. 23(2): 166-175 (2008) |
2007 |
16 | EE | Jiangtao Li,
Ninghui Li,
Rui Xue:
Universal Accumulators with Efficient Nonmembership Proofs.
ACNS 2007: 253-269 |
15 | EE | Ian Molloy,
Jiangtao Li,
Ninghui Li:
Dynamic Virtual Credit Card Numbers.
Financial Cryptography 2007: 208-223 |
14 | EE | Ernie Brickell,
Jiangtao Li:
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities.
WPES 2007: 21-30 |
2006 |
13 | EE | Mikhail J. Atallah,
Marina Blanton,
Keith B. Frikken,
Jiangtao Li:
Efficient Correlated Action Selection.
Financial Cryptography 2006: 296-310 |
12 | EE | Jiangtao Li,
Ninghui Li:
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.
ICICS 2006: 122-138 |
11 | EE | Keith B. Frikken,
Jiangtao Li,
Mikhail J. Atallah:
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
NDSS 2006 |
10 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Jiangtao Li:
Attribute-Based Access Control with Hidden Policies and Hidden Credentials.
IEEE Trans. Computers 55(10): 1259-1270 (2006) |
9 | EE | Jiangtao Li,
Ninghui Li:
OACerts: Oblivious Attribute Certificates.
IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006) |
2005 |
8 | EE | Jiangtao Li,
Ninghui Li,
William H. Winsborough:
Automated trust negotiation using cryptographic credentials.
ACM Conference on Computer and Communications Security 2005: 46-57 |
7 | EE | Jiangtao Li,
Ninghui Li:
OACerts: Oblivious Attribute Certificates.
ACNS 2005: 301-317 |
6 | EE | Jiangtao Li,
Ninghui Li:
Policy-hiding access control in open environment.
PODC 2005: 29-38 |
5 | EE | Mikhail J. Atallah,
Jiangtao Li:
Secure outsourcing of sequence comparisons .
Int. J. Inf. Sec. 4(4): 277-287 (2005) |
2004 |
4 | EE | Mikhail J. Atallah,
Jiangtao Li:
Secure Outsourcing of Sequence Comparisons.
Privacy Enhancing Technologies 2004: 63-78 |
3 | EE | Mikhail J. Atallah,
Marina Bykova,
Jiangtao Li,
Keith B. Frikken,
Mercan Topkara:
Private collaborative forecasting and benchmarking.
WPES 2004: 103-114 |
2 | EE | Keith B. Frikken,
Mikhail J. Atallah,
Jiangtao Li:
Hidden access control policies with hidden credentials.
WPES 2004: 27 |
2003 |
1 | EE | Mikhail J. Atallah,
Jiangtao Li:
Enhanced Smart-card based License Management.
CEC 2003: 111-119 |