2008 |
9 | EE | Lihua Liu,
Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme.
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 181-187 |
2007 |
8 | EE | Zhengjun Cao,
Lihua Liu:
Boudot's Range-Bounded Commitment Scheme Revisited.
ICICS 2007: 230-238 |
7 | EE | Zhengjun Cao,
Lihua Liu:
A Strong RSA Signature Scheme and Its Application.
SNPD (1) 2007: 111-115 |
2006 |
6 | EE | Haeryong Park,
Zhengjun Cao,
Lihua Liu,
Seongan Lim,
Ikkwon Yie,
Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Inscrypt 2006: 1-12 |
5 | EE | Lihua Liu,
Hao Shen:
Explicit constructions of separating hash families from algebraic curves over finite fields.
Des. Codes Cryptography 41(2): 221-233 (2006) |
4 | EE | Lihua Liu,
Zhengjun Cao:
On computing ordN(2) and its application.
Inf. Comput. 204(7): 1173-1178 (2006) |
2005 |
3 | EE | Fang Zhao,
Zhenyu Xuan,
Lihua Liu,
Michael Q. Zhang:
TRED: a Transcriptional Regulatory Element Database and a platform for in silico gene regulation studies.
Nucleic Acids Research 33(Database-Issue): 103-107 (2005) |
2000 |
2 | EE | Jianer Chen,
Lihua Liu,
Songqiao Chen,
Weijia Jia:
An Intuitive and Effective New Representation for Interconnection Network Structures.
ISAAC 2000: 350-361 |
1 | EE | Jianer Chen,
Lihua Liu,
Weijia Jia:
Improvement on vertex cover for low-degree graphs.
Networks 35(4): 253-259 (2000) |