| 2009 |
| 23 | EE | Junzuo Lai,
Robert H. Deng,
Shengli Liu,
Weidong Kou:
RSA-Based Certificateless Public Key Encryption.
ISPEC 2009: 24-34 |
| 2008 |
| 22 | EE | Robert H. Deng,
Jian Weng,
Shengli Liu,
Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
CANS 2008: 1-17 |
| 21 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Dong Zheng,
Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
CT-RSA 2008: 203-220 |
| 20 | EE | Xiaoyan Sun,
Yang Wang,
Jie Ren,
Yuefei Zhu,
Shengli Liu:
Collecting Internet Malware Based on Client-side Honeypot.
ICYCS 2008: 1493-1498 |
| 19 | EE | Shengli Liu,
Wenbing Wang,
Yuefei Zhu:
A New-Style Domain Integrating Management of Windows and UNIX.
WAIM 2008: 619-624 |
| 18 | EE | Shengli Liu,
Xiaofeng Chen,
Fang-Guo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol. 23(2): 265-269 (2008) |
| 17 | EE | Jian Weng,
Xiangxue Li,
Kefei Chen,
Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) |
| 2007 |
| 16 | EE | Shengli Liu,
Kefei Chen,
Weidong Qiu:
Identity-Based Threshold Decryption Revisited.
ISPEC 2007: 329-343 |
| 15 | EE | Yu Long,
Kefei Chen,
Shengli Liu:
ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Computers & Electrical Engineering 33(3): 166-176 (2007) |
| 14 | EE | Xiaofeng Chen,
Fangguo Zhang,
Shengli Liu:
ID-based restrictive partially blind signatures and applications.
Journal of Systems and Software 80(2): 164-171 (2007) |
| 13 | EE | Jian Weng,
Shengli Liu,
Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Science in China Series F: Information Sciences 50(3): 318-323 (2007) |
| 2006 |
| 12 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles.
CIS 2006: 470-480 |
| 11 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
INDOCRYPT 2006: 409-423 |
| 10 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates.
Inscrypt 2006: 13-26 |
| 9 | EE | Yu Long,
Kefei Chen,
Shengli Liu:
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, Lith. Acad. Sci. 17(4): 519-534 (2006) |
| 2005 |
| 8 | EE | Xiaofeng Chen,
Fangguo Zhang,
Shengli Liu:
ID-Based Restrictive Partially Blind Signatures.
CIS (2) 2005: 117-124 |
| 7 | EE | Changshe Ma,
Kefei Chen,
Dong Zheng,
Shengli Liu:
Efficient and Proactive Threshold Signcryption.
ISC 2005: 233-243 |
| 6 | | Changshe Ma,
Kefei Chen,
Shengli Liu,
Dong Zheng:
Transitive Signatures Based on Bilinear Maps.
WOSIS 2005: 48-56 |
| 2004 |
| 5 | EE | Shengli Liu,
Fang-Guo Zhang,
Kefei Chen:
Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol. 19(2): 169-176 (2004) |
| 2003 |
| 4 | EE | Shengli Liu,
Henk C. A. van Tilborg,
Marten van Dijk:
A Practical Protocol for Advantage Distillation and Information Reconciliation.
Des. Codes Cryptography 30(1): 39-62 (2003) |
| 2002 |
| 3 | EE | Fangguo Zhang,
Shengli Liu,
Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
ACISP 2002: 203-213 |
| 2000 |
| 2 | EE | Chenzhong Cao,
Hua Yuan,
Shengli Liu,
Rongjin Zeng:
On Molecular Polarizability: 3. Relationship to the Ionization Potential of Haloalkanes, Amines, Alcohols, and Ethers.
Journal of Chemical Information and Computer Sciences 40(4): 1010-1014 (2000) |
| 1999 |
| 1 | | Shengli Liu,
Yumin Wang:
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement.
AAECC 1999: 294-301 |