2009 |
23 | EE | Junzuo Lai,
Robert H. Deng,
Shengli Liu,
Weidong Kou:
RSA-Based Certificateless Public Key Encryption.
ISPEC 2009: 24-34 |
2008 |
22 | EE | Robert H. Deng,
Jian Weng,
Shengli Liu,
Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
CANS 2008: 1-17 |
21 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Dong Zheng,
Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
CT-RSA 2008: 203-220 |
20 | EE | Xiaoyan Sun,
Yang Wang,
Jie Ren,
Yuefei Zhu,
Shengli Liu:
Collecting Internet Malware Based on Client-side Honeypot.
ICYCS 2008: 1493-1498 |
19 | EE | Shengli Liu,
Wenbing Wang,
Yuefei Zhu:
A New-Style Domain Integrating Management of Windows and UNIX.
WAIM 2008: 619-624 |
18 | EE | Shengli Liu,
Xiaofeng Chen,
Fang-Guo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol. 23(2): 265-269 (2008) |
17 | EE | Jian Weng,
Xiangxue Li,
Kefei Chen,
Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) |
2007 |
16 | EE | Shengli Liu,
Kefei Chen,
Weidong Qiu:
Identity-Based Threshold Decryption Revisited.
ISPEC 2007: 329-343 |
15 | EE | Yu Long,
Kefei Chen,
Shengli Liu:
ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Computers & Electrical Engineering 33(3): 166-176 (2007) |
14 | EE | Xiaofeng Chen,
Fangguo Zhang,
Shengli Liu:
ID-based restrictive partially blind signatures and applications.
Journal of Systems and Software 80(2): 164-171 (2007) |
13 | EE | Jian Weng,
Shengli Liu,
Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Science in China Series F: Information Sciences 50(3): 318-323 (2007) |
2006 |
12 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles.
CIS 2006: 470-480 |
11 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
INDOCRYPT 2006: 409-423 |
10 | EE | Jian Weng,
Shengli Liu,
Kefei Chen,
Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates.
Inscrypt 2006: 13-26 |
9 | EE | Yu Long,
Kefei Chen,
Shengli Liu:
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, Lith. Acad. Sci. 17(4): 519-534 (2006) |
2005 |
8 | EE | Xiaofeng Chen,
Fangguo Zhang,
Shengli Liu:
ID-Based Restrictive Partially Blind Signatures.
CIS (2) 2005: 117-124 |
7 | EE | Changshe Ma,
Kefei Chen,
Dong Zheng,
Shengli Liu:
Efficient and Proactive Threshold Signcryption.
ISC 2005: 233-243 |
6 | | Changshe Ma,
Kefei Chen,
Shengli Liu,
Dong Zheng:
Transitive Signatures Based on Bilinear Maps.
WOSIS 2005: 48-56 |
2004 |
5 | EE | Shengli Liu,
Fang-Guo Zhang,
Kefei Chen:
Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol. 19(2): 169-176 (2004) |
2003 |
4 | EE | Shengli Liu,
Henk C. A. van Tilborg,
Marten van Dijk:
A Practical Protocol for Advantage Distillation and Information Reconciliation.
Des. Codes Cryptography 30(1): 39-62 (2003) |
2002 |
3 | EE | Fangguo Zhang,
Shengli Liu,
Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
ACISP 2002: 203-213 |
2000 |
2 | EE | Chenzhong Cao,
Hua Yuan,
Shengli Liu,
Rongjin Zeng:
On Molecular Polarizability: 3. Relationship to the Ionization Potential of Haloalkanes, Amines, Alcohols, and Ethers.
Journal of Chemical Information and Computer Sciences 40(4): 1010-1014 (2000) |
1999 |
1 | | Shengli Liu,
Yumin Wang:
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement.
AAECC 1999: 294-301 |