2008 |
9 | EE | Liangliang Xiao,
I-Ling Yen,
Farokh B. Bastani:
Low Cost Secure Computation for the General Client-Server Computation Model.
HASE 2008: 19-26 |
8 | EE | Yunqi Ye,
I-Ling Yen,
Liangliang Xiao,
Bhavani M. Thuraisingham:
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems.
HASE 2008: 383-391 |
7 | EE | Zhifang Zhang,
Mulan Liu,
Liangliang Xiao:
Rearrangements of access structures and their realizations in secret sharing schemes.
Discrete Mathematics 308(21): 4882-4891 (2008) |
2007 |
6 | EE | Manghui Tu,
Liangliang Xiao,
Hui Ma,
I-Ling Yen,
Farokh B. Bastani:
Placement in Dependable and Secure Peer-to-Peer Data Grids.
HASE 2007: 133-140 |
5 | | Liangliang Xiao,
I-Ling Yen,
Yanjin Zhang,
Farokh B. Bastani:
Evaluating Dependable Distributed Storage Systems.
PDPTA 2007: 948-954 |
4 | EE | Mulan Liu,
Liangliang Xiao,
Zhifang Zhang:
Multiplicative Linear Secret Sharing Schemes Based on Connectivity of Graphs.
IEEE Transactions on Information Theory 53(11): 3973-3978 (2007) |
2006 |
3 | EE | Manghui Tu,
Peng Li,
Liangliang Xiao,
I-Ling Yen,
Farokh B. Bastani:
Replica Placement Algorithms for Mobile Transaction Systems.
IEEE Trans. Knowl. Data Eng. 18(7): 954-970 (2006) |
2005 |
2 | EE | Zhifang Zhang,
Mulan Liu,
Liangliang Xiao:
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes.
ASIACRYPT 2005: 156-173 |
1 | EE | Qingkai Ma,
Liangliang Xiao,
I-Ling Yen,
Manghui Tu,
Farokh B. Bastani:
An Adaptive Multiparty Protocol for Secure Data Protection.
ICPADS (1) 2005: 43-49 |