dblp.uni-trier.dewww.uni-trier.de

Yuliang Zheng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
120EEHideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security. IEEE Transactions on Information Theory 54(6): 2405-2407 (2008)
2007
119EEXintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng: Privacy Preserving Database Generation for Database Application Testing. Fundam. Inform. 78(4): 595-612 (2007)
118EEJoonsang Baek, Ron Steinfeld, Yuliang Zheng: Formal Proofs for the Security of Signcryption. J. Cryptology 20(2): 203-235 (2007)
2006
117EEXian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng: On Algebraic Immunity and Annihilators. ICISC 2006: 65-80
2005
116EENamje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng: A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. ICWE 2005: 191-196
115EEXintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Zheng: Privacy Aware Data Generation for Testing Database Applications. IDEAS 2005: 317-326
114EEZhaoyu Liu, Dichao Peng, Yuliang Zheng, Jeffrey Liu: Communication Protection in IP-based Video Surveillance Systems. ISM 2005: 69-78
113EEXintao Wu, Yongge Wang, Yuliang Zheng: Statistical Database Modeling for Privacy Preserving Database Generation. ISMIS 2005: 382-390
112EEYuliang Zheng: Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. MADNES 2005: 117
111EEMike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191
110EEYuliang Zheng, Yongge Wang: Efficient and provably secure ciphers for storage device block level encryption. StorageSS 2005: 103-107
2004
109 Kan Zhang, Yuliang Zheng: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings Springer 2004
108EEJoonsang Baek, Yuliang Zheng: Identity-Based Threshold Signature Scheme from the Bilinear Pairings. ITCC (1) 2004: 124-128
107EEGautam Singaraju, Lawrence Teo, Yuliang Zheng: A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. IWIA 2004: 79-96
106EEJoonsang Baek, Yuliang Zheng: Identity-Based Threshold Decryption. Public Key Cryptography 2004: 262-276
105EEYongge Wang, Xintao Wu, Yuliang Zheng: Privacy Preserving Data Generation for Database Application Performance Testing. TrustBus 2004: 142-151
104EERon Steinfeld, Yuliang Zheng: On the Security of RSA with Primes Sharing Least-Significant Bits. Appl. Algebra Eng. Commun. Comput. 15(3-4): 179-200 (2004)
103EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient Unconditionally Secure Digital Signatures. IEICE Transactions 87-A(1): 120-130 (2004)
102EELaurence Bull, David McG. Squire, Yuliang Zheng: A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. Int. J. on Digital Libraries 4(3): 208-222 (2004)
101EEYuliang Zheng, Xian-Mo Zhang: The Generalized XOR Lemma. Theor. Comput. Sci. 329(1-3): 331-337 (2004)
2003
100EELaurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng: Grouping Verifiable Content for Selective Disclosure. ACISP 2003: 1-12
99EESeungjoo Kim, Masahiro Mambo, Yuliang Zheng: Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243
98 Yongge Wang, Yuliang Zheng, Bei-tseng Chu: Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. IC-AI 2003: 17-22
97EEYongge Wang, Yuliang Zheng: Fast and Secure Magnetic WORM Storage Systems. IEEE Security in Storage Workshop 2003: 11-19
96EELawrence Teo, Yuliang Zheng, Gail-Joon Ahn: Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88
95EELawrence Teo, Gail-Joon Ahn, Yuliang Zheng: Dynamic and risk-aware network access management. SACMAT 2003: 217-230
94EEXintao Wu, Yongge Wang, Yuliang Zheng: Privacy preserving database application testing. WPES 2003: 118-128
93EEJoonsang Baek, Yuliang Zheng: Zheng and Seberry's public key encryption scheme revisited. Int. J. Inf. Sec. 2(1): 37-44 (2003)
92 Yuliang Zheng, Xian-Mo Zhang: Connections among nonlinearity, avalanche and correlation immunity. Theor. Comput. Sci. 292(3): 697-710 (2003)
2002
91 Yuliang Zheng: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings Springer 2002
90EERon Steinfeld, Joonsang Baek, Yuliang Zheng: On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ACISP 2002: 241-256
89EEJunji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449
88EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79
87EEJoonsang Baek, Ron Steinfeld, Yuliang Zheng: Formal Proofs for the Security of Signcryption. Public Key Cryptography 2002: 80-98
86EEGoichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002)
2001
85EEKhaled M. Khan, Jun Han, Yuliang Zheng: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Australian Software Engineering Conference 2001: 117-126
84EERon Steinfeld, Yuliang Zheng: An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. CT-RSA 2001: 52-62
83EERon Steinfeld, Laurence Bull, Yuliang Zheng: Content Extraction Signatures. ICISC 2001: 285-304
82EESeungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127
81EEYuliang Zheng: Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Public Key Cryptography 2001: 48-63
80 Yuliang Zheng, Xian-Mo Zhang: On plateaued functions. IEEE Transactions on Information Theory 47(3): 1215-1223 (2001)
2000
79 Hideki Imai, Yuliang Zheng: Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings Springer 2000
78 Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng: High Performance Agile Crypto Modules. ACISP 2000: 74-88
77EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142
76EEYuliang Zheng, Xian-Mo Zhang: On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. ASIACRYPT 2000: 470-482
75EEKhaled M. Khan, Jun Han, Yuliang Zheng: Characterizing User Data Protection of Software Components. Australian Software Engineering Conference 2000: 3-12
74 Tim Ebringer, Yuliang Zheng, Peter Thorne: Parasitic Authentication. CARDIS 2000: 307-326
73EEYuliang Zheng, Xian-Mo Zhang: New Results on Correlation Immunity. ICISC 2000: 49-63
72EESung-Ming Yen, Yuliang Zheng: Weighted One-Way Hash Chain and Its Applications. ISW 2000: 135-148
71EERon Steinfeld, Yuliang Zheng: A Signcryption Scheme Based on Integer Factorization. ISW 2000: 308-322
70EEYuliang Zheng, Xian-Mo Zhang: Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. Selected Areas in Cryptography 2000: 262-274
69EEKhaled M. Khan, Jun Han, Yuliang Zheng: Security Characterization of Software Components and Their Composition. TOOLS (36) 2000: 240-249
68 Xian-Mo Zhang, Yuliang Zheng, Hideki Imai: Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. Des. Codes Cryptography 19(1): 45-63 (2000)
67EETim Ebringer, Peter Thorne, Yuliang Zheng: Parasitic Authentication To Protect Your E-Wallet. IEEE Computer 33(10): 54-60 (2000)
66EEYuliang Zheng, Xian-Mo Zhang: The kth-Order Nonhomomorphicity of S-Boxes. J. UCS 6(8): 830-848 (2000)
1999
65 Hideki Imai, Yuliang Zheng: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings Springer 1999
64 Masahiro Mambo, Yuliang Zheng: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings Springer 1999
63EEJussipekka Leiwo, Chandana Gamage, Yuliang Zheng: Organizational Modeling for Efficient Specification of Information Security Requirements. ADBIS 1999: 247-260
62 Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362
61 Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai: Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102
60 Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168
59 Yuliang Zheng, Xian-Mo Zhang: Plateaued Functions. ICICS 1999: 284-300
58 Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng: Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. ICISC 1999: 120-131
57 Yuliang Zheng, Xian-Mo Zhang: Relationships between Bent Functions and Complementary Plateaued Functions. ICISC 1999: 60-75
56EEHye-Joo Lee, Ji-Hwan Park, Yuliang Zheng: Digital Watermarking Robust Against JPEG Compression. ISW 1999: 167-190
55EEKhaled M. Khan, Jun Han, Yuliang Zheng: Security Properties of Software Components. ISW 1999: 52-56
54EEChandana Gamage, Jussipekka Leiwo, Yuliang Zheng: Encrypted Message Authentication by Firewalls. Public Key Cryptography 1999: 69-81
53EEYuliang Zheng, Xian-Mo Zhang: Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. Selected Areas in Cryptography 1999: 92-105
52EEYuliang Zheng, Xian-Mo Zhang, Hideki Imai: Restriction, Terms and Nonlinearity of Boolean Functions. Theor. Comput. Sci. 226(1-2): 207-223 (1999)
1998
51 Hideki Imai, Yuliang Zheng: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings Springer 1998
50EEGoichiro Hanaoka, Yuliang Zheng, Hideki Imai: LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226
49 Yuliang Zheng, Xian-Mo Zhang: The nonhomomorphicity of S-boxes. ICISC 1998: 131-145
48 Yuliang Zheng, Hideki Imai: Compact and Unforgeable Key Establishment over an ATM Network. INFOCOM 1998: 411-418
47EEMiodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai: A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233
46EEXian-Mo Zhang, Yuliang Zheng: The Nonhomomorphicity of Boolean Functions. Selected Areas in Cryptography 1998: 280-295
45 Kanta Matsuura, Yuliang Zheng, Hideki Imai: Compact and Flexible Resolution of CBT Multicast Key-Distribution. WWCA 1998: 190-205
44EEYuliang Zheng, Hideki Imai: How to Construct Efficient Signcryption Schemes on Elliptic Curves. Inf. Process. Lett. 68(5): 227-233 (1998)
1997
43 Xian-Mo Zhang, Yuliang Zheng: New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. ACISP 1997: 147-158
42 Jussipekka Leiwo, Yuliang Zheng: A Method to Implement a Denial of Service Protection Base. ACISP 1997: 90-101
41EEYuliang Zheng: Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). CRYPTO 1997: 165-179
40 Yuliang Zheng: The SPEED Cipher. Financial Cryptography 1997: 71-90
39 Xian-Mo Zhang, Yuliang Zheng, Hideki Imai: Duality of Boolean functions and its cryptographic significance. ICICS 1997: 159-169
38 Jussipekka Leiwo, Yuliang Zheng: A Framework for the Management of Information Security. ISW 1997: 232-245
37 Yuliang Zheng: Signcryption and Its Applications in Efficient Public Key Solutions. ISW 1997: 291-312
36 Jussipekka Leiwo, Yuliang Zheng: A formal model to aid documenting and harmonizing of information security requirements. SEC 1997: 25-38
35 Xian-Mo Zhang, Yuliang Zheng: Cryptographically resilient functions. IEEE Transactions on Information Theory 43(5): 1740-1747 (1997)
1996
34 Yi Mu, Yuliang Zheng: An alternative model of quantum key agreement via photon coupling. ACISP 1996: 320-331
33EEXian-Mo Zhang, Yuliang Zheng: Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. EUROCRYPT 1996: 294-306
32 Yuliang Zheng: An Authentication and Security Protocol for Mobile Computing. IFIP World Conference on Mobile Communications 1996: 249-257
31 Kouichi Sakurai, Yuliang Zheng: Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ISAAC 1996: 376-385
30 Xian-Mo Zhang, Yuliang Zheng: Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. Des. Codes Cryptography 7(1-2): 111-134 (1996)
29 Xian-Mo Zhang, Yuliang Zheng: On the Difficulty of Constructing Cryptographically Strong Substitution Boxes. J. UCS 2(3): 147-162 (1996)
1995
28EEXian-Mo Zhang, Yuliang Zheng: On Nonlinear Resilient Functions (Extended Abstract). EUROCRYPT 1995: 274-288
27 Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Nonlinearity and Propagation Characteristics of Balanced Boolean Functions Inf. Comput. 119(1): 1-13 (1995)
26EEYuliang Zheng: On Key Agreement Protocols Based on Tamper-Proof Hardware. Inf. Process. Lett. 53(1): 49-54 (1995)
25EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. J. UCS 1(2): 136-150 (1995)
1994
24 Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). ASIACRYPT 1994: 119-132
23EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Pitfalls in Designing Substitution Boxes (Extended Abstract). CRYPTO 1994: 383-396
22EEAzad Jiwa, Jennifer Seberry, Yuliang Zheng: Beacon Based Authentication. ESORICS 1994: 125-141
21EEYuliang Zheng: How to Break and Repair Leighton and Micali's Key Agreement Protocol. EUROCRYPT 1994: 299-305
20EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Relationships Among Nonlinear Criteria (Extended Abstract). EUROCRYPT 1994: 376-388
19EEChris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng: Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438
18 Thomas Hardjono, Yuliang Zheng, Jennifer Seberry: Kuperee: An Approach to Authentication using Public Keys. ULPAA 1994: 65-76
17 Yuliang Zheng, Thomas Hardjono, Jennifer Seberry: Reusing Shares in Secret Sharing Schemes. Comput. J. 37(3): 199-205 (1994)
16EEThomas Hardjono, Yuliang Zheng, Jennifer Seberry: Database authentication revisited. Computers & Security 13(7): 573-580 (1994)
15 Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Improving the Strict Avalanche Characteristics of Cryptographic Functions. Inf. Process. Lett. 50(1): 37-41 (1994)
1993
14 Jennifer Seberry, Yuliang Zheng: Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings Springer 1993
13EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Systematic Generation of Cryptographically Robust S-Boxes. ACM Conference on Computer and Communications Security 1993: 171-182
12EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). CRYPTO 1993: 49-60
11EEJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng: On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). EUROCRYPT 1993: 181-199
10 Yuliang Zheng, Jennifer Seberry: Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. IEEE Journal on Selected Areas in Communications 11(5): 715-724 (1993)
1992
9 Thomas Hardjono, Yuliang Zheng: A Practical Digital Multisignature Scheme Based on Discrete Logarithms. AUSCRYPT 1992: 122-132
8 Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104
7EEYuliang Zheng, Jennifer Seberry: Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). CRYPTO 1992: 292-304
1991
6 Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk: Sibling Intractable Function Families and Their Applications (Extended Abstract). ASIACRYPT 1991: 124-138
5 Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk: How to Construct A Family of Strong One Way Permutations. ASIACRYPT 1991: 97-110
1990
4 Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Duality between Two Cryptographic Primitives. AAECC 1990: 379-390
3EEYuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Structural Properties of One-way Hash Functions. CRYPTO 1990: 285-302
1989
2EEYuliang Zheng, Tsutomu Matsumoto, Hideki Imai: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. CRYPTO 1989: 461-480
1EEYuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). EUROCRYPT 1989: 412-422

Coauthor Index

1Gail-Joon Ahn [95] [96]
2Joonsang Baek [87] [90] [93] [106] [108] [118]
3Laurence Bull [83] [100] [102]
4Mike Burmester [111]
5Chris Charnes [19]
6Jung Hee Cheon [82]
7Bei-tseng Chu [98]
8Kyoil Chung [116]
9Tim Ebringer [67] [74]
10Chandana Gamage [54] [58] [63] [78]
11Virgil D. Gligor [111]
12Songtao Guo [119]
13Jun Han [55] [69] [75] [85]
14Goichiro Hanaoka [50] [60] [62] [77] [86] [88] [89] [103] [120]
15Thomas Hardjono [6] [9] [16] [17] [18]
16Hideki Imai [1] [2] [3] [4] [39] [44] [45] [47] [48] [50] [51] [52] [60] [61] [62] [65] [68] [77] [79] [86] [88] [89] [103] [120]
17Azad Jiwa [22]
18Marc Joye [82]
19Khaled M. Khan [55] [69] [75] [85]
20Seungjoo Kim [82] [99]
21Evangelos Kranakis [111]
22Hye-Joo Lee [56]
23Jussipekka Leiwo [36] [38] [42] [54] [58] [63] [78]
24Seongan Lim [82]
25Jeffrey Liu [114]
26Zhaoyu Liu [114]
27Masahiro Mambo [64] [82] [99]
28Tsutomu Matsumoto [1] [2] [3] [4]
29Kanta Matsuura [45]
30Ueli M. Maurer [120]
31Miodrag J. Mihaljevic [47]
32Kiyoung Moon [116]
33Yi Mu [34]
34Jan Newmarch [100]
35Tsuyoshi Nishioka [60] [62] [86]
36Luke O'Connor [19]
37Ji-Hwan Park [56]
38Namje Park [116]
39Dichao Peng [114]
40Josef Pieprzyk [5] [6] [8] [19] [117]
41Babak Sadeghiyan [5]
42Reihaneh Safavi-Naini [19]
43Kouichi Sakurai [31]
44Chintan Sanghvi [115]
45Jennifer Seberry (Jennifer Seberry Wallis) [7] [8] [10] [11] [12] [13] [14] [15] [16] [17] [18] [20] [22] [23] [24] [25] [27]
46Junji Shikata [61] [77] [88] [89] [103]
47Gautam Singaraju [107]
48David McG. Squire (David Squire) [100] [102]
49Ron Steinfeld [71] [83] [84] [87] [90] [104] [118]
50Joe Suzuki [61]
51Lawrence Teo [95] [96] [107]
52Peter Thorne [67] [74]
53J. Doug Tygar (J. D. Tygar) [111]
54Yongge Wang [94] [97] [98] [105] [110] [113] [115] [119]
55Dongho Won [82] [116]
56Xintao Wu [94] [105] [113] [115] [119]
57Sung-Ming Yen [72]
58Kan Zhang [109]
59Xian-Mo Zhang [11] [12] [13] [15] [20] [23] [24] [25] [27] [28] [29] [30] [33] [35] [39] [43] [46] [49] [52] [53] [57] [59] [66] [68] [70] [73] [76] [80] [92] [101] [117]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)