![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Feng Liu 0001
Person information
- affiliation: Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Software, Beijing, China
Other persons with the same name
- Feng Liu — disambiguation page
- Feng Liu 0002
— Nanjing University of Science and Technology, School of Electronic and Optical Engineering, China
- Feng Liu 0003
(aka: Feng (Alex) Liu) — University of Melbourne, School of Mathematics and Statistics, Australia (and 2 more)
- Feng Liu 0004
— Shanghai Maritime University, College of Information Engineering, China
- Feng Liu 0005
— The University of Queensland, School of Information Technology and Electrical Engineering, Brisbane, QLD, Australia
- Feng Liu 0006
— Nanjing University, Department of Physics, China
- Feng Liu 0007
— Chinese Academy of Sciences, State Key Laboratory of Membrane Biology, Institute of Zoology, Beijing, China
- Feng Liu 0008 — Hefei University of Technology, School of Economics / Research Center of Industry Information, China
- Feng Liu 0009
— Beihang University, Department of School of Astronautics, Beijing, China (and 1 more)
- Feng Liu 0010
— Beihang University, School of Electronics and Information Engineering, Beijing, China (and 1 more)
- Feng Liu 0011
— Stevens Institute of Technology, School of Systems and Enterprises, Hoboken, NJ, USA (and 4 more)
- Feng Liu 0012
— Nankai University, College of Electronic Information and Optical Engineering, Tianjin, China (and 1 more)
- Feng Liu 0013
— Shenzhen University, School of Computer Science and Software Engineering, China (and 2 more)
- Feng Liu 0014
— Tsinghua University, Department of Electrical Engineering, State Key Laboratory of Power Systems, Beijing, China
- Feng Liu 0015
— Portland State University, Computer Science Department, OR, USA (and 2 more)
- Feng Liu 0016 — Avaya Labs Research, Basking Ridge, NJ, USA
- Feng Liu 0017 — Shanghai Jiao Tong University, Institute of Image Processing and Pattern Recognition, China
- Feng Liu 0018 — Nanjing University of Finance and Economics, School of Information Engineering, China
- Feng Liu 0019 — Southwest University, Faculty of Materials and Energy, Institute for Clean Energy and Advanced Materials, Chongqing, China
- Feng Liu 0020
— Dongbei University of Finance and Economics, School of Management Science and Engineering, Dalian, China (and 1 more)
- Feng Liu 0021 — Ludwig Maximilians University Munich, Germany
- Feng Liu 0022
— Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Feng Liu 0023
— Beihang University, School of Instrumentation and Optoelectronic Engineering, Beijing, China
- Feng Liu 0024
— Anhui University, School of Computer Science and Technology, Hefei, China
- Feng Liu 0025
— Xidian University, Key Laboratory of Antennas and Microwave Technologies, Xi'an, China
- Feng Liu 0026
— Harbin Engineering University, College of Shipbuilding Engineering, Harbin, China
- Feng Liu 0027
— Beijing Jiaotong University, School of Electronic and Information Engineering, Beijing, China
- Feng Liu 0028
— Nanjing University of Posts and Telecommunications, Jiangsu Provincial Key Lab of Image Processing and Image Communication, Nanjing, China
- Feng Liu 0029 — National University of Defense Technology, School of Computer Science, National Lab of Parallel Distributed Processing, Changsha, China
- Feng Liu 0030 — Chinese Academy of Sciences, Research Center on Fictitious Economy and Data Science, Beijing, China (and 2 more)
- Feng Liu 0031 — Vrije Universiteit Brussel, Computational Modeling Lab, Brussels, Belgium
- Feng Liu 0032
— National University of Defense Technology, College of Electronic Engineering, Hefei, China
- Feng Liu 0033
— Columbia University Medical Center, Department of Psychiatry, New York, NY, USA (and 1 more)
- Feng Liu 0034 — Harbin Institute of Technology, Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen, China
- Feng Liu 0035
— Tianjin Medical University, Department of Radiology, Tianjin Key Laboratory of Functional Imaging, Tianjin, China (and 1 more)
- Feng Liu 0036
— Deepwise AI Lab, Beijing, China (and 2 more)
- Feng Liu 0037
— Michigan State University, Department of Computer Science and Engineering, Computer Vision Lab, East Lansing, MI, USA (and 1 more)
- Feng Liu 0038
— Nanjing Tech University, College of Electrical Engineering and Control Science, China (and 2 more)
- Feng Liu 0039
— East China Normal University, China
- Feng Liu 0040 — Huawei Munich Research Center, Germany
- Feng Liu 0041 — Harbin Institute of Technology, School of Computer Science and Technology, China
- Feng Liu 0042
— China University of Geosciences, School of Automation, Wuhan, China (and 1 more)
- Feng Liu 0043 — Nanyang Technological University, Center of Computational Intelligence, Singapore
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Huaifeng Bao, Wenhao Li
, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang
, Feng Liu
, Wen Wang:
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention. Comput. Secur. 144: 103943 (2024) - [c44]Faqi Zhao
, Duohe Ma
, Wenhao Li
, Feng Liu
, Wen Wang
:
Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation. CCS 2024: 5033-5035 - [c43]Huaifeng Bao
, Wenhao Li
, Zhaoxuan Li
, Han Miao
, Wen Wang
, Feng Liu
:
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network. CCS 2024: 5063-5065 - [c42]Huaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin, Wen Wang, Feng Liu:
CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction. CSCWD 2024: 2534-2540 - [c41]Weixia Cai, Hong Chen, Huashan Chen, Feng Liu:
Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks. ICIC (2) 2024: 504-516 - 2023
- [j32]Jiazhi Liu
, Feng Liu
:
Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects. ACM Trans. Multim. Comput. Commun. Appl. 19(1s): 47:1-47:16 (2023) - [c40]Huaifeng Bao, Wen Wang, Feng Liu:
Towards Open-Set APT Malware Classification under Few-Shot Setting. GLOBECOM 2023: 6844-6849 - [c39]Huaifeng Bao, Wenhao Li, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang, Feng Liu:
Payload Level Graph Attention Network for Web Attack Traffic Detection. ICCS (5) 2023: 394-407 - [c38]Weixia Cai, Huashan Chen, Feng Liu:
Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy. SciSec 2023: 42-59 - [c37]Han Miao, Huaifeng Bao, Zixian Tang, Wenhao Li, Wen Wang, Huashan Chen, Feng Liu, Yanhui Sun:
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection. SciSec 2023: 207-224 - 2022
- [c36]Yuantian Zhang, Feng Liu, Huashan Chen:
Optimal strategy selection for attack graph games using deep reinforcement learning. HPCC/DSS/SmartCity/DependSys 2022: 823-830 - [c35]Jiazhi Liu, Feng Liu:
A Novel Stereo Matching Pipeline with Robustness and Unfixed Disparity Search Range. ICME 2022: 1-6 - [c34]Jiazhi Liu, Feng Liu:
Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range. ICPR 2022: 4016-4022 - [c33]Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying:
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree. MILCOM 2022: 458-463 - [c32]Kun Jia
, Jiazhi Liu, Wen Wang, Feng Liu:
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. SciSec 2022: 170-185 - [c31]Yuantian Zhang, Feng Liu, Huashan Chen:
Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1841-1847 - [i7]Jiazhi Liu, Feng Liu:
A novel stereo matching pipeline with robustness and unfixed disparity search range. CoRR abs/2204.04865 (2022) - 2021
- [c30]Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification. ICCS (1) 2021: 41-54 - [c29]Zixian Tang, Qiang Wang
, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
Mining Trojan Detection Based on Multi-dimensional Static Features. SciSec 2021: 51-65 - [e5]Wenlian Lu, Kun Sun, Moti Yung, Feng Liu:
Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13005, Springer 2021, ISBN 978-3-030-89136-7 [contents] - 2020
- [j31]Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang:
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. Int. J. Digit. Crime Forensics 12(1): 109-130 (2020) - [c28]Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense. ICWS 2020: 364-371 - [c27]Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. IPCCC 2020: 1-8
2010 – 2019
- 2019
- [j30]Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia:
Dynamical model for individual defence against cyber epidemic attacks. IET Inf. Secur. 13(6): 541-551 (2019) - [j29]YaWei Ren
, Feng Liu, Wei Qi Yan, Wen Wang:
A new visual evaluation criterion of visual cryptography scheme for character secret image. Multim. Tools Appl. 78(18): 25299-25319 (2019) - [c26]Dingyu Yan, Feng Liu, Kun Jia:
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network. ICC 2019: 1-7 - [c25]Dingyu Yan, Feng Liu:
A Heuristic Method for Network Modification Against Cyber Epidemic Attacks. TrustCom/BigDataSE 2019: 184-191 - [e4]Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2 [contents] - 2018
- [j28]Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao:
Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci. China Inf. Sci. 61(3): 039103:1-039103:3 (2018) - [j27]Wei Qi Yan, Xiaotian Wu, Feng Liu:
Progressive Scrambling for Social Media. Int. J. Digit. Crime Forensics 10(2): 56-73 (2018) - [j26]Teng Guo, Feng Liu, Wen Wang:
Visual Gambling. Int. J. Digit. Crime Forensics 10(3): 43-49 (2018) - [j25]Fan Wu, Ran Sun, Wenhao Fan, Yuanan Liu, Feng Liu, Hui Lu:
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control. Int. J. Digit. Crime Forensics 10(3): 95-113 (2018) - [j24]Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu:
Visual cryptograms of random grids via linear algebra. Multim. Tools Appl. 77(10): 12871-12899 (2018) - [j23]Tao Xu
, Feng Liu, Chuankun Wu:
A white-box AES-like implementation based on key-dependent substitution-linear transformations. Multim. Tools Appl. 77(14): 18117-18137 (2018) - [c24]Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia, Yuantian Zhang:
Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. SciSec 2018: 65-80 - [e3]Feng Liu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11287, Springer 2018, ISBN 978-3-030-03025-4 [contents] - 2017
- [j22]Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu:
Perfect contrast XOR-based visual cryptography schemes via linear algebra. Des. Codes Cryptogr. 85(1): 15-37 (2017) - [j21]Yuwei Xu, Yongqiang Li, Chuankun Wu, Feng Liu:
On the construction of differentially 4-uniform involutions. Finite Fields Their Appl. 47: 309-329 (2017) - [j20]YaWei Ren, Feng Liu, Teng Guo, Rongquan Feng, Dongdai Lin:
Cheating prevention visual cryptography scheme using Latin square. IET Inf. Secur. 11(4): 211-219 (2017) - [j19]Teng Guo, Jian Jiao, Feng Liu, Wen Wang:
On the Pixel Expansion of Visual Cryptography Scheme. Int. J. Digit. Crime Forensics 9(2): 38-44 (2017) - [j18]Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu:
New insight into linear algebraic technique to construct visual cryptography scheme for general access structure. Multim. Tools Appl. 76(12): 14511-14533 (2017) - [c23]Wen Wang, Feng Liu, Teng Guo, YaWei Ren:
Temporal Integration Based Visual Cryptography Scheme and Its Application. IWDW 2017: 406-419 - [e2]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Feng Liu:
Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10082, 2017, ISBN 978-3-319-53464-0 [contents] - 2016
- [j17]Guangyu Wang, Feng Liu, Wei Qi Yan:
Basic Visual Cryptography Using Braille. Int. J. Digit. Crime Forensics 8(3): 85-93 (2016) - [j16]Guangyu Wang, Feng Liu, Wei Qi Yan:
2D Barcodes for visual cryptography. Multim. Tools Appl. 75(2): 1223-1241 (2016) - [c22]Wenlun Pan, Zhenzhen Bao
, Dongdai Lin, Feng Liu:
The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016: 107-123 - [c21]Wenlun Pan, Zhenzhen Bao
, Dongdai Lin, Feng Liu:
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016: 13-36 - [c20]Teng Guo, Feng Liu, Wen Wang, BingTao Yu:
Privacy Monitor. IWDW 2016: 187-197 - [c19]Wen Wang, Feng Liu, Teng Guo, YaWei Ren, Gang Shen:
Information Security Display Technology with Multi-view Effect. IWDW 2016: 198-208 - [c18]Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu, Wen Wang:
Halftone Visual Cryptography with Complementary Cover Images. IWDW 2016: 223-237 - [c17]YaWei Ren, Feng Liu, Wen Wang:
Collusive Attacks to Partition Authentication Visual Cryptography Scheme. IWDW 2016: 238-250 - [c16]Jiaxin Yin, Rui Wang
, Yuanfang Guo, Feng Liu:
An Adaptive Reversible Data Hiding Scheme for JPEG Images. IWDW 2016: 456-469 - [i6]Wenlun Pan, Zhenzhen Bao
, Dongdai Lin, Feng Liu:
An Algorithm for Counting the Number of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity. IACR Cryptol. ePrint Arch. 2016: 1025 (2016) - 2015
- [b2]Feng Liu, Wei Qi Yan:
Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications, Second Edition. Springer 2015, ISBN 978-3-319-23472-4, pp. 1-167 - [c15]Wen Wang, Feng Liu, WeiQi Yan, Gang Shen, Teng Guo:
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW 2015: 418-432 - [c14]YaWei Ren, Feng Liu, Dongdai Lin, Rongquan Feng, Wen Wang:
A New Construction of Tagged Visual Cryptography Scheme. IWDW 2015: 433-445 - [c13]Wei Qi Yan, Feng Liu:
Event Analogy Based Privacy Preservation in Visual Surveillance. PSIVT Workshops 2015: 357-368 - 2014
- [b1]Feng Liu, Wei Qi Yan:
Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications. Springer 2014, ISBN 978-3-319-09643-8, pp. 1-143 - [j15]Teng Guo, Feng Liu, Chuan Kun Wu:
k out of k extended visual cryptography scheme by random grids. Signal Process. 94: 90-101 (2014) - [j14]Feng Liu, Wei Qi Yan, Peng Li, Chuan Kun Wu:
ESSVCS: An Enriched Secret Sharing Visual Cryptography. Trans. Data Hiding Multim. Secur. 9: 1-24 (2014) - [j13]Feng Liu, Teng Guo, Chuan Kun Wu, Ching-Nung Yang
:
Flexible Visual Cryptography Scheme and Its Application. Trans. Data Hiding Multim. Secur. 9: 110-130 (2014) - [c12]Guangyu Wang, Feng Liu, Wei Qi Yan:
Braille for Visual Cryptography. ISM 2014: 275-276 - [c11]Feng Liu, Chuan Kun Wu:
Optimal XOR Based (2, n)-Visual Cryptography Schemes. IWDW 2014: 333-349 - [e1]Yun Q. Shi, Feng Liu, WeiQi Yan:
Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography. Lecture Notes in Computer Science 8363, Springer 2014, ISBN 978-3-642-55045-4 [contents] - 2013
- [j12]Teng Guo, Feng Liu, Chuan Kun Wu:
Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8): 2094-2109 (2013) - [c10]Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang
, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. ICICS 2013: 404-412 - [c9]Teng Guo, Feng Liu, Chuan Kun Wu, YaWei Ren, Wen Wang:
On (k, n) Visual Cryptography Scheme with t Essential Parties. ICITS 2013: 56-68 - [c8]Teng Guo, Feng Liu, Chuan Kun Wu, YaWei Ren, Wen Wang:
On the Randomness of Visual Cryptography Scheme. IIH-MSP 2013: 391-394 - [c7]Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou, YaWei Ren, Wen Wang:
The Security Defect of a Multi-pixel Encoding Method. ISC 2013: 39-48 - [i5]Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. IACR Cryptol. ePrint Arch. 2013: 524 (2013) - 2012
- [j11]Feng Liu, Teng Guo, Chuan Kun Wu, Lina Qian:
Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2): 331-342 (2012) - [c6]Teng Guo, Feng Liu, Chuan Kun Wu:
Visual Cryptography for Natural Images and Visual Voting. Inscrypt 2012: 90-101 - [c5]Teng Guo, Feng Liu, Chuan Kun Wu:
On the Equivalence of Two Definitions of Visual Cryptography Scheme. ISPEC 2012: 217-227 - [c4]Feng Liu, Wei Qi Yan, Peng Li, Chuan Kun Wu:
A Secret Enriched Visual Cryptography. IWDW 2012: 464-484 - [i4]Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou:
Using Variance to Analyze Visual Cryptography Schemes. IACR Cryptol. ePrint Arch. 2012: 315 (2012) - 2011
- [j10]Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Cheating immune visual cryptography scheme. IET Inf. Secur. 5(1): 51-59 (2011) - [j9]Feng Liu, Chuan Kun Wu:
Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET Inf. Secur. 5(2): 121-128 (2011) - [j8]Feng Liu, Chuankun Wu:
Embedded Extended Visual Cryptography Schemes. IEEE Trans. Inf. Forensics Secur. 6(2): 307-322 (2011) - [c3]Teng Guo, Feng Liu, Chuan Kun Wu:
Multi-pixel Encryption Visual Cryptography. Inscrypt 2011: 86-92 - [c2]Qinggang Yue, Feng Liu, Rui Xue:
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. INTRUST 2011: 84-101 - [c1]Feng Liu, Teng Guo, Chuan Kun Wu, Ching-Nung Yang
:
Flexible Visual Cryptography Scheme without Distortion. IWDW 2011: 211-227 - [i3]Feng Liu, Peng Li, Chuan Kun Wu:
Encrypting More Information in Visual Cryptography Scheme. IACR Cryptol. ePrint Arch. 2011: 340 (2011) - 2010
- [j7]Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Some Extensions on Threshold Visual Cryptography Schemes. Comput. J. 53(1): 107-119 (2010) - [j6]Feng Liu, Chuan Kun Wu, Xi Jun Lin:
A new definition of the contrast of visual cryptography scheme. Inf. Process. Lett. 110(7): 241-246 (2010) - [j5]Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1): 27-38 (2010) - [i2]Feng Liu, Chuankun Wu:
Embedded Extended Visual Cryptography Schemes. IACR Cryptol. ePrint Arch. 2010: 439 (2010) - [i1]Feng Liu, Chuan Kun Wu:
Optimal XOR based (2, n)-Visual Cryptography Schemes. IACR Cryptol. ePrint Arch. 2010: 545 (2010)
2000 – 2009
- 2009
- [j4]Feng Liu, Chuan Kun Wu, Xi Jun Lin:
The alignment problem of visual cryptography schemes. Des. Codes Cryptogr. 50(2): 215-227 (2009) - 2008
- [j3]Xi Jun Lin, Chuan Kun Wu, Feng Liu:
Analysis of an authenticated identity-based multicast scheme. IET Commun. 2(7): 935-937 (2008) - [j2]Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Colour visual cryptography schemes. IET Inf. Secur. 2(4): 151-165 (2008) - [j1]Xi Jun Lin, Chuan Kun Wu, Feng Liu:
Many-to-one encryption and authentication scheme and its application. J. Commun. Networks 10(1): 18-27 (2008)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-08 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint