Kamu erişimi zorunlu olan makaleler - shengli liuDaha fazla bilgi edinin
Hiçbir yerde sunulmuyor: 25
Insight of the protection for data security under selective opening attacks
Z Huang, S Liu, X Mao, K Chen, J Li
Information Sciences 412, 223-241, 2017
Zorunlu olanlar: National Natural Science Foundation of China
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
Y Wen, S Liu, S Han
Designs, Codes and Cryptography 86, 2495-2512, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Reusable fuzzy extractor from LWE
Y Wen, S Liu
Australasian Conference on Information Security and Privacy, 13-27, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Privacy-preserving location-based services query scheme against quantum attacks
Z Hu, S Liu, K Chen
IEEE Transactions on Dependable and Secure Computing 17 (5), 972-983, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Tightly CCA-secure inner product functional encryption scheme
X Liu, S Liu, S Han, D Gu
Theoretical Computer Science 898, 1-19, 2022
Zorunlu olanlar: National Natural Science Foundation of China
Proofs of retrievability from linearly homomorphic structure-preserving signatures
X Zhang, S Liu, S Han
International Journal of Information and Computer Security 11 (2), 178-202, 2019
Zorunlu olanlar: National Natural Science Foundation of China
Revocable identity-based encryption from the computational Diffie-Hellman problem
Z Hu, S Liu, K Chen, JK Liu
Australasian Conference on Information Security and Privacy, 265-283, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Robustly reusable fuzzy extractor with imperfect randomness
N Cui, S Liu, D Gu, J Weng
Designs, Codes and Cryptography 89, 1017-1059, 2021
Zorunlu olanlar: National Natural Science Foundation of China
Face-based authentication using computational secure sketch
M Jiang, S Liu, Y Lyu, Y Zhou
IEEE Transactions on Mobile Computing 22 (12), 7172-7187, 2022
Zorunlu olanlar: National Natural Science Foundation of China
Computational robust fuzzy extractor
Y Wen, S Liu, Z Hu, S Han
The Computer Journal 61 (12), 1794-1805, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
S Han, S Liu, B Qin, D Gu
Designs, Codes and Cryptography 86, 517-554, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Public‐key encryption scheme with selective opening chosen‐ciphertext security based on the Decisional Diffie–Hellman assumption
S Liu, F Zhang, K Chen
Concurrency and Computation: Practice and Experience 26 (8), 1506-1519, 2014
Zorunlu olanlar: National Natural Science Foundation of China
Reusable fuzzy extractor based on the LPN assumption
Y Li, S Liu, D Gu, K Chen
The Computer Journal 63 (12), 1826-1834, 2020
Zorunlu olanlar: National Natural Science Foundation of China
Privacy-preserving location-based service protocols with flexible access
S Tang, S Liu, X Huang, Z Liu
International Journal of Computational Science and Engineering 20 (3), 412-423, 2019
Zorunlu olanlar: National Natural Science Foundation of China
n‐Evasive all‐but‐many lossy trapdoor function and its constructions
Z Huang, S Liu, K Chen
Security and Communication Networks 8 (4), 550-564, 2015
Zorunlu olanlar: National Natural Science Foundation of China
Fuzzy authenticated key exchange with tight security
M Jiang, S Liu, S Han, D Gu
European Symposium on Research in Computer Security, 337-360, 2022
Zorunlu olanlar: National Natural Science Foundation of China
Tightly-secure signatures from the decisional composite residuosity assumption
X Zhang, S Liu, D Gu
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
Zorunlu olanlar: National Natural Science Foundation of China
Computational fuzzy extractor from LWE
Y Zhou, S Liu, N Cui
Theoretical Computer Science 945, 113681, 2023
Zorunlu olanlar: National Natural Science Foundation of China
Pseudorandom functions from LWE: RKA security and application
N Cui, S Liu, Y Wen, D Gu
Australasian Conference on Information Security and Privacy, 229-250, 2019
Zorunlu olanlar: National Natural Science Foundation of China
Public-key encryption with tight simulation-based selective-opening security
L Lyu, S Liu, S Han
The Computer Journal 61 (2), 288-318, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir