Підписатись
Liangliang Xiao
Liangliang Xiao
Assistant Professor of Department of Computer Science & Information Technologies, Frostburg State University
Підтверджена електронна адреса в frostburg.edu
Назва
Посилання
Посилання
Рік
An efficient homomorphic encryption protocol for multi-user systems
L Xiao, O Bastani, IL Yen
Cryptology ePrint Archive, 2012
962012
Security analysis for order preserving encryption schemes
L Xiao, IL Yen
2012 46th annual conference on information sciences and systems (CISS), 1-6, 2012
772012
DESIGN CONSTRUCTION AND BEAM TEST OF THE BEIJING 35MeV PROTON LINGAR ACCELERATOR
QY ZHOU, SH WANG, HB PAN, ZH LUO, LR XIAO, YX ZHANG
Chinese Physics C 11 (1), 85-91, 1987
771987
Extending order preserving encryption for multi-user systems
L Xiao, IL Yen, DT Huynh
Cryptology ePrint Archive, 2012
502012
A note for the ideal order-preserving encryption object and generalized order-preserving encryption
L Xiao, IL Yen
Cryptology ePrint Archive, 2012
472012
Secure, dependable, and high performance cloud storage
Y Ye, L Xiao, IL Yen, F Bastani
2010 29th IEEE Symposium on Reliable Distributed Systems, 194-203, 2010
372010
Replica placement algorithms for mobile transaction systems
M Tu, P Li, L Xiao, IL Yen, FB Bastani
IEEE Transactions on Knowledge and Data Engineering 18 (7), 954-970, 2006
302006
Dynamic strain aging phenomenon in metals and alloys
KW Qian, XQ Li, LG Xiao, W Chen, H Zhang, K Peng
J. Fuzhou Univ.(Nat. Sci. Ed.) 26, 8-23, 2001
282001
Data loss prevention management and control: Inside activity incident monitoring, identification, and tracking in healthcare enterprise environments
M Tu, K Spoa-Harty, L Xiao
Journal of Digital Forensics, Security and Law 10 (1), 3, 2015
272015
Data placement in P2P data grids considering the availability, security, access performance and load balancing
M Tu, H Ma, L Xiao, IL Yen, F Bastani, D Xu
Journal of grid computing 11, 103-127, 2013
272013
Linear multi-secret sharing schemes based on multi-party computation
M Liu, L Xiao, Z Zhang
Finite Fields and Their Applications 12 (4), 704-713, 2006
272006
Cloud storage design based on hybrid of replication and data partitioning
Y Ye, L Xiao, IL Yen, F Bastani
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
252010
Linear multi-secret sharing schemes
L Xiao, M Liu
Science in China Series F: Information Sciences 48, 125-136, 2005
232005
Overview of the applications of Curvelet transform in image processing.
G Long, L Xiao, X Chen
Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 42 (8), 1331-1337, 2005
222005
Multiplicative linear secret sharing schemes based on connectivity of graphs
M Liu, L Xiao, Z Zhang
IEEE Transactions on Information Theory 53 (11), 3973-3978, 2007
212007
Challenges of snow leopard conservation in China
J Li, L Xiao, Z Lu
Science China. Life Sciences 59 (6), 637, 2016
202016
System resilience enhancement through modularization for large scale cyber systems
M Tu, L Xiao
2016 IEEE/CIC International Conference on Communications in China (ICCC …, 2016
172016
Scalable authentication and key management in SCADA
L Xiao, IL Yen, F Bastani
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
132010
Secure, highly available, and high performance peer-to-peer storage systems
Y Ye, IL Yen, L Xiao, B Thuraisingham
2008 11th IEEE High Assurance Systems Engineering Symposium, 383-391, 2008
122008
Evaluating Dependable Distributed Storage Systems.
L Xiao, IL Yen, Y Zhang, FB Bastani
PDPTA, 948-954, 2007
122007
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20