D. J. Guan

According to our database1, D. J. Guan authored at least 28 papers between 1989 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Research on Coordinated Scheduling Strategy of Heat Storage Thermoelectric Units Based on Wind Power Data Acquisition System Using Edge Computing.
Secur. Commun. Networks, 2021

2020
An Efficient and Privacy Protection Communication Scheme for Smart Grid.
IEEE Access, 2020

2017
Detecting invalid digital signatures in batches.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Performance Analysis of Some Batch Verification Methods of Digital Signatures.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2014
A practical protocol for three-party authenticated quantum key distribution.
Quantum Inf. Process., 2014

Feature set identification for detecting suspicious URLs using Bayesian classification in social networks.
Inf. Sci., 2014

Parity Detection for Some Three-Modulus Residue Number System.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Preface: optimization in graphs.
J. Comb. Optim., 2013

Detect Zero by Using Symmetric Homomorphic Encryption.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
A Routing Algorithm for Rearrangeable Nonblocking Optical Banyan-type Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Attack Sequence Detection in Cloud Using Hidden Markov Model.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Efficient vehicle ownership identification scheme based on triple-trapdoor chameleon hash function.
J. Netw. Comput. Appl., 2011

2010
A Forward-Backward Secure Signature Scheme.
J. Inf. Sci. Eng., 2010

A digital signature with multiple subliminal channels and its applications.
Comput. Math. Appl., 2010

2009
Cryptanalysis of Lee-Hwang-Yang blind signature scheme.
Comput. Stand. Interfaces, 2009

2008
An Efficiently Online/Offline Signcryption for Firewall.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

One/T-Time Signatures Using Self-Certified Public Keys.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2005
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol.
IACR Cryptol. ePrint Arch., 2005

2001
An Optimal Fault-Tolerant Routing Algorithm for Double-Loop Networks.
IEEE Trans. Computers, 2001

2000
Computational complexity of similarity retrieval in a pictorial database.
Inf. Process. Lett., 2000

1999
Game chromatic number of outerplanar graphs.
J. Graph Theory, 1999

A Dynamic Fault-Tolerant Message Routing Algorithm for Double-Loop Networks.
Inf. Process. Lett., 1999

1998
Multiple Capacity Vehicle Routing on Paths.
SIAM J. Discret. Math., 1998

An Optimal Message Routing Algorithm for Double-Loop Networks.
Inf. Process. Lett., 1998

1997
A Coloring Problem for Weighted Graphs.
Inf. Process. Lett., 1997

1993
Nonpreemptive Ensemble Motion Planning on a Tree.
J. Algorithms, 1993

1992
Preemptive Ensemble Motion Planning on a Tree.
SIAM J. Comput., 1992

1989
Ensemble Motion Planning in Trees
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989


  Loading...