Daxing Li

According to our database1, Daxing Li authored at least 24 papers between 1994 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A review of moving object trajectory clustering algorithms.
Artif. Intell. Rev., 2017

2009
New left-to-right minimal weight signed-digit radix-r representation.
Comput. Electr. Eng., 2009

2007
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Proceedings of the Theory and Applications of Models of Computation, 2007

New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007

Security Analysis of wrNAF and SPA Resistant Scalar Multiplication.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Proactive Secure Multisecret Sharing Threshold Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Forward-Secure Traceable Ring Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Ring Blind Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Identity-Based Blind Signature Scheme with Batch Verifications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two Threshold Multisignature Schemes from Bilinear Pairings.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Key-Insulated Group Signature Scheme with Selective Revocation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

An Efficient Threshold Group Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Biometric Identity Based Signature Scheme with Convenient Verification.
Proceedings of the Future Generation Communication and Networking, 2007

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett., 2006

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

1994
Two Notes on Low-Density Subset Sum Algorithms.
Proceedings of the Algorithms and Computation, 5th International Symposium, 1994


  Loading...