Guoxiang Yao

According to our database1, Guoxiang Yao authored at least 9 papers between 2009 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Data integrity verification scheme with designated verifiers for dynamic outsourced databases.
Secur. Commun. Networks, 2014

Parallel Clone Code Detector in MapReduce.
J. Softw., 2014

A Time-Based Pre-distribution Shared Key Pool Design.
J. Comput., 2014

2013
A Key Management Algorithm Based on Two-tier Architecture in Wireless Ad Hoc Network.
J. Networks, 2013

2012
Test Model for Security Vulnerability in Web Controls based on Fuzzing.
J. Softw., 2012

Access control scheme with tracing for outsourced databases.
Frontiers Comput. Sci., 2012

2011
An Encryption Scheme with Hidden Keyword Search for Outsourced Database.
J. Networks, 2011

Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

2009
Research and Design of Internet Public Opinion Analysis System.
Proceedings of the 2009 IITA International Conference on Services Science, 2009


  Loading...