Jingsong Cui

According to our database1, Jingsong Cui authored at least 21 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A SM2 based efficient and lightweight batch verification approach for IC cards.
J. Inf. Secur. Appl., March, 2023

2020
MRC: A High Density Encoding Method for Pratical DNA-based Storage.
Proceedings of the Eighth International Conference on Advanced Cloud and Big Data, 2020

2019
一种基于闭源流媒体的隐蔽通讯方法 (Covert Communication Method Based on Closed Source Streaming Media).
计算机科学, 2019

Efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings.
Int. J. Embed. Syst., 2019

Time-Domain Evaluation Method for Clock Frequency Stability Based on Precise Point Positioning.
IEEE Access, 2019

A Generalized Obfuscation Method to Protect Software of Mobile Apps.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

2018
Secure and efficient authentication scheme for access control in mobile pay-TV systems.
Int. J. Electron. Secur. Digit. Forensics, 2018

2016
Active or inactive: infer private user information in location-based social network.
Int. J. Embed. Syst., 2016

2014
iWISE: A Location-Based Service Cloud Computing System with Content Aggregation and Social Awareness.
Proceedings of the Principle and Application Progress in Location-Based Services, 2014

Agentless Processes Monitoring Architecture on Cloud Platform.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

iConCube: A Location-Based Mobile Cloud System for Meeting Organizers and Participants.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Design and implementation of journal manuscript submission and review system based on SaaS.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2011
Skeletonization of Deformed CAPTCHAs Using Pixel Depth Approach.
J. Multim., 2011

2008
A Suitability Measure Approach of Domain Models Based on Semantic Association.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

2007
On the degree of homogeneous bent functions.
Discret. Appl. Math., 2007

2005
almost enumeration of 8-variable bent functions.
IACR Cryptol. ePrint Arch., 2005

Efficient Deadlock-Freeness Detection in Real-time Systems.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
A novel algorithm enumerating Bent functions.
IACR Cryptol. ePrint Arch., 2004

The optimized key distribution scheme in threshold RSA.
Proceedings of the 3rd International Conference on Information Security, 2004

1997
The Implement Mechanism and Efficiency Analysis of Multiinheritance and Polymorphism.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997


  Loading...