Junmo Xiao

According to our database1, Junmo Xiao authored at least 11 papers between 2007 and 2009.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Threshold Certificate-based Encryption.
J. Softw., 2009

Constructing Efficient Certificate-based Encryption with Paring.
J. Comput., 2009

2008
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACK.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

A Logic to Model Time in Cryptographic Protocols.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Generic Construction of Certificate-Based Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Novel Security Protocol to Protect Mobile Agent against Colluded Truncation Attack by Cooperation.
Proceedings of the International Conference on Cyberworlds 2008, 2008

A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Secure Routing for Mobile Ad Hoc Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Integrated System of Intrusion Detection Based on Rough Set and Wavelet Neural Network.
Proceedings of the Third International Conference on Natural Computation, 2007

Protecting XML Databases against Ontology-Based Inference Attack.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...