Liangliang Xiao

According to our database1, Liangliang Xiao authored at least 29 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Musical examination to bridge audio data and sheet music.
Proceedings of the Imaging and Multimedia Analytics in a Web and Mobile World 2015, 2015

2013
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing.
J. Grid Comput., 2013

Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Access Protocols in Data Partitioning Based Cloud Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Extending Order Preserving Encryption for Multi-User Systems.
IACR Cryptol. ePrint Arch., 2012

A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption.
IACR Cryptol. ePrint Arch., 2012

Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes.
IACR Cryptol. ePrint Arch., 2012

An Efficient Homomorphic Encryption Protocol for Multi-User Systems.
IACR Cryptol. ePrint Arch., 2012

Information Assurance for Real-Time Decision Support.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

Security analysis for order preserving encryption schemes.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Leveraging Service Clouds for Power and QoS Management for Mobile Devices.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Secure, Dependable, and High Performance Cloud Storage.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Cloud Storage Design Based on Hybrid of Replication and Data Partitioning.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Scalable Authentication and Key Management in SCADA.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Evaluation and Comparisons of Dependable Distributed Storage Designs for Clouds.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

2008
Rearrangements of access structures and their realizations in secret sharing schemes.
Discret. Math., 2008

Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Low Cost Secure Computation for the General Client-Server Computation Model.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Security in a peer-to-peer data grid storage system.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Multiplicative Linear Secret Sharing Schemes Based on Connectivity of Graphs.
IEEE Trans. Inf. Theory, 2007

Evaluating Dependable Distributed Storage Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

Placement in Dependable and Secure Peer-to-Peer Data Grids.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Replica Placement Algorithms for Mobile Transaction Systems.
IEEE Trans. Knowl. Data Eng., 2006

Linear multi-secret sharing schemes based on multi-party computation.
Finite Fields Their Appl., 2006

2005
Statistical Multiparty Computation Based on Random Walks on Graphs.
IACR Cryptol. ePrint Arch., 2005

Multiparty Computation Based on Connectivity of Graphs.
IACR Cryptol. ePrint Arch., 2005

Linear multi-secret sharing schemes.
Sci. China Ser. F Inf. Sci., 2005

An Adaptive Multiparty Protocol for Secure Data Protection.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2005


  Loading...