Liangliang Xiao

According to our database1, Liangliang Xiao authored at least 27 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2013
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing.
J. Grid Comput., 2013

Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Access Protocols in Data Partitioning Based Cloud Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Extending Order Preserving Encryption for Multi-User Systems.
IACR Cryptology ePrint Archive, 2012

A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption.
IACR Cryptology ePrint Archive, 2012

Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes.
IACR Cryptology ePrint Archive, 2012

An Efficient Homomorphic Encryption Protocol for Multi-User Systems.
IACR Cryptology ePrint Archive, 2012

Information Assurance for Real-Time Decision Support.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

Security analysis for order preserving encryption schemes.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Leveraging Service Clouds for Power and QoS Management for Mobile Devices.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Secure, Dependable, and High Performance Cloud Storage.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Cloud Storage Design Based on Hybrid of Replication and Data Partitioning.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Scalable Authentication and Key Management in SCADA.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Evaluation and Comparisons of Dependable Distributed Storage Designs for Clouds.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

2008
Rearrangements of access structures and their realizations in secret sharing schemes.
Discrete Mathematics, 2008

Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Low Cost Secure Computation for the General Client-Server Computation Model.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

2007
Multiplicative Linear Secret Sharing Schemes Based on Connectivity of Graphs.
IEEE Trans. Information Theory, 2007

Evaluating Dependable Distributed Storage Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

Placement in Dependable and Secure Peer-to-Peer Data Grids.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Replica Placement Algorithms for Mobile Transaction Systems.
IEEE Trans. Knowl. Data Eng., 2006

Linear multi-secret sharing schemes based on multi-party computation.
Finite Fields and Their Applications, 2006

2005
Statistical Multiparty Computation Based on Random Walks on Graphs.
IACR Cryptology ePrint Archive, 2005

Multiparty Computation Based on Connectivity of Graphs.
IACR Cryptology ePrint Archive, 2005

Linear multi-secret sharing schemes.
Science in China Series F: Information Sciences, 2005

An Adaptive Multiparty Protocol for Secure Data Protection.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2005


  Loading...