Lihua Liu
Orcid: 0000-0002-2111-3384Affiliations:
- Shanghai Maritime University, Department of Mathematics, Shanghai, China
- Shanghai Jiaotong University, Department of Mathematics, Shanghai, China (PhD 2006)
According to our database1,
Lihua Liu
authored at least 113 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A Note on One Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IACR Cryptol. ePrint Arch., 2025
Insecurity of One Ring Signature Scheme with Batch Verification for Applications in VANETs.
IACR Cryptol. ePrint Arch., 2025
On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
IACR Cryptol. ePrint Arch., 2025
A Note on "CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT".
IACR Cryptol. ePrint Arch., 2025
Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism.
IACR Cryptol. ePrint Arch., 2025
A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid".
IACR Cryptol. ePrint Arch., 2025
Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance.
IACR Cryptol. ePrint Arch., 2025
Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network.
IACR Cryptol. ePrint Arch., 2025
On the Anonymity in "A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments".
IACR Cryptol. ePrint Arch., 2025
A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited.
IACR Cryptol. ePrint Arch., 2025
A note on "industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training".
IACR Cryptol. ePrint Arch., 2025
2024
A Note on "An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing".
IEEE Syst. J., December, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
A Note on "Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming".
IACR Cryptol. ePrint Arch., 2024
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud.
IACR Cryptol. ePrint Arch., 2024
Design issues of "an anonymous authentication and key agreement protocol in smart living".
IACR Cryptol. ePrint Arch., 2024
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks.
IACR Cryptol. ePrint Arch., 2024
A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2024
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters".
IACR Cryptol. ePrint Arch., 2024
A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain".
IACR Cryptol. ePrint Arch., 2024
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE".
IACR Cryptol. ePrint Arch., 2024
A note on "a lightweight mutual and transitive authentication mechanism for IoT network".
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era".
IACR Cryptol. ePrint Arch., 2024
2023
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement".
IACR Cryptol. ePrint Arch., 2023
A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0".
IACR Cryptol. ePrint Arch., 2023
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement.
IACR Cryptol. ePrint Arch., 2023
A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments".
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor".
IACR Cryptol. ePrint Arch., 2023
A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid".
IACR Cryptol. ePrint Arch., 2023
A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation".
IACR Cryptol. ePrint Arch., 2023
A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment".
IACR Cryptol. ePrint Arch., 2023
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function".
IACR Cryptol. ePrint Arch., 2023
A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network".
IACR Cryptol. ePrint Arch., 2023
A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems".
IACR Cryptol. ePrint Arch., 2023
A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System".
IACR Cryptol. ePrint Arch., 2023
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT".
IACR Cryptol. ePrint Arch., 2023
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment".
IACR Cryptol. ePrint Arch., 2023
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things".
IACR Cryptol. ePrint Arch., 2023
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT".
IACR Cryptol. ePrint Arch., 2023
2022
Int. J. Bifurc. Chaos, 2022
2021
Int. J. Inf. Comput. Secur., 2021
2020
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IEEE Trans. Cloud Comput., 2019
2018
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Int. J. Netw. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
2017
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
2016
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations".
IEEE Trans. Parallel Distributed Syst., 2016
Int. J. Netw. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2016
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud".
CoRR, 2016
A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization".
CoRR, 2016
2015
Int. J. Netw. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
CoRR, 2015
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm.
IACR Cryptol. ePrint Arch., 2014
A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm.
CoRR, 2014
CoRR, 2014
CoRR, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Computing and Applications - 4th International Conference, 2013
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
Proceedings of the Complex Sciences, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Proceedings of the Software Engineering, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
2006
Explicit constructions of separating hash families from algebraic curves over finite fields.
Des. Codes Cryptogr., 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
2004
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
IACR Cryptol. ePrint Arch., 2004