Limin Shen

According to our database1, Limin Shen authored at least 39 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Networking and Applications, 2018

A revocable certificateless encryption scheme with high performance.
IJHPCN, 2018

2017
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks.
Security and Communication Networks, 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive and Mobile Computing, 2017

Your neighbors alleviate cold-start: On geographical neighborhood influence to collaborative web service QoS prediction.
Knowl.-Based Syst., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet of Things Journal, 2017

An efficient revocable ID-based encryption scheme in the standard model.
IJES, 2017

Exploiting Web service geographical neighborhood for collaborative QoS prediction.
Future Generation Comp. Syst., 2017

2016
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Systems, 2016

A Revocable Certificateless Signature Scheme Without Pairing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

A user dependent Web service QoS collaborative prediction approach using neighborhood regularized matrix factorization.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Alleviating Data Sparsity in Web Service QoS Prediction by Capturing Region Context Influence.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
Efficient revocable certificateless encryption against decryption key exposure.
IET Information Security, 2015

2014
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Security and Communication Networks, 2014

Determination Method of Evolution Type of Service-oriented Entity.
JSW, 2014

A Revocable Certificateless Signature Scheme.
JCP, 2014

A Process Algebra-Based Detection Model for Multithreaded Programs in Communication System.
TIIS, 2014

Notes on the security of certificateless aggregate signature schemes.
Inf. Sci., 2014

Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
IJICS, 2014

Efficient Revocable Certificateless Encryption Secure in the Standard Model.
Comput. J., 2014

2013
A revocable certificateless signature scheme.
IACR Cryptology ePrint Archive, 2013

Efficient leakage-resilient public key encryption from DDH assumption.
Cluster Computing, 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
On security of a Certificateless Aggregate Signature Scheme.
IACR Cryptology ePrint Archive, 2012

Practical Certificateless Public Key Encryption in the Standard Model.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Flexible Collaborative Learning Model in E-Learning with Personalized Teaching Materials.
Proceedings of the Advances in Computer Science, 2011

A Measurement Method of Software Flexibility Based on SOCP.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2009
A Method to Enhance SCADA Systems Survivability with Exogenous Monitors.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Algorithm of Rule Generation from Flexible Information System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

User-Oriented Measurement of Software Flexibility.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2007
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Evaluation of Flexible Points on User Interface for Information System.
Proceedings of the ICEIS 2007, 2007

A Time and Interaction Model for Open Distributed Timing Computation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Setting and Evaluation of Flexible Points on Software User Interface.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Dynamic Composition of Web Service Based on Coordination Model.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Actors, Roles and Coordinators - A Coordination Model for Open Distributed and Embedded Systems.
Proceedings of the Coordination Models and Languages, 8th International Conference, 2006


  Loading...