Qingshui Xue
  According to our database1,
  Qingshui Xue
  authored at least 29 papers
  between 2004 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2024
    Int. J. Sens. Networks, 2024
    
  
Locally verifiable approximate multi-member quantum threshold aggregation digital signature scheme.
    
  
    Comput. Commun., 2024
    
  
  2023
    IEEE Access, 2023
    
  
  2022
    Proceedings of the 7th International Conference on Computer and Communication Systems, 2022
    
  
  2019
    Concurr. Comput. Pract. Exp., 2019
    
  
The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment.
    
  
    Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
    
  
  2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
    
  
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
    
  
    Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
    
  
    Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
    
  
Multi-Objective Virtual Network Embedding Algorithm Based on Global Resource Capacity.
    
  
    Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
    
  
  2016
    Secur. Commun. Networks, 2016
    
  
    Proceedings of the 2016 IEEE Global Communications Conference, 2016
    
  
  2015
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
    
  
    Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
    
  
  2014
    Proceedings of the Wireless Internet - 8th International Conference, 2014
    
  
    Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
    
  
  2010
    Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
    
  
  2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
    
  
    Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
    
  
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
  
    Proceedings of the 2009 International Conference on Security & Management, 2009
    
  
  2008
    Proceedings of the Collaborative Computing: Networking, 2008
    
  
  2007
    Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
    
  
  2005
    Informatica, 2005
    
  
    Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
    
  
  2004
    Sci. China Ser. F Inf. Sci., 2004
    
  
An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
  
    Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
    
  
A Model that Coordinates Short-Lived and Long-Lived Transactions for Web Services.
  
    Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
    
  
    Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
    
  
    Proceedings of the Parallel and Distributed Processing and Applications, 2004
    
  
    Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004