Tianjie Cao

Orcid: 0000-0002-8120-5029

According to our database1, Tianjie Cao authored at least 36 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Software-Defined Network Resource Optimization of the Data Center Based on P4 Programming Language.
Mob. Inf. Syst., 2021

2017
Attacks on and Countermeasures for Two RFID Protocols.
Wirel. Pers. Commun., 2017

2016
RFID ownership transfer protocol based on cloud.
Comput. Networks, 2016

2015
BlindLock: 一种有效防范污迹攻击的图案锁系统 (BlindLock: An Effective Pattern Lock System Against Smudge Attack).
计算机科学, 2015

2014
Using clustering coefficient to construct weighted networks for supervised link prediction.
Soc. Netw. Anal. Min., 2014

Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol.
J. Comput., 2014

2013
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

2011
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks.
J. Networks, 2011

Resisting Collusion by Game in Culture Web.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Application of Daubechies Wavelet Transform in the Estimation of Standard Deviation of White Noise.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Multistage Filtering for Collusion Detection in P2P Network.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Memory Forensics for QQ from a Live System.
J. Comput., 2010

2009
Security Analysis of the SASI Protocol.
IEEE Trans. Dependable Secur. Comput., 2009

An Novel Anonymous Authenticated and Key Exchange Protocol.
J. Networks, 2009

Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols.
J. Networks, 2009

Collecting Sensitive Information from Windows Physical Memory.
J. Comput., 2009

Controlled Secret Leakage.
J. Comput., 2009

Cryptanalysis of Two RFID Authentication Protocols .
Int. J. Netw. Secur., 2009

2008
Cryptanalysis of Some RFID Authentication Protocols.
J. Commun., 2008

Cryptanalysis of the LCSS RFID Authentication Protocol.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Smart-Phone Based Server-Aided Computation.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2007
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes.
Int. J. Netw. Secur., 2007

Cryptanalysis of SPA Protocol.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Controlled Secret Leakage.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Improvement of an Authenticated Key Agreement Protocol.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Security Analysis of Some Batch Verifying Signatures from Pairings.
Int. J. Netw. Secur., 2006

Cryptanalysis of two password authenticated key exchange protocols based on RSA.
IEEE Commun. Lett., 2006

Security Analysis of a Server-Aided RSA Key Generation Protocol.
Proceedings of the Information Security Practice and Experience, 2006

2005
A randomized RSA-based partially blind signature scheme for electronic cash.
Comput. Secur., 2005

Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem.
Proceedings of The 2005 International Conference on Security and Management, 2005

Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

ID-Based Ring Authenticated Encryption.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Efficient ID-Based Deniable Authentication Protocol from Pairings.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Improved Privacy-Protecting Proxy Signature Scheme.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Security Analysis of User Efficient Blind Signatures.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004


  Loading...