Yiqi Dai
According to our database1,
Yiqi Dai
authored at least 48 papers
between 2004 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Inf. Sci., 2014
2013
Implementation and performance analysis of multilevel security system in pervasive computing environment.
J. Supercomput., 2013
2012
Int. J. Cloud Comput., 2012
Sci. China Inf. Sci., 2012
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the Seventh ChinaGrid Annual Conference, ChinaGrid 2012, Beijing, 2012
2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Probability method for cryptanalysis of general multivariate modular linear equation.
Sci. China Ser. F Inf. Sci., 2009
Sci. China Ser. F Inf. Sci., 2009
Sci. China Ser. F Inf. Sci., 2009
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009
Cryptanalysis of RSA with Constrained Low Public Exponent.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations.
Inf. Sci., 2008
Proceedings of the 2008 International Conference on Parallel Processing, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
J. Comput. Sci. Technol., 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Colored Probabilistic Visual Cryptography Scheme with Reversing.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
CoRR, 2006
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Advances in Web-Age Information Management, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004
Realizing Restricted Delegation Using Attribute Certificates in Grid Environments.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Embedded Software and Systems, First International Conference, 2004