Yiqi Dai

According to our database1, Yiqi Dai authored at least 48 papers between 2004 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Secure multiparty computation of solid geometric problems and their applications.
Inf. Sci., 2014

2013
Implementation and performance analysis of multilevel security system in pervasive computing environment.
J. Supercomput., 2013

2012
A privacy protection model for transparent computing system.
Int. J. Cloud Comput., 2012

(2, n) secret sharing scheme for gray and color images based on Boolean operation.
Sci. China Inf. Sci., 2012

Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Security SLAs for IMS-based Cloud Services.
Proceedings of the Seventh ChinaGrid Annual Conference, ChinaGrid 2012, Beijing, 2012

2011
Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Contact duration aware data replication in Delay Tolerant Networks.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Win-Coupon: An incentive framework for 3G traffic offloading.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
A software vulnerability analysis environment based on virtualization technology.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

(2, n) Secret Image Sharing Scheme with Ideal Contrast.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Secure Signature Protocol.
Intell. Inf. Manag., 2009

Probability method for cryptanalysis of general multivariate modular linear equation.
Sci. China Ser. F Inf. Sci., 2009

Cryptanalysis of RSA for a special case with <i>d</i> > <i>e</i>.
Sci. China Ser. F Inf. Sci., 2009

Symmetric cryptographic protocols for extended millionaires' problem.
Sci. China Ser. F Inf. Sci., 2009

Removal of misbehaving insiders in anonymous VANETs.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Cryptanalysis of RSA with Constrained Low Public Exponent.
Proceedings of the 2009 International Conference on Security & Management, 2009

Remarks on Cryptanalysis of RSA Using Lattice Basis Reduction.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A Novel Server-Based Application Execution Architecture.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Novel Architecture for Enterprise Network Security.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations.
Inf. Sci., 2008

New schemes for sharing points on an elliptic curve.
Comput. Math. Appl., 2008

Comparing two sets without disclosing them.
Sci. China Ser. F Inf. Sci., 2008

Scalability Evaluation and Optimization of Multi-Core SIP Proxy Server.
Proceedings of the 2008 International Conference on Parallel Processing, 2008

A Real-Time Payment Scheme for SIP Service Based on Hash Chain.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem.
J. Comput. Sci. Technol., 2007

Motivating and Modeling SIP Offload.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Colored Probabilistic Visual Cryptography Scheme with Reversing.
Proceedings of the 2007 International Conference on Security & Management, 2007

Cryptanalysis of General Lu-Lee Type Systems.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Visual secret sharing scheme with autostereogram.
IACR Cryptol. ePrint Arch., 2006

On the Analysis and Generalization of Extended Visual Cryptography Schemes
CoRR, 2006

Symmetric Encryption Solutions to Millionaire's Problem and Its Extension.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2005
Fast Bit-Parallel GF(2^n) Multiplier for All Trinomials.
IEEE Trans. Computers, 2005

Secure Two-Party Computational Geometry.
J. Comput. Sci. Technol., 2005

Normal Basis Multiplication Algorithms for GF(2n) (Full Version).
IACR Cryptol. ePrint Arch., 2005

Real-time intrusion detection for high-speed networks.
Comput. Secur., 2005

A Soft Real-Time Web News Classification System with Double Control Loops.
Proceedings of the Advances in Web-Age Information Management, 2005

Using Trust for Restricted Delegation in Grid Environments.
Proceedings of the Information Security Practice and Experience, 2005

A New Micro-payment Protocol Based on P2P Networks.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

A queue model to detect DDos attacks.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005

2004
New GF(2n) Parallel Multiplier Using Redundant Representation.
IACR Cryptol. ePrint Arch., 2004

Two Software Normal Basis Multiplication Algorithms for GF(2n).
IACR Cryptol. ePrint Arch., 2004

Apply Feedback Control Theory to Design Soft Real-Time Search Engine System.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

Realizing Restricted Delegation Using Attribute Certificates in Grid Environments.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

An Information Search Interface with Soft Real-time Guarantee.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Skyeye: An Instruction Simulator with Energy Awareness.
Proceedings of the Embedded Software and Systems, First International Conference, 2004


  Loading...