default search action
Huixian Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Liangliang Tao, Huixian Li, Faqiang Wang, Maomao Liu, Zhao Tang, Qingya Wang:
An Adaptive Safe-Region Diversity Oversampling Algorithm for Imbalanced Classification. IEEE Access 12: 63713-63724 (2024) - [j18]Mengya He, Huixian Li, Ning Song, Shengjin Ji:
The zero forcing number of claw-free cubic graphs. Discret. Appl. Math. 359: 321-330 (2024) - 2022
- [j17]Huixian Li, Chenhao Wu, Liaojun Pang:
Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability. J. Inf. Secur. Appl. 71: 103384 (2022) - 2020
- [j16]Huixian Li, Jin Gao, Lingyun Wang, Liaojun Pang:
MPKC-based threshold proxy signcryption scheme. Int. Arab J. Inf. Technol. 17(2): 196-206 (2020)
2010 – 2019
- 2019
- [j15]Liaojun Pang, Mengmeng Wei, Huixian Li:
Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC. IEEE Access 7: 24511-24526 (2019) - [j14]Liaojun Pang, Man Kou, Mengmeng Wei, Huixian Li:
Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel. IEEE Access 7: 84091-84106 (2019) - 2018
- [j13]Huixian Li, Zhipeng Han, Liqin Wang, Liaojun Pang:
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials. IEEE Access 6: 53869-53881 (2018) - [j12]Liaojun Pang, Man Kou, Mengmeng Wei, Huixian Li:
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings. IEEE Access 6: 78123-78135 (2018) - 2017
- [j11]Liaojun Pang, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li:
Directed proxy signature with fast revocation proven secure in the standard model. IET Inf. Secur. 11(3): 168-176 (2017) - [j10]Liaojun Pang, Yufei Hu, Yi Liu, Kedong Xu, Huixian Li:
Efficient and secure certificateless signature scheme in the standard model. Int. J. Commun. Syst. 30(5) (2017) - 2016
- [j9]Liaojun Pang, Huiyang Zhao, Xia Zhou, Huixian Li:
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model. Int. J. Distributed Sens. Networks 12(1): 3205206:1-3205206:12 (2016) - [j8]Huixian Li, Liaojun Pang:
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme. Int. J. Distributed Sens. Networks 12(5): 5235714:1-5235714:12 (2016) - 2015
- [j7]Liaojun Pang, Lu Gao, Huixian Li, Yumin Wang:
Anonymous multi-receiver ID-based signcryption scheme. IET Inf. Secur. 9(3): 194-201 (2015) - [j6]Mohammed Amin Benamara, Huixian Li:
Secure of personal health records shared in cloud computing using cipher-text attribute based encryption. Int. J. Secur. Networks 10(3): 183-190 (2015) - 2014
- [j5]Huixian Li, Liaojun Pang:
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 8(1): 8-11 (2014) - [j4]Liaojun Pang, Huixian Li, Li-wei He, Ali Alramadhan, Yumin Wang:
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing. Int. J. Commun. Syst. 27(11): 3244-3254 (2014) - 2013
- [j3]Liaojun Pang, Huixian Li:
nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. Comput. Informatics 32(3): 441-460 (2013) - [j2]Liaojun Pang, Huixian Li, Qingqi Pei, Yumin Wang:
Improvement on Meshram et al.'s ID-based cryptographic mechanism. Inf. Process. Lett. 113(19-21): 789-792 (2013) - [c10]Huixian Li, Yafang Yang, Liaojun Pang:
An efficient authentication protocol with user anonymity for mobile networks. WCNC 2013: 1842-1847 - 2012
- [j1]Liaojun Pang, Huixian Li, Qingqi Pei:
Improved multicast key management of Chinese wireless local area network security standard. IET Commun. 6(9): 1126-1130 (2012) - [c9]Huixian Li, Jinshun Hu, Liwei He, Liaojun Pang:
Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard. CIS 2012: 678-682 - 2011
- [c8]Huixian Li, Ping Yin, Xuan Wang, Liaojun Pang:
A Novel Hash-based RFID Mutual Authentication Protocol. CIS 2011: 774-778 - [c7]Na Fan, Huixian Li, Chao Wang:
Research on Sentiment Analyzing in Multi-topics Texts. CSISE (2) 2011: 581-586 - 2010
- [c6]Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li:
Secure Communication Model of WSN Based on Secret Sharing. CIS 2010: 483-487
2000 – 2009
- 2009
- [c5]Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang:
Key Binding Based on Biometric Shielding Functions. IAS 2009: 19-22 - [c4]Huixian Li, Liaojun Pang:
A Novel Biometric-Based Authentication Scheme with Privacy Protection. IAS 2009: 295-298 - 2008
- [c3]Huixian Li, Liaojun Pang:
Improvement on WLAN Multicast Key Management Protocol. CIS (2) 2008: 419-424 - [c2]Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. ISECS 2008: 22-26 - 2003
- [c1]Huixian Li, John Lim, K. S. Raman:
An exploratory case study on IS implementation and organizational change in China. ECIS 2003: 1062-1072
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint