default search action
Yiqi Dai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j15]Shundong Li, Chunying Wu, Daoshun Wang, Yiqi Dai:
Secure multiparty computation of solid geometric problems and their applications. Inf. Sci. 282: 401-413 (2014) - 2013
- [j14]Zhiyong Tan, Duo Liu, Xuejun Zhuo, Yiqi Dai, Laurence T. Yang:
Implementation and performance analysis of multilevel security system in pervasive computing environment. J. Supercomput. 66(3): 1243-1259 (2013) - 2012
- [j13]Lin Dong, Daoshun Wang, Shundong Li, Yiqi Dai:
(2, n) secret sharing scheme for gray and color images based on Boolean operation. Sci. China Inf. Sci. 55(5): 1151-1161 (2012) - [j12]Haiwei Xue, Yiqi Dai:
A privacy protection model for transparent computing system. Int. J. Cloud Comput. 1(4): 367-384 (2012) - [c28]Zhien Guo, Yiqi Dai:
Security SLAs for IMS-based Cloud Services. ChinaGrid 2012: 57-60 - [c27]Chunlei Wang, Lan Fang, Yiqi Dai, Liang Ming, Qing Miao, Dongxia Wang:
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making. CyberC 2012: 178-184 - 2011
- [c26]Xuejun Zhuo, Wei Gao, Guohong Cao, Yiqi Dai:
Win-Coupon: An incentive framework for 3G traffic offloading. ICNP 2011: 206-215 - [c25]Xuejun Zhuo, Qinghua Li, Wei Gao, Guohong Cao, Yiqi Dai:
Contact duration aware data replication in Delay Tolerant Networks. ICNP 2011: 236-245 - [c24]Xiong Liu, Haiwei Xue, Yiqi Dai:
A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. IPTC 2011: 1-4 - [c23]Xuejun Zhuo, Qinghua Li, Guohong Cao, Yiqi Dai, Boleslaw K. Szymanski, Tom La Porta:
Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach. MASS 2011: 92-101 - 2010
- [c22]Lin Dong, Daoshun Wang, Min Ku, Yiqi Dai:
(2, n) Secret Image Sharing Scheme with Ideal Contrast. CIS 2010: 421-424 - [c21]Chunlei Wang, Yan Wen, Yiqi Dai:
A software vulnerability analysis environment based on virtualization technology. WCNIS 2010: 620-624
2000 – 2009
- 2009
- [j11]Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai:
Cryptanalysis of RSA for a special case with d > e. Sci. China Ser. F Inf. Sci. 52(4): 609-616 (2009) - [j10]Shundong Li, Daoshun Wang, Yiqi Dai:
Symmetric cryptographic protocols for extended millionaires' problem. Sci. China Ser. F Inf. Sci. 52(6): 974-982 (2009) - [j9]Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai:
Probability method for cryptanalysis of general multivariate modular linear equation. Sci. China Ser. F Inf. Sci. 52(10): 1792-1800 (2009) - [j8]Shundong Li, Daoshun Wang, Yiqi Dai:
Secure Signature Protocol. Intell. Inf. Manag. 1(3): 174-179 (2009) - [c20]Chao Chen, Ke Wang, Yiqi Dai:
A Novel Architecture for Enterprise Network Security. CIS (1) 2009: 537-541 - [c19]Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai:
A Novel Server-Based Application Execution Architecture. CSE (2) 2009: 678-683 - [c18]Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai:
Remarks on Cryptanalysis of RSA Using Lattice Basis Reduction. CSIE (1) 2009: 125-129 - [c17]Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai:
Cryptanalysis of RSA with Constrained Low Public Exponent. Security and Management 2009: 136-142 - [c16]Xuejun Zhuo, Jianguo Hao, Duo Liu, Yiqi Dai:
Removal of misbehaving insiders in anonymous VANETs. MSWiM 2009: 106-115 - 2008
- [j7]Shundong Li, Yiqi Dai, Daoshun Wang, Ping Luo:
Comparing two sets without disclosing them. Sci. China Ser. F Inf. Sci. 51(9): 1231-1238 (2008) - [j6]Duo Liu, Dongping Huang, Ping Luo, Yiqi Dai:
New schemes for sharing points on an elliptic curve. Comput. Math. Appl. 56(6): 1556-1561 (2008) - [j5]Shundong Li, Daoshun Wang, Yiqi Dai, Ping Luo:
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations. Inf. Sci. 178(1): 244-255 (2008) - [c15]Duo Liu, Zhiyong Tan, Yiqi Dai:
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. Inscrypt 2008: 253-264 - [c14]Jianguo Hao, Jia Zou, Yiqi Dai:
A Real-Time Payment Scheme for SIP Service Based on Hash Chain. ICEBE 2008: 279-286 - [c13]Jia Zou, Zhiyong Liang, Yiqi Dai:
Scalability Evaluation and Optimization of Multi-Core SIP Proxy Server. ICPP 2008: 43-50 - 2007
- [j4]Duo Liu, Ping Luo, Yiqi Dai:
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem. J. Comput. Sci. Technol. 22(1): 92-94 (2007) - [c12]Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai:
Cryptanalysis of General Lu-Lee Type Systems. Inscrypt 2007: 412-426 - [c11]Feng Yi, Daoshun Wang, Xiaobo Li, Yiqi Dai:
Colored Probabilistic Visual Cryptography Scheme with Reversing. Security and Management 2007: 138-141 - [c10]Jia Zou, Yiqi Dai:
Motivating and Modeling SIP Offload. ICCCN 2007: 741-746 - 2006
- [c9]Shundong Li, Yiqi Dai, Daoshun Wang, Ping Luo:
Symmetric Encryption Solutions to Millionaire's Problem and Its Extension. ICDIM 2006: 531-537 - [i5]Daoshun Wang, Feng Yi, Xiaobo Li, Ping Luo, Yiqi Dai:
On the Analysis and Generalization of Extended Visual Cryptography Schemes. CoRR abs/cs/0610172 (2006) - [i4]Feng Yi, Daoshun Wang, Yiqi Dai:
Visual secret sharing scheme with autostereogram. IACR Cryptol. ePrint Arch. 2006: 295 (2006) - 2005
- [j3]Wenbao Jiang, Hua Song, Yiqi Dai:
Real-time intrusion detection for high-speed networks. Comput. Secur. 24(4): 287-294 (2005) - [j2]Shundong Li, Yiqi Dai:
Secure Two-Party Computational Geometry. J. Comput. Sci. Technol. 20(2): 258-263 (2005) - [j1]Haining Fan, Yiqi Dai:
Fast Bit-Parallel GF(2^n) Multiplier for All Trinomials. IEEE Trans. Computers 54(4): 485-490 (2005) - [c8]Shuang Hao, Hua Song, Wenbao Jiang, Yiqi Dai:
A queue model to detect DDos attacks. CTS 2005: 106-112 - [c7]Jia Zou, Si Tiange, Huang Liansheng, Yiqi Dai:
A New Micro-payment Protocol Based on P2P Networks. ICEBE 2005: 449-455 - [c6]Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai:
Using Trust for Restricted Delegation in Grid Environments. ISPEC 2005: 293-301 - [c5]Huayong Wang, Yu Chen, Yiqi Dai:
A Soft Real-Time Web News Classification System with Double Control Loops. WAIM 2005: 81-90 - [i3]Haining Fan, Duo Liu, Yiqi Dai:
Normal Basis Multiplication Algorithms for GF(2n) (Full Version). IACR Cryptol. ePrint Arch. 2005: 358 (2005) - 2004
- [c4]Shuo Kang, Huayong Wang, Yu Chen, Xiaoge Wang, Yiqi Dai:
Skyeye: An Instruction Simulator with Energy Awareness. ICESS 2004: 456-461 - [c3]Huayong Wang, Yiqi Dai:
An Information Search Interface with Soft Real-time Guarantee. ITCC (2) 2004: 820- - [c2]Wenbao Jiang, Hua Song, Yiqi Dai:
Realizing Restricted Delegation Using Attribute Certificates in Grid Environments. SNPD 2004: 359-365 - [c1]Huayong Wang, Yiqi Dai:
Apply Feedback Control Theory to Design Soft Real-Time Search Engine System. WAIM 2004: 268-279 - [i2]Haining Fan, Yiqi Dai:
Two Software Normal Basis Multiplication Algorithms for GF(2n). IACR Cryptol. ePrint Arch. 2004: 126 (2004) - [i1]Haining Fan, Yiqi Dai:
New GF(2n) Parallel Multiplier Using Redundant Representation. IACR Cryptol. ePrint Arch. 2004: 137 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-16 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint