default search action
Lijun Liao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Li Duan, Yong Li, Lijun Liao:
Practical Certificate-Less Infrastructure with Application in TLS. Cryptogr. 7(4): 63 (2023) - [c20]Li Duan, Yong Li, Lijun Liao:
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography. ISC 2023: 415-434 - 2022
- [c19]Peng Ren, Xingyue Liu, Shuxin Zheng, Lijun Liao, Xin Li, Ligong Lu, Xia Wang, Ruoyu Wang, Ming Sheng:
A Hybrid Medical Causal Inference Platform Based on Data Lake. HIS 2022: 136-144 - 2021
- [c18]Li Duan, Yong Li, Lijun Liao:
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things. SecITC 2021: 190-209 - [c17]Li Duan, Yong Li, Lijun Liao:
Flexible Group Non-interactive Key Exchange in the Standard Model. SecITC 2021: 210-227 - 2020
- [j3]Li Duan, Yong Li, Lijun Liao:
Non-interactive certificate update protocol for efficient authentication in IoT. Future Gener. Comput. Syst. 113: 132-144 (2020) - [c16]Li Duan, Yong Li, Lijun Liao:
Lightweight key management system for inter-node communication in IoT. IOT 2020: 14:1-14:8
2010 – 2019
- 2019
- [c15]Li Duan, Yong Li, Lijun Liao:
Non-interactive Certificate Update Protocol for Efficient Authentication in IoT. IOT 2019: 8:1-8:8 - 2018
- [c14]Li Duan, Yong Li, Lijun Liao:
Flexible certificate revocation list for efficient authentication in IoT. IOT 2018: 7:1-7:8 - 2010
- [b1]Lijun Liao:
Secure email communication with XML-based technologies. Ruhr University Bochum, 2010, ISBN 978-3-89966-346-4, pp. 1-258
2000 – 2009
- 2009
- [c13]Sebastian Gajek, Meiko Jensen, Lijun Liao, Jörg Schwenk:
Analysis of Signature Wrapping Attacks and Countermeasures. ICWS 2009: 575-582 - [c12]Meiko Jensen, Lijun Liao, Jörg Schwenk:
The curse of namespaces in the domain of XML signature. SWS 2009: 29-36 - 2008
- [c11]Lijun Liao, Jörg Schwenk:
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. ICICS 2008: 19-32 - [c10]Sebastian Gajek, Lijun Liao, Jörg Schwenk:
Stronger TLS bindings for SAML assertions and SAML artifacts. SWS 2008: 11-20 - 2007
- [j2]Sebastian Gajek, Lijun Liao, Jörg Schwenk:
Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS. Datenschutz und Datensicherheit 31(11): 816-821 (2007) - [j1]Lijun Liao, Mark Manulis:
Tree-based group key agreement framework for mobile ad-hoc networks. Future Gener. Comput. Syst. 23(6): 787-803 (2007) - [c9]Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. WEWST 2007 - [c8]Lijun Liao, Jörg Schwenk:
Secure Emails in XML Format Using Web Services. ECOWS 2007: 129-136 - [c7]Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment framework for Web services. WEWST@ECOWS (Final Proceedings) 2007: 141-157 - [c6]Lijun Liao, Jörg Schwenk:
Securing Email Communication with XML Technology. International Conference on Internet Computing 2007: 304-310 - [c5]Lijun Liao, Jörg Schwenk:
End-to-End Header Protection in Signed S/MIME. OTM Conferences (2) 2007: 1646-1658 - [c4]Sebastian Gajek, Lijun Liao, Jörg Schwenk:
Breaking and fixing the inline approach. SWS 2007: 37-43 - 2006
- [c3]Lijun Liao, Mark Manulis:
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks. AINA (2) 2006: 5-9 - [i1]Lijun Liao:
Group Key Agreement for Ad Hoc Networks. IACR Cryptol. ePrint Arch. 2006: 6 (2006) - 2005
- [c2]Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk:
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. Communications and Multimedia Security 2005: 291-300 - [c1]Changyun Li, Bei Shui Liao, Ai-Min Yang, Lijun Liao:
Composition of Web Services Using Ontology with Monotonic Inheritance. FSKD (2) 2005: 1089-1092
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint