Follow
Liangliang Xiao
Liangliang Xiao
Assistant Professor of Department of Computer Science & Information Technologies, Frostburg State University
Verified email at frostburg.edu
Title
Cited by
Cited by
Year
An efficient homomorphic encryption protocol for multi-user systems
L Xiao, O Bastani, IL Yen
Cryptology ePrint Archive, 2012
972012
Security analysis for order preserving encryption schemes
L Xiao, IL Yen
2012 46th annual conference on information sciences and systems (CISS), 1-6, 2012
762012
Extending order preserving encryption for multi-user systems
L Xiao, IL Yen, DT Huynh
Cryptology ePrint Archive, 2012
502012
A note for the ideal order-preserving encryption object and generalized order-preserving encryption
L Xiao, IL Yen
Cryptology ePrint Archive, 2012
472012
DESIGN CONSTRUCTION AND BEAM TEST OF THE BEIJING 35MeV PROTON LINGAR ACCELERATOR
QY ZHOU, SH WANG, HB PAN, ZH LUO, LR XIAO, YX ZHANG
Chinese Physics C 11 (1), 85-91, 1987
461987
Secure, dependable, and high performance cloud storage
Y Ye, L Xiao, IL Yen, F Bastani
2010 29th IEEE Symposium on Reliable Distributed Systems, 194-203, 2010
342010
Replica placement algorithms for mobile transaction systems
M Tu, P Li, L Xiao, IL Yen, FB Bastani
IEEE Transactions on Knowledge and Data Engineering 18 (7), 954-970, 2006
302006
Linear multi-secret sharing schemes based on multi-party computation
M Liu, L Xiao, Z Zhang
Finite Fields and Their Applications 12 (4), 704-713, 2006
272006
Dynamic strain aging phenomenon in metals and alloys
KW Qian, XQ Li, LG Xiao, W Chen, H Zhang, K Peng
J. Fuzhou Univ.(Nat. Sci. Ed.) 26, 8-23, 2001
272001
Data placement in P2P data grids considering the availability, security, access performance and load balancing
M Tu, H Ma, L Xiao, IL Yen, F Bastani, D Xu
Journal of grid computing 11, 103-127, 2013
252013
Cloud storage design based on hybrid of replication and data partitioning
Y Ye, L Xiao, IL Yen, F Bastani
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
252010
Linear multi-secret sharing schemes
L Xiao, M Liu
Science in China Series F: Information Sciences 48, 125-136, 2005
242005
Overview of the applications of Curvelet transform in image processing.
G Long, L Xiao, X Chen
Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 42 (8), 1331-1337, 2005
242005
Data loss prevention management and control: Inside activity incident monitoring, identification, and tracking in healthcare enterprise environments
M Tu, K Spoa-Harty, L Xiao
Journal of Digital Forensics, Security and Law 10 (1), 3, 2015
212015
Multiplicative linear secret sharing schemes based on connectivity of graphs
M Liu, L Xiao, Z Zhang
IEEE Transactions on Information Theory 53 (11), 3973-3978, 2007
212007
Challenges of snow leopard conservation in China
J Li, L Xiao, Z Lu
Science China. Life Sciences 59 (6), 637, 2016
172016
System resilience enhancement through modularization for large scale cyber systems
M Tu, L Xiao
2016 IEEE/CIC International Conference on Communications in China (ICCC …, 2016
132016
Scalable authentication and key management in SCADA
L Xiao, IL Yen, F Bastani
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
132010
Secure, highly available, and high performance peer-to-peer storage systems
Y Ye, IL Yen, L Xiao, B Thuraisingham
2008 11th IEEE High Assurance Systems Engineering Symposium, 383-391, 2008
122008
Evaluating Dependable Distributed Storage Systems.
L Xiao, IL Yen, Y Zhang, FB Bastani
PDPTA, 948-954, 2007
122007
The system can't perform the operation now. Try again later.
Articles 1–20