An efficient homomorphic encryption protocol for multi-user systems L Xiao, O Bastani, IL Yen Cryptology ePrint Archive, 2012 | 96 | 2012 |
Security analysis for order preserving encryption schemes L Xiao, IL Yen 2012 46th annual conference on information sciences and systems (CISS), 1-6, 2012 | 77 | 2012 |
Extending order preserving encryption for multi-user systems L Xiao, IL Yen, DT Huynh Cryptology ePrint Archive, 2012 | 50 | 2012 |
A note for the ideal order-preserving encryption object and generalized order-preserving encryption L Xiao, IL Yen Cryptology ePrint Archive, 2012 | 47 | 2012 |
DESIGN CONSTRUCTION AND BEAM TEST OF THE BEIJING 35MeV PROTON LINGAR ACCELERATOR QY ZHOU, SH WANG, HB PAN, ZH LUO, LR XIAO, YX ZHANG Chinese Physics C 11 (1), 85-91, 1987 | 46 | 1987 |
Secure, dependable, and high performance cloud storage Y Ye, L Xiao, IL Yen, F Bastani 2010 29th IEEE Symposium on Reliable Distributed Systems, 194-203, 2010 | 38 | 2010 |
Replica placement algorithms for mobile transaction systems M Tu, P Li, L Xiao, IL Yen, FB Bastani IEEE Transactions on Knowledge and Data Engineering 18 (7), 954-970, 2006 | 30 | 2006 |
Dynamic strain aging phenomenon in metals and alloys KW Qian, XQ Li, LG Xiao, W Chen, H Zhang, K Peng J. Fuzhou Univ.(Nat. Sci. Ed.) 26, 8-23, 2001 | 28 | 2001 |
Data loss prevention management and control: Inside activity incident monitoring, identification, and tracking in healthcare enterprise environments M Tu, K Spoa-Harty, L Xiao Journal of Digital Forensics, Security and Law 10 (1), 3, 2015 | 27 | 2015 |
Linear multi-secret sharing schemes based on multi-party computation M Liu, L Xiao, Z Zhang Finite Fields and Their Applications 12 (4), 704-713, 2006 | 27 | 2006 |
Data placement in P2P data grids considering the availability, security, access performance and load balancing M Tu, H Ma, L Xiao, IL Yen, F Bastani, D Xu Journal of grid computing 11, 103-127, 2013 | 26 | 2013 |
Cloud storage design based on hybrid of replication and data partitioning Y Ye, L Xiao, IL Yen, F Bastani 2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010 | 25 | 2010 |
Overview of the applications of Curvelet transform in image processing. G Long, L Xiao, X Chen Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 42 (8), 1331-1337, 2005 | 24 | 2005 |
Linear multi-secret sharing schemes L Xiao, M Liu Science in China Series F: Information Sciences 48, 125-136, 2005 | 23 | 2005 |
Multiplicative linear secret sharing schemes based on connectivity of graphs M Liu, L Xiao, Z Zhang IEEE Transactions on Information Theory 53 (11), 3973-3978, 2007 | 21 | 2007 |
Challenges of snow leopard conservation in China J Li, L Xiao, Z Lu Science China. Life Sciences 59 (6), 637, 2016 | 19 | 2016 |
System resilience enhancement through modularization for large scale cyber systems M Tu, L Xiao 2016 IEEE/CIC International Conference on Communications in China (ICCC …, 2016 | 16 | 2016 |
Scalable authentication and key management in SCADA L Xiao, IL Yen, F Bastani 2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010 | 13 | 2010 |
Secure, highly available, and high performance peer-to-peer storage systems Y Ye, IL Yen, L Xiao, B Thuraisingham 2008 11th IEEE High Assurance Systems Engineering Symposium, 383-391, 2008 | 12 | 2008 |
Evaluating Dependable Distributed Storage Systems. L Xiao, IL Yen, Y Zhang, FB Bastani PDPTA, 948-954, 2007 | 12 | 2007 |