Liangliang Xiao
Liangliang Xiao
Assistant Professor of Department of Computer Science & Information Technologies, Frostburg State University
Verified email at frostburg.edu
Title
Cited by
Cited by
Year
An Efficient Homomorphic Encryption Protocol for Multi-User Systems.
L Xiao, O Bastani, IL Yen
IACR Cryptol. EPrint Arch. 2012, 193, 2012
762012
Security analysis for order preserving encryption schemes
L Xiao, IL Yen
2012 46th annual conference on information sciences and systems (CISS), 1-6, 2012
652012
Dynamic strain aging phenomenon in metals and alloys [J]
K QIAN, X LI, L XIAO, W CHEN, H ZHANG, K PENG
Journal of Fuzhou University (Natural Sciences Edtion) 6, 2001
452001
Extending Order Preserving Encryption for Multi-User Systems.
L Xiao, IL Yen, DT Huynh
IACR Cryptol. ePrint Arch. 2012, 192, 2012
432012
DESIGN CONSTRUCTION AND BEAM TEST OF THE BEIJING 35MeV PROTON LINGAR ACCELERATOR
QY ZHOU, SH WANG, HB PAN, ZH LUO, LR XIAO, YX ZHANG
Chinese Physics C 11 (1), 85-91, 1987
411987
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption.
L Xiao, IL Yen, DT Huynh
IACR Cryptol. ePrint Arch. 2012, 350, 2012
372012
Secure, dependable, and high performance cloud storage
Y Ye, L Xiao, IL Yen, F Bastani
2010 29th IEEE Symposium on Reliable Distributed Systems, 194-203, 2010
362010
Overview of the applications of curvelet transform in image processing
G Long, L Xiao, X Chen
Journal of Computer Research and Development 42 (8), 1331, 2005
342005
Replica placement algorithms for mobile transaction systems
M Tu, P Li, L Xiao, IL Yen, FB Bastani
IEEE Transactions on knowledge and data Engineering 18 (7), 954-970, 2006
282006
Cloud storage design based on hybrid of replication and data partitioning
Y Ye, L Xiao, IL Yen, F Bastani
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
242010
Linear multi-secret sharing schemes based on multi-party computation
M Liu, L Xiao, Z Zhang
Finite Fields and Their Applications 12 (4), 704-713, 2006
242006
Linear multi-secret sharing schemes
L Xiao, M Liu
Science in China Series F: Information Sciences 48 (1), 125-136, 2005
232005
Data placement in P2P data grids considering the availability, security, access performance and load balancing
M Tu, H Ma, L Xiao, IL Yen, F Bastani, D Xu
Journal of grid computing 11 (1), 103-127, 2013
192013
Multiplicative linear secret sharing schemes based on connectivity of graphs
M Liu, L Xiao, Z Zhang
IEEE Transactions on Information Theory 53 (11), 3973-3978, 2007
182007
Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments
M Tu, K Spoa-Harty, L Xiao
Journal of Digital Forensics, Security and Law 10 (1), 3, 2015
152015
Scalable authentication and key management in SCADA
L Xiao, IL Yen, F Bastani
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
122010
Evaluating Dependable Distributed Storage Systems.
L Xiao, IL Yen, Y Zhang, FB Bastani
PDPTA, 948-954, 2007
122007
Secure, highly available, and high performance peer-to-peer storage systems
Y Ye, IL Yen, L Xiao, B Thuraisingham
2008 11th IEEE High Assurance Systems Engineering Symposium, 383-391, 2008
112008
An adaptive multiparty protocol for secure data protection
Q Ma, L Xiao, IL Yen, M Tu, F Bastani
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
112005
Leveraging service clouds for power and qos management for mobile devices
Y Ye, L Xiao, IL Yen, F Bastani
2011 IEEE 4th International Conference on Cloud Computing, 235-242, 2011
102011
The system can't perform the operation now. Try again later.
Articles 1–20