default search action
Tianjie Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j20]Fei Peng, Tianjie Cao:
Software-Defined Network Resource Optimization of the Data Center Based on P4 Programming Language. Mob. Inf. Syst. 2021: 3601104:1-3601104:7 (2021) - 2017
- [j19]Xiuqing Chen, Tianjie Cao, Robin Doss, Jingxuan Zhai:
Attacks on and Countermeasures for Two RFID Protocols. Wirel. Pers. Commun. 96(4): 5825-5848 (2017) - 2016
- [j18]Tianjie Cao, Xiuqing Chen, Robin Doss, Jingxuan Zhai, Lucas J. Wise, Qiang Zhao:
RFID ownership transfer protocol based on cloud. Comput. Networks 105: 47-59 (2016) - 2015
- [j17]Jijie Wu, Tianjie Cao, Jingxuan Zhai:
BlindLock: 一种有效防范污迹攻击的图案锁系统 (BlindLock: An Effective Pattern Lock System Against Smudge Attack). 计算机科学 42(Z11): 364-367 (2015) - 2014
- [j16]Xiuqing Chen, Tianjie Cao, Mingxiang Zhu, Wenzhuo Liu, Yu Guo:
Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol. J. Comput. 9(4): 938-946 (2014) - [j15]Mingxiang Zhu, Tianjie Cao, Xiangying Jiang:
Using clustering coefficient to construct weighted networks for supervised link prediction. Soc. Netw. Anal. Min. 4(1): 215 (2014) - 2013
- [j14]Tianjie Cao, Jingxuan Zhai:
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(2): 9912 (2013) - 2011
- [j13]Hui Cui, Tianjie Cao:
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks. J. Networks 6(9): 1337-1343 (2011) - 2010
- [j12]Yuhang Gao, Tianjie Cao:
Memory Forensics for QQ from a Live System. J. Comput. 5(4): 541-548 (2010) - 2009
- [j11]Tianjie Cao, Peng Shen:
Cryptanalysis of Two RFID Authentication Protocols . Int. J. Netw. Secur. 9(1): 95-100 (2009) - [j10]Qian Zhao, Tianjie Cao:
Collecting Sensitive Information from Windows Physical Memory. J. Comput. 4(1): 3-10 (2009) - [j9]Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo:
Controlled Secret Leakage. J. Comput. 4(1): 61-68 (2009) - [j8]Tianjie Cao, Tao Quan, Bo Zhang:
Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols. J. Networks 4(4): 263-270 (2009) - [j7]Hui Cui, Tianjie Cao:
An Novel Anonymous Authenticated and Key Exchange Protocol. J. Networks 4(10): 985-992 (2009) - [j6]Tianjie Cao, Elisa Bertino, Hong Lei:
Security Analysis of the SASI Protocol. IEEE Trans. Dependable Secur. Comput. 6(1): 73-77 (2009) - 2008
- [j5]Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of Some RFID Authentication Protocols. J. Commun. 3(7): 20-27 (2008) - 2007
- [j4]Tianjie Cao, Xianping Mao:
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes. Int. J. Netw. Secur. 4(3): 355-360 (2007) - 2006
- [j3]Tianjie Cao, Dongdai Lin:
Cryptanalysis of two password authenticated key exchange protocols based on RSA. IEEE Commun. Lett. 10(8): 623-625 (2006) - [j2]Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of Some Batch Verifying Signatures from Pairings. Int. J. Netw. Secur. 3(2): 138-143 (2006) - 2005
- [j1]Tianjie Cao, Dongdai Lin, Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash. Comput. Secur. 24(1): 44-49 (2005)
Conference and Workshop Papers
- 2011
- [c16]Yu Bao, Tianjie Cao, Guosun Zeng:
Multistage Filtering for Collusion Detection in P2P Network. DASC 2011: 911-916 - [c15]Fang Ding, Tianjie Cao:
Application of Daubechies Wavelet Transform in the Estimation of Standard Deviation of White Noise. ICDMA 2011: 212-215 - [c14]Yu Bao, Tianjie Cao, Guosun Zeng:
Resisting Collusion by Game in Culture Web. WETICE 2011: 262-267 - 2008
- [c13]Tianjie Cao, Tao He, Qihan Luo:
Smart-Phone Based Server-Aided Computation. ISCSCT (1) 2008: 295-298 - [c12]Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309 - 2007
- [c11]Yongping Zhang, Wei Wei, Tianjie Cao:
Improvement of an Authenticated Key Agreement Protocol. APWeb/WAIM Workshops 2007: 593-601 - [c10]Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo:
Controlled Secret Leakage. CIS 2007: 868-872 - [c9]Hong Lei, Tianjie Cao:
Cryptanalysis of SPA Protocol. SITIS 2007: 1049-1052 - 2006
- [c8]Tianjie Cao, Xianping Mao, Dongdai Lin:
Security Analysis of a Server-Aided RSA Key Generation Protocol. ISPEC 2006: 314-320 - 2005
- [c7]Tianjie Cao, Dongdai Lin, Rui Xue:
An Efficient ID-Based Deniable Authentication Protocol from Pairings. AINA 2005: 388-391 - [c6]Tianjie Cao, Dongdai Lin, Rui Xue:
ID-Based Ring Authenticated Encryption. AINA 2005: 591-596 - [c5]Tianjie Cao, Dongdai Lin, Rui Xue:
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. CIS (2) 2005: 1036-1041 - [c4]Tianjie Cao, Dongdai Lin:
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. CISC 2005: 233-241 - [c3]Ying Wu, Yongping Zhang, Tianjie Cao:
Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem. Security and Management 2005: 58-64 - 2004
- [c2]Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of User Efficient Blind Signatures. AWCC 2004: 167-172 - [c1]Tianjie Cao, Dongdai Lin, Rui Xue:
Improved Privacy-Protecting Proxy Signature Scheme. AWCC 2004: 208-213
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint