Tianjie Cao
Orcid: 0000-0002-8120-5029
According to our database1,
Tianjie Cao
authored at least 36 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Software-Defined Network Resource Optimization of the Data Center Based on P4 Programming Language.
Mob. Inf. Syst., 2021
2017
2016
2015
BlindLock: 一种有效防范污迹攻击的图案锁系统 (BlindLock: An Effective Pattern Lock System Against Smudge Attack).
计算机科学, 2015
2014
Using clustering coefficient to construct weighted networks for supervised link prediction.
Soc. Netw. Anal. Min., 2014
J. Comput., 2014
2013
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013
2011
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks.
J. Networks, 2011
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011
Application of Daubechies Wavelet Transform in the Estimation of Standard Deviation of White Noise.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
2009
Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols.
J. Networks, 2009
2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
2007
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes.
Int. J. Netw. Secur., 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
2006
Int. J. Netw. Secur., 2006
IEEE Commun. Lett., 2006
Proceedings of the Information Security Practice and Experience, 2006
2005
Comput. Secur., 2005
Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem.
Proceedings of The 2005 International Conference on Security and Management, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004