BibTeX records: Chao-Liang Liu

download as .bib file

@article{DBLP:journals/symmetry/LiuTCL18,
  author    = {Chao{-}Liang Liu and
               Wang{-}Jui Tsai and
               Ting{-}Yi Chang and
               Ta{-}Ming Liu},
  title     = {Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated
               Key Agreement Protocol for Mobile Distributed Computing Environments},
  journal   = {Symmetry},
  volume    = {10},
  number    = {4},
  pages     = {84},
  year      = {2018},
  url       = {https://doi.org/10.3390/sym10040084},
  doi       = {10.3390/sym10040084},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/symmetry/LiuTCL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuHT16,
  author    = {Chao{-}Liang Liu and
               Gwoboa Horng and
               Du{-}Shiau Tsai},
  title     = {Speeding up Pairing Computation Using Non-adjacent Form and {ELM}
               Method},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {1},
  pages     = {108--115},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p108-115.pdf},
  timestamp = {Fri, 31 Jul 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/LiuHT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuTCPW15,
  author    = {Chao{-}Liang Liu and
               Wang{-}Jui Tsai and
               Ting{-}Yi Chang and
               Chun{-}Cheng Peng and
               Peng{-}Shiang Wong},
  title     = {Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing
               Scheme Without Pixel Expansion},
  journal   = {Comput. J.},
  volume    = {58},
  number    = {7},
  pages     = {1598--1606},
  year      = {2015},
  url       = {https://doi.org/10.1093/comjnl/bxu105},
  doi       = {10.1093/comjnl/bxu105},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cj/LiuTCPW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuTCTZ15,
  author    = {Chao{-}Liang Liu and
               Cheng{-}Jung Tsai and
               Ting{-}Yi Chang and
               Wang{-}Jui Tsai and
               Po{-}Kai Zhong},
  title     = {Implementing multiple biometric features for a recall-based graphical
               keystroke dynamics authentication system on a smart phone},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {53},
  pages     = {128--139},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.jnca.2015.03.006},
  doi       = {10.1016/j.jnca.2015.03.006},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnca/LiuTCTZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ChenLH14,
  author    = {Yu{-}Chi Chen and
               Chao{-}Liang Liu and
               Gwoboa Horng},
  title     = {Cryptanalysis of some user identification schemes for distributed
               computer networks},
  journal   = {Int. J. Communication Systems},
  volume    = {27},
  number    = {11},
  pages     = {2909--2917},
  year      = {2014},
  url       = {https://doi.org/10.1002/dac.2514},
  doi       = {10.1002/dac.2514},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcomsys/ChenLH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/TsaiTL13,
  author    = {Yuan{-}Yu Tsai and
               Du{-}Shiau Tsai and
               Chao{-}Liang Liu},
  title     = {Reversible data hiding scheme based on neighboring pixel differences},
  journal   = {Digit. Signal Process.},
  volume    = {23},
  number    = {3},
  pages     = {919--927},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.dsp.2012.12.014},
  doi       = {10.1016/j.dsp.2012.12.014},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dsp/TsaiTL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChenHL13,
  author    = {Yu{-}Chi Chen and
               Gwoboa Horng and
               Chao{-}Liang Liu},
  title     = {Strong non-repudiation based on certificateless short signatures},
  journal   = {{IET} Information Security},
  volume    = {7},
  number    = {3},
  pages     = {253--263},
  year      = {2013},
  url       = {https://doi.org/10.1049/iet-ifs.2012.0134},
  doi       = {10.1049/iet-ifs.2012.0134},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-ifs/ChenHL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ChanTL12,
  author    = {Chi{-}Shiang Chan and
               Yuan{-}Yu Tsai and
               Chao{-}Liang Liu},
  title     = {An Image Hiding Scheme by Linking Pixels in the Circular Way},
  journal   = {{TIIS}},
  volume    = {6},
  number    = {6},
  pages     = {1718--1734},
  year      = {2012},
  url       = {https://doi.org/10.3837/tiis.2012.06.013},
  doi       = {10.3837/tiis.2012.06.013},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/itiis/ChanTL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LeL11,
  author    = {Duc{-}Phong Le and
               Chao{-}Liang Liu},
  title     = {Refinements of Miller's Algorithm over Weierstrass Curves Revisited},
  journal   = {Comput. J.},
  volume    = {54},
  number    = {10},
  pages     = {1582--1591},
  year      = {2011},
  url       = {https://doi.org/10.1093/comjnl/bxr039},
  doi       = {10.1093/comjnl/bxr039},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cj/LeL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-0337,
  author    = {Duc{-}Phong Le and
               Chao{-}Liang Liu},
  title     = {Refinements of Miller's Algorithm over Weierstrass Curves Revisited},
  journal   = {CoRR},
  volume    = {abs/1103.0337},
  year      = {2011},
  url       = {http://arxiv.org/abs/1103.0337},
  archivePrefix = {arXiv},
  eprint    = {1103.0337},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1103-0337.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/LiuHL08,
  author    = {Chao{-}Liang Liu and
               Gwoboa Horng and
               Hsin{-}Yu Liu},
  title     = {Computing the modular inverses is as simple as computing the GCDs},
  journal   = {Finite Fields Their Appl.},
  volume    = {14},
  number    = {1},
  pages     = {65--75},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.ffa.2007.08.004},
  doi       = {10.1016/j.ffa.2007.08.004},
  timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ffa/LiuHL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LiuHC07,
  author    = {Chao{-}Liang Liu and
               Gwoboa Horng and
               Te{-}Yu Chen},
  title     = {Further refinement of pairing computation based on Miller's algorithm},
  journal   = {Appl. Math. Comput.},
  volume    = {189},
  number    = {1},
  pages     = {395--409},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.amc.2006.11.135},
  doi       = {10.1016/j.amc.2006.11.135},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/LiuHC07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ChenHL06,
  author    = {Yu{-}Sheng Chen and
               Gwoboa Horng and
               Chao{-}Liang Liu},
  title     = {Performance improvement for the GGM-construction of pseudorandom functions},
  journal   = {Appl. Math. Comput.},
  volume    = {183},
  number    = {1},
  pages     = {486--490},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.amc.2006.05.112},
  doi       = {10.1016/j.amc.2006.05.112},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/amc/ChenHL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuHC06,
  author    = {Chao{-}Liang Liu and
               Gwoboa Horng and
               Te{-}Yu Chen},
  title     = {Further Refinement of Pairing Computation Based on Miller's Algorithm},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {106},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/106},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LiuHC06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiuHL05,
  author    = {Chao{-}Liang Liu and
               Gwoboa Horng and
               Hsin{-}Yu Liu},
  title     = {Cryptanalysis of an Efficient User Identification Scheme Based on
               ID-Based Cryptosystem},
  journal   = {{IEICE} Transactions},
  volume    = {88-B},
  number    = {5},
  pages     = {2171--2172},
  year      = {2005},
  url       = {https://doi.org/10.1093/ietcom/e88-b.5.2171},
  doi       = {10.1093/ietcom/e88-b.5.2171},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/LiuHL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics