
BibTeX records: Chen Li 0019
@article{DBLP:journals/isci/LiLG20a, author = {Weihao Li and Chen Li and Yeli Geng}, title = {{APS:} Attribute-aware privacy-preserving scheme in location-based services}, journal = {Inf. Sci.}, volume = {527}, pages = {460--476}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.02.025}, doi = {10.1016/j.ins.2019.02.025}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiLG20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DingCLFL19, author = {Sheng Ding and Jin Cao and Chen Li and Kai Fan and Hui Li}, title = {A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT}, journal = {{IEEE} Access}, volume = {7}, pages = {38431--38441}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905846}, doi = {10.1109/ACCESS.2019.2905846}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DingCLFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiM18, author = {Chen Li and Wenping Ma}, title = {Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2668--2669}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825143}, doi = {10.1109/TIFS.2018.2825143}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0019L0CC15, author = {Chen Li and Rongxing Lu and Hui Li and Le Chen and Jie Chen}, title = {{PDA:} a privacy-preserving dual-functional aggregation scheme for smart grid communications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2494--2506}, year = {2015}, url = {https://doi.org/10.1002/sec.1191}, doi = {10.1002/sec.1191}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0019L0CC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiCLL15, author = {Chen Li and Le Chen and Rongxing Lu and Hui Li}, title = {Comment on "An Efficient Homomorphic {MAC} with Small Key Size for Authentication in Network Coding"}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {3}, pages = {882--883}, year = {2015}, url = {https://doi.org/10.1109/TC.2015.2389800}, doi = {10.1109/TC.2015.2389800}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiCLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiLLCL14, author = {Chen Li and Rongxing Lu and Hui Li and Le Chen and Xiaoqing Li}, title = {Comment on "A Novel Homomorphic {MAC} Scheme for Authentication in Network Coding"}, journal = {{IEEE} Commun. Lett.}, volume = {18}, number = {12}, pages = {2129--2132}, year = {2014}, url = {https://doi.org/10.1109/LCOMM.2014.2361805}, doi = {10.1109/LCOMM.2014.2361805}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiLLCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.