Ninghui Li Home Page Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
91Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQihua Wang, Hongxia Jin, Ninghui Li: Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. ESORICS 2009: 268-284
90Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Xiaonan Ma, Ninghui Li: WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. ESORICS 2009: 472-488
89Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZiqing Mao, Ninghui Li, Ian Molloy: Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Financial Cryptography 2009: 238-255
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Ninghui Li, Jian Zhang: Modeling and Integrating Background Knowledge in Data Anonymization. ICDE 2009: 6-17
87Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIan Molloy, Ninghui Li, Tiancheng Li: On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. ICDM 2009: 872-877
86Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Ninghui Li: On the tradeoff between privacy and utility in data publishing. KDD 2009: 517-526
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHong Chen, Ninghui Li, Ziqing Mao: Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. NDSS 2009
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin: Access control policy combining: theory meets practice. SACMAT 2009: 135-144
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li: An efficient framework for user authorization queries in RBAC systems. SACMAT 2009: 23-32
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZiqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang: Trojan horse resistant discretionary access control. SACMAT 2009: 237-246
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPrathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIan Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo: Evaluating role mining algorithms. SACMAT 2009: 95-104
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li: Homomorphic Encryption. Encyclopedia of Database Systems 2009: 1320
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li: Asymmetric Encryption. Encyclopedia of Database Systems 2009: 142
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li: Symmetric Encryption. Encyclopedia of Database Systems 2009: 2897-2898
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li: Data Encryption. Encyclopedia of Database Systems 2009: 574
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Qihua Wang, Mahesh V. Tripunitara: Resiliency Policies in Access Control. ACM Trans. Inf. Syst. Secur. 12(4): (2009)
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy: Slicing: A New Approach to Privacy Preserving Data Publishing CoRR abs/0909.2290: (2009)
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009)
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJi-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn: Privacy-preserving incremental data dissemination. Journal of Computer Security 17(1): 43-68 (2009)
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li: TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. PVLDB 2(2): 1618-1621 (2009)
2008
70no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIndrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang: Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQihua Wang, Ninghui Li, Hong Chen: On the Security of Delegation in Access Control Systems. ESORICS 2008: 317-332
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Ninghui Li: Injector: Mining Background Knowledge for Data Anonymization. ICDE 2008: 446-455
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li: How to make Discretionary Access Control secure against trojan horses. IPDPS 2008: 1-3
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi: PRECIP: Towards Practical and Retrofittable Confidential Information Protection. NDSS 2008
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPrathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIan Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Ninghui Li: Towards optimal k-anonymization. Data Knowl. Eng. 65(1): 22-39 (2008)
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLS. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008)
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Qihua Wang: Beyond separation of duty: An algebra for specifying high-level security policies. J. ACM 55(3): (2008)
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRui Xue, Ninghui Li, Jiangtao Li: Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008)
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJi-Won Byun, Ninghui Li: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4): 603-619 (2008)
2007
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li, Rui Xue: Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Ziqing Mao: Administration in role-based access control. ASIACCS 2007: 127-138
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQihua Wang, Ninghui Li: Direct static enforcement of high-level security policies. ASIACCS 2007: 214-225
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJi-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQihua Wang, Ninghui Li: Satisfiability and Resiliency in Workflow Systems. ESORICS 2007: 90-105
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIan Molloy, Jiangtao Li, Ninghui Li: Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Tiancheng Li, Suresh Venkatasubramanian: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. ICDE 2007: 106-115
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Ziqing Mao, Hong Chen: Usable Mandatory Integrity Protection for Operating Systems. IEEE Symposium on Security and Privacy 2007: 164-178
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Mahesh V. Tripunitara, Ziad Bizri: On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnnie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007)
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Ji-Won Byun, Elisa Bertino: A Critique of the ANSI Standard on Role-Based Access Control. IEEE Security & Privacy 5(6): 41-49 (2007)
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMahesh V. Tripunitara, Ninghui Li: A theory for comparing the expressive power of access control models. Journal of Computer Security 15(2): 231-272 (2007)
2006
43no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Mahesh V. Tripunitara, Qihua Wang: Resiliency policies in access control. ACM Conference on Computer and Communications Security 2006: 113-123
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Qihua Wang: Beyond separation of duty: an algebra for specifying high-level security policies. ACM Conference on Computer and Communications Security 2006: 356-369
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTiancheng Li, Ninghui Li: Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. ICDM Workshops 2006: 518-523
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li: A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZiqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHong Chen, Ninghui Li: Constraint generation for separation of duty. SACMAT 2006: 130-138
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoxin Wu, Ninghui Li: Achieving privacy in mesh networks. SASN 2006: 13-22
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJi-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li: Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006)
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006)
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006)
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell: Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006)
2005
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. ACNS 2005: 301-317
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLElisa Bertino, Ji-Won Byun, Ninghui Li: Privacy-Preserving Database Systems. FOSAD 2005: 178-206
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Mahesh V. Tripunitara: On Safety in Discretionary Access Control. IEEE Symposium on Security and Privacy 2005: 96-109
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiangtao Li, Ninghui Li: Policy-hiding access control in open environment. PODC 2005: 29-38
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJi-Won Byun, Elisa Bertino, Ninghui Li: Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005)
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005)
2004
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Ziad Bizri, Mahesh V. Tripunitara: On mutually-exclusive roles and separation of duty. ACM Conference on Computer and Communications Security 2004: 42-51
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMahesh V. Tripunitara, Ninghui Li: Comparing the expressive power of access control models. ACM Conference on Computer and Communications Security 2004: 62-71
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell, Derrick Tong: Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCristina Nita-Rotaru, Ninghui Li: A Framework for Role-Based Access Control in Group Communication Systems. ISCA PDCS 2004: 522-529
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. SACMAT 2004: 126-135
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTing Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8
2003
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell: Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89-
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell: A Role-based Trust-management Framework. DISCEX (1) 2003: 201-
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell: DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Benjamin N. Grosof, Joan Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003)
9no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003)
2002
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWilliam H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51
2001
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Joan Feigenbaum: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Financial Cryptography 2001: 157-168
2000
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li: Local Names in SPKI/SDSI. CSFW 2000: 2-15
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Benjamin N. Grosof, Joan Feigenbaum: A Practically Implementable and Tractable Delegation Logic. IEEE Symposium on Security and Privacy 2000: 27-42
1999
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Joan Feigenbaum, Benjamin N. Grosof: A Logic-based Knowledge Representation for Authorization with Delegation. CSFW 1999: 162-174

Coauthor Index

1Annie I. Antón [16] [46]
2Elisa Bertino [25] [28] [35] [45] [46] [48] [53] [62] [63] [64] [71] [72] [81] [84]
3Ziad Bizri [22] [47]
4Dan Boneh [11] [24]
5Ji-Won Byun [25] [28] [35] [45] [48] [53] [57] [71] [72]
6Seraphin B. Calo [62]
7Hong Chen [37] [49] [62] [68] [69] [82] [85]
8Jong Youl Choi [65]
9Chenyun Dai [71]
10Wenliang Du [11] [24]
11Joan Feigenbaum [1] [2] [4] [10]
12Gabriel Ghinita [71]
13Benjamin N. Grosof [1] [2] [10]
14Windsor W. Hsu [69]
15Keith Irwin [48]
16S. Jha [60]
17Xuxian Jiang [82]
18Hongxia Jin [91]
19Ashish Kamra [53]
20Jiangtao Li [26] [29] [30] [32] [39] [51] [56] [58] [73]
21Tiancheng Li [40] [50] [61] [62] [67] [72] [74] [80] [86] [87] [88] [90]
22Zhuowei Li [65]
23Dan Lin [63] [64] [81] [84]
24Jorge Lobo [48] [62] [63] [64] [80] [81] [84]
25Xiaonan Ma [69] [90]
26Ziqing Mao [38] [49] [55] [80] [82] [85] [89]
27John C. Mitchell [5] [8] [9] [12] [13] [14] [15] [20] [23] [31]
28Ian Molloy [51] [62] [74] [80] [87] [89]
29Peng Ning [43]
30Cristina Nita-Rotaru [18]
31Wahbeh H. Qardaji [83] [84]
32Sihan Qing [43]
33Prathima Rao [63] [64] [81] [84]
34Indrakshi Ray [70]
35Yonglak Sohn [35] [72]
36Derrick Tong [20]
37Mahesh V. Tripunitara [17] [21] [22] [27] [33] [42] [44] [47] [60] [75]
38Suresh Venkatasubramanian [50]
39Qihua Wang [41] [42] [48] [52] [54] [59] [60] [62] [68] [69] [75] [80] [84] [91]
40XiaoFeng Wang [65] [73]
41Guneshi T. Wickramaarachchi [83]
42William H. Winsborough [5] [6] [7] [8] [9] [13] [19] [23] [30] [34] [38] [60]
43Xiaoxin Wu [36]
44Rui Xue [56] [58]
45Ting Yu [16] [46] [48] [73]
46Jian Zhang [74] [88]

Copyright © Fri Mar 12 12:56:28 2010 by Michael Ley (ley@uni-trier.de)