2008 |
11 | EE | Licheng Wang,
Zhenfu Cao,
Feng Cao,
Haifeng Qian,
Haiyong Bao:
Biased Bit Commitment and Applications.
J. Inf. Sci. Eng. 24(2): 441-452 (2008) |
2007 |
10 | EE | Rongxing Lu,
Zhenfu Cao,
Shengbao Wang,
Haiyong Bao:
A New ID-Based Deniable Authentication Protocol.
Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007) |
2006 |
9 | EE | Shengbao Wang,
Zhenfu Cao,
Haiyong Bao:
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
IMSCCS (2) 2006: 109-112 |
8 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Identity-Based Threshold Proxy Signature Scheme with Known Signers.
TAMC 2006: 538-546 |
2005 |
7 | EE | Haiyong Bao,
Zhenfu Cao,
Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
CANS 2005: 26-34 |
6 | EE | Shengbao Wang,
Zhenfu Cao,
Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
ISPA Workshops 2005: 342-349 |
5 | EE | Haifeng Qian,
Zhenfu Cao,
Haiyong Bao:
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Applied Mathematics and Computation 166(3): 501-505 (2005) |
4 | EE | Haiyong Bao,
Zhenfu Cao,
Rongxing Lu:
Proxy signature scheme using self-certified public keys.
Applied Mathematics and Computation 169(2): 1380-1389 (2005) |
3 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Applied Mathematics and Computation 169(2): 1419-1430 (2005) |
2 | EE | Haifeng Qian,
Zhenfu Cao,
Haiyong Bao:
Security of Pon-Lu-Jeng's Meta-He digital signature schemes.
Applied Mathematics and Computation 170(1): 724-730 (2005) |
1 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys.
Journal of Systems and Software 78(1): 56-59 (2005) |