2009 |
15 | EE | Tianjie Cao,
Elisa Bertino,
Hong Lei:
Security Analysis of the SASI Protocol.
IEEE Trans. Dependable Sec. Comput. 6(1): 73-77 (2009) |
14 | EE | Qian Zhao,
Tianjie Cao:
Collecting Sensitive Information from Windows Physical Memory.
JCP 4(1): 3-10 (2009) |
13 | EE | Tianjie Cao,
Shi Huang,
Hui Cui,
Yipeng Wu,
Qihan Luo:
Controlled Secret Leakage.
JCP 4(1): 61-68 (2009) |
2008 |
12 | EE | Tianjie Cao,
Peng Shen,
Elisa Bertino:
Cryptanalysis of the LCSS RFID Authentication Protocol.
ISECS 2008: 305-309 |
11 | EE | Tianjie Cao,
Peng Shen,
Elisa Bertino:
Cryptanalysis of Some RFID Authentication Protocols.
JCM 3(7): 20-27 (2008) |
2007 |
10 | EE | Yongping Zhang,
Wei Wei,
Tianjie Cao:
Improvement of an Authenticated Key Agreement Protocol.
APWeb/WAIM Workshops 2007: 593-601 |
2006 |
9 | EE | Tianjie Cao,
Xianping Mao,
Dongdai Lin:
Security Analysis of a Server-Aided RSA Key Generation Protocol.
ISPEC 2006: 314-320 |
2005 |
8 | EE | Tianjie Cao,
Dongdai Lin,
Rui Xue:
An Efficient ID-Based Deniable Authentication Protocol from Pairings.
AINA 2005: 388-391 |
7 | EE | Tianjie Cao,
Dongdai Lin,
Rui Xue:
ID-Based Ring Authenticated Encryption.
AINA 2005: 591-596 |
6 | EE | Tianjie Cao,
Dongdai Lin,
Rui Xue:
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.
CIS (2) 2005: 1036-1041 |
5 | EE | Tianjie Cao,
Dongdai Lin:
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.
CISC 2005: 233-241 |
4 | | Ying Wu,
Yongping Zhang,
Tianjie Cao:
Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem.
Security and Management 2005: 58-64 |
3 | EE | Tianjie Cao,
Dongdai Lin,
Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash.
Computers & Security 24(1): 44-49 (2005) |
2004 |
2 | EE | Tianjie Cao,
Dongdai Lin,
Rui Xue:
Security Analysis of User Efficient Blind Signatures.
AWCC 2004: 167-172 |
1 | EE | Tianjie Cao,
Dongdai Lin,
Rui Xue:
Improved Privacy-Protecting Proxy Signature Scheme.
AWCC 2004: 208-213 |