2007 |
12 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Threshold password authentication against guessing attacks in Ad hoc networks.
Ad Hoc Networks 5(7): 1046-1054 (2007) |
11 | EE | Zhenchuan Chai,
Zhenfu Cao,
Xiaolei Dong:
Efficient ID-Based Multi-Receiver Threshold Decryption.
Int. J. Found. Comput. Sci. 18(5): 987-1004 (2007) |
10 | EE | Zhenchuan Chai,
Zhenfu Cao,
Yuan Zhou:
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts.
J. Comput. Sci. Technol. 22(1): 103-108 (2007) |
9 | EE | Zhenchuan Chai,
Zhenfu Cao,
Xiaolei Dong:
Identity-based signature scheme based on quadratic residues.
Science in China Series F: Information Sciences 50(3): 373-380 (2007) |
2006 |
8 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Remote Authentication with Forward Security.
ATC 2006: 418-427 |
7 | EE | Zhenchuan Chai,
Zhenfu Cao,
Yuan Zhou:
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network.
IMSCCS (2) 2006: 148-154 |
6 | EE | Yuan Zhou,
Zhenfu Cao,
Zhenchuan Chai:
Identity Based Key Insulated Signature.
ISPEC 2006: 226-234 |
5 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
WASA 2006: 467-477 |
2005 |
4 | EE | Yuan Zhou,
Zhenfu Cao,
Zhenchuan Chai:
Constructing Secure Proxy Cryptosystem.
CISC 2005: 150-161 |
3 | EE | Yuan Zhou,
Zhenfu Cao,
Zhenchuan Chai:
An Efficient Proxy-Protected Signature Scheme Based on Factoring.
ISPA Workshops 2005: 332-341 |
2 | EE | Zhenchuan Chai,
Zhenfu Cao,
Yuan Zhou:
Encryption Based on Reversible Second-Order Cellular Automata.
ISPA Workshops 2005: 350-358 |
2004 |
1 | EE | Zhenchuan Chai,
Zhenfu Cao:
Factoring-Based Proxy Signature Schemes with Forward-Security.
CIS 2004: 1034-1040 |