dblp.uni-trier.dewww.uni-trier.de

Yupu Hu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
20EELeyou Zhang, Yupu Hu, Qing Wu: New Construction of Short Hierarchical ID-Based Signature in the Standard Model. Fundam. Inform. 90(1-2): 191-201 (2009)
2008
19EELeyou Zhang, Yupu Hu, Ningbo Mu: An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. ICYCS 2008: 1619-1623
18EENingbo Mu, Yupu Hu, Leyou Zhang: On the Computational Efficiency of XTR+. Inscrypt 2008: 305-313
17EEZhenhua Liu, Yupu Hu, Hua Ma: Secure Proxy Multi-signature Scheme in the Standard Model. ProvSec 2008: 127-140
16EEYupu Hu, Baocang Wang, Wencai He: NTRUSign With a New Perturbation. IEEE Transactions on Information Theory 54(7): 3216-3221 (2008)
15EEFagen Li, Xiangjun Xin, Yupu Hu: ID-based threshold proxy signcryption scheme from bilinear pairings. IJSN 3(3): 206-215 (2008)
14EEYifeng Yin, Xinshe Li, Yupu Hu: Fast S-box security mechanism research based on the polymorphic cipher. Inf. Sci. 178(6): 1603-1610 (2008)
2007
13EEFagen Li, Yupu Hu, Chuanrong Zhang: An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. ACNS 2007: 373-384
12EEXuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu: BSADF: Blind Signature Based Anonymous Digital Fingerprint. FSKD (4) 2007: 426-430
11EEXuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu: Dynamic Group Signature with Forward Security and Its Application. GCC 2007: 473-480
10EEFagen Li, Yupu Hu: Security Analysis of the Pomykala-Barabasz Scheme. Fundam. Inform. 80(4): 453-459 (2007)
9EEFagen Li, Xiangjun Xin, Yupu Hu: Key management in ad hoc networks using self-certified public key system. IJMC 5(1): 94-106 (2007)
8EEBaocang Wang, Qianhong Wu, Yupu Hu: A knapsack-based probabilistic encryption scheme. Inf. Sci. 177(19): 3981-3994 (2007)
2006
7EEFagen Li, Yupu Hu, Shuanggen Liu: ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. CIS 2006: 406-416
6EELihua Dong, Yupu Hu, Yong Zeng: Computing the k-Error N-Adic Complexity of a Sequence of Period pn. SETA 2006: 190-198
5EEYiliang Han, Xiaoyuan Yang, Ping Wei, Yuming Wang, Yupu Hu: ECGSC: Elliptic Curve Based Generalized Signcryption. UIC 2006: 956-965
2005
4EELihua Dong, Yong Zeng, Yupu Hu: Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. CIS (2) 2005: 68-73
3EEFagen Li, Juntao Gao, Yupu Hu: ID-Based Threshold Unsigncryption Scheme from Pairings. CISC 2005: 242-253
2004
2 Yupu Hu, Guozhen Xiao: Generalized self-shrinking generator. IEEE Transactions on Information Theory 50(4): 714-719 (2004)
2003
1 Yupu Hu, Guozhen Xiao: Resilient functions over finite fields. IEEE Transactions on Information Theory 49(8): 2040-2046 (2003)

Coauthor Index

1Lihua Dong [4] [6]
2Juntao Gao [3]
3Yiliang Han [5]
4Wencai He [16]
5Fagen Li [3] [7] [9] [10] [13] [15]
6Xinshe Li [14]
7Shuanggen Liu [7]
8Zhenhua Liu [17]
9Hua Ma [17]
10Ningbo Mu [18] [19]
11Baocang Wang [8] [16]
12Yuming Wang [5]
13Ping Wei [5] [11] [12]
14Qianhong Wu [8]
15Qing Wu [20]
16Guozhen Xiao [1] [2]
17Xiangjun Xin [9] [15]
18Xiaoyuan Yang [5] [11] [12]
19Yifeng Yin [14]
20Yong Zeng [4] [6]
21Chuanrong Zhang [13]
22Leyou Zhang [18] [19] [20]
23Xuanwu Zhou [11] [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)