2008 | ||
---|---|---|
5 | EE | Wei Wang, Dongyao Ji: Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. FORTE 2008: 305-323 |
2006 | ||
4 | Dongyao Ji, Dengguo Feng: Efficient Anonymous Electronic Metering Scheme. AMT 2006: 327-330 | |
3 | Dongyao Ji, Dengguo Feng: Fault-tolerate Multiparty Electronic Contract Signing Protocol. AMT 2006: 79-85 | |
2004 | ||
2 | EE | Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li: Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) |
2001 | ||
1 | Dongyao Ji, Yuming Wang: Comments on ``An approach to the formal verification of the two-party cryptographic protocols'' by Zhang, Li and Xiao. Operating Systems Review 35(1): 6-7 (2001) |
1 | Dengguo Feng | [2] [3] [4] |
2 | Bao Li | [2] |
3 | Hong-Da Li | [2] |
4 | Wei Wang | [5] |
5 | Yuming Wang | [1] |