2004 |
11 | EE | Yunlei Zhao,
Chan H. Lee,
Yiming Zhao,
Hong Zhu:
Some Observations on Zap and Its Applications.
ACNS 2004: 180-193 |
10 | EE | Yunlei Zhao,
Xiaotie Deng,
Chan H. Lee,
Hong Zhu:
(2+f(n))-SAT and its properties.
Discrete Applied Mathematics 136(1): 3-11 (2004) |
9 | EE | Shirley H. C. Cheung,
Chan H. Lee,
Yunlei Zhao:
Universally Composable Blind Signature Functionality.
International Journal of Information Technology and Decision Making 3(4): 673-684 (2004) |
2003 |
8 | EE | Yunlei Zhao,
Xiaotie Deng,
Chan H. Lee,
Hong Zhu:
Resettable Zero-Knowledge in the Weak Public-Key Model.
EUROCRYPT 2003: 123-139 |
2002 |
7 | EE | Xiaotie Deng,
Chan H. Lee,
Yunlei Zhao,
Hong Zhu:
(2+ f(n))-SAT and Its Properties.
COCOON 2002: 28-36 |
6 | EE | Chan H. Lee,
Xiaotie Deng,
Huafei Zhu:
Design and Security Analysis of Anonymous Group Identification Protocols.
Public Key Cryptography 2002: 188-198 |
5 | EE | Xiaotie Deng,
Chan H. Lee,
Yunlei Zhao,
Hong Zhu:
Reduction Zero-Knowledge.
SCN 2002: 303-317 |
4 | EE | Shirley H. C. Cheung,
Xiaotie Deng,
Chan H. Lee,
Yunlei Zhao:
A New Notion of Soundness in Bare Public-Key Model.
SCN 2002: 318-325 |
2001 |
3 | EE | Chan H. Lee,
Xiaotie Deng,
Huafei Zhu:
An Identification Scheme Provably Secure against Reset Attack.
ICICS 2001: 271-279 |
1998 |
2 | EE | Weijia Jia,
Jiannong Cao,
Xiaohua Jia,
Chan H. Lee:
Design and analysis of an efficient and reliable atomic multicast protocol.
Computer Communications 21(1): 37-53 (1998) |
1993 |
1 | | Mei Wai Au,
Chan H. Lee:
Integrating Use of VDM and Z.
Software Engineering Education 1993: 119-128 |