2009 |
15 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Certificateless Hybrid Signcryption.
ISPEC 2009: 112-123 |
2008 |
14 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.
CANS 2008: 108-119 |
13 | EE | Chengyu Fan,
Shijie Zhou,
Fagen Li:
Deniable Proxy-Anonymous Signatures.
ICYCS 2008: 2131-2136 |
12 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.
Inscrypt 2008: 289-304 |
11 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Efficient Signcryption Key Encapsulation without Random Oracles.
Inscrypt 2008: 47-59 |
10 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.
NPC 2008: 116-126 |
9 | EE | Hu Xiong,
Zhiguang Qin,
Fagen Li:
An Improved Certificateless Signature Scheme Secure in the Standard Model.
Fundam. Inform. 88(1-2): 193-206 (2008) |
8 | EE | Fagen Li,
Shijie Zhou,
Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Transactions 91-A(7): 1820-1823 (2008) |
7 | EE | Fagen Li,
Xiangjun Xin,
Yupu Hu:
ID-based threshold proxy signcryption scheme from bilinear pairings.
IJSN 3(3): 206-215 (2008) |
2007 |
6 | EE | Fagen Li,
Yupu Hu,
Chuanrong Zhang:
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.
ACNS 2007: 373-384 |
5 | EE | Bo Yang,
Yong Yu,
Fagen Li,
Ying Sun:
Provably Secure Identity-Based Threshold Unsigncryption Scheme.
ATC 2007: 114-122 |
4 | EE | Fagen Li,
Yupu Hu:
Security Analysis of the Pomykala-Barabasz Scheme.
Fundam. Inform. 80(4): 453-459 (2007) |
3 | EE | Fagen Li,
Xiangjun Xin,
Yupu Hu:
Key management in ad hoc networks using self-certified public key system.
IJMC 5(1): 94-106 (2007) |
2006 |
2 | EE | Fagen Li,
Yupu Hu,
Shuanggen Liu:
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems.
CIS 2006: 406-416 |
2005 |
1 | EE | Fagen Li,
Juntao Gao,
Yupu Hu:
ID-Based Threshold Unsigncryption Scheme from Pairings.
CISC 2005: 242-253 |