dblp.uni-trier.dewww.uni-trier.de

Guowen Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
9EEJia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li: Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184
8EEJia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li: Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97
7EEJia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li: How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme. JCM 3(7): 28-35 (2008)
6EEJia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li: Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures. JCM 3(7): 36-43 (2008)
2007
5EEGuowen Li, Jia Yu, Rupeng Li, Daxing Li: Two Threshold Multisignature Schemes from Bilinear Pairings. MUE 2007: 1041-1045
4EERupeng Li, Jia Yu, Guowen Li, Daxing Li: A New Identity-Based Blind Signature Scheme with Batch Verifications. MUE 2007: 1051-1056
3EERupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li: Key-Insulated Group Signature Scheme with Selective Revocation. MUE 2007: 1057-1063
2EEGuowen Li, Jia Yu, Rupeng Li, Daxing Li: An Approach to Convert Any Threshold Signature into a Threshold Group Signature. SNPD (2) 2007: 723-726
1EERupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li: Key-Insulated Group Signature Scheme with Verifier-Local Revocation. SNPD (3) 2007: 273-278

Coauthor Index

1Xiangguo Cheng [8] [9]
2Xianghua Du [3]
3Rong Hao [6] [7] [8] [9]
4Fanyu Kong [6] [7] [8] [9]
5Daxing Li [1] [2] [3] [4] [5]
6Rupeng Li [1] [2] [3] [4] [5]
7Xuliang Li [6]
8Jin Wang [1]
9Jia Yu [1] [2] [3] [4] [5] [6] [7] [8] [9]
10Dexiang Zhang [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)