dblp.uni-trier.dewww.uni-trier.de

Rongxing Lu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
42EEHaojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Pin-Han Ho: BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. GLOBECOM 2008: 1882-1886
41EEHaojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. ICC 2008: 1436-1440
40EEChenxi Zhang, Xiaodong Lin, Rongxing Lu, Pin-Han Ho: RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. ICC 2008: 1451-1457
39EERongxing Lu, Xiaodong Lin, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, Xuemin Shen: AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. ICC 2008: 1499-1504
38EEXiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen: Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ICC 2008: 1530-1535
37EERongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. INFOCOM 2008: 1229-1237
36EEChenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen: An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. INFOCOM 2008: 246-250
35EEChenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen: A Location Privacy Preserving Authentication Scheme in Vehicular Networks. WCNC 2008: 2543-2548
34EERongxing Lu, Xiaodong Lin, Haojin Zhu, Chenxi Zhang, Pin-Han Ho, Xuemin Shen: A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. WCNC 2008: 3237-3242
33EERongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248
32EEHaojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications 7(10): 3858-3868 (2008)
31EEXiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. IEEE Transactions on Wireless Communications 7(4): 1389-1399 (2008)
30EERongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang: New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008)
29EERongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9): 1315-1323 (2008)
28EERongxing Lu, Xiaolei Dong, Zhenfu Cao: Designing efficient proxy signature schemes for mobile communication. Science in China Series F: Information Sciences 51(2): 183-195 (2008)
27EEPin-Han Ho, Zonghua Zhang, Rongxing Lu: Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal. Security and Communication Networks 1(3): 191-193 (2008)
2007
26EEJun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu: Efficient Password-Based Authenticated Key Exchange Without Public Information. ESORICS 2007: 299-310
25EEHaojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: Secure Localized Authentication and Billing for Wireless Mesh Networks. GLOBECOM 2007: 486-491
24EEXiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253
23EEZhenchuan Chai, Zhenfu Cao, Rongxing Lu: Threshold password authentication against guessing attacks in Ad hoc networks. Ad Hoc Networks 5(7): 1046-1054 (2007)
22EERongxing Lu, Zhenfu Cao: Simple three-party key exchange protocol. Computers & Security 26(1): 94-97 (2007)
21EERongxing Lu, Zhenfu Cao, Xiaolei Dong: A New Practical Limited Identity-Based Encryption Scheme. Fundam. Inform. 80(4): 461-474 (2007)
20EERongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao: A New ID-Based Deniable Authentication Protocol. Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007)
19EEJun Shao, Zhenfu Cao, Rongxing Lu: Improvement of Yang et al.'s threshold proxy signature scheme. Journal of Systems and Software 80(2): 172-177 (2007)
2006
18EEZhenchuan Chai, Zhenfu Cao, Rongxing Lu: Remote Authentication with Forward Security. ATC 2006: 418-427
17EERongxing Lu, Zhenfu Cao, Xiaolei Dong: Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. CANS 2006: 153-167
16EERongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su: Designated Verifier Proxy Signature Scheme from Bilinear Pairings. IMSCCS (2) 2006: 40-47
15EESheng Guo, Zhenfu Cao, Rongxing Lu: An Efficient ID-Based Multi-proxy Multi-Signature Scheme. IMSCCS (2) 2006: 81-88
14EERongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su: Group Oriented Deniable Authentication Protocol. IMSCCS (2) 2006: 89-92
13EEZhenchuan Chai, Zhenfu Cao, Rongxing Lu: Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. WASA 2006: 467-477
12EEJun Shao, Zhenfu Cao, Rongxing Lu: An improved deniable authentication protocol. Networks 48(4): 179-181 (2006)
11EEZhenfu Cao, Haojin Zhu, Rongxing Lu: Provably secure robust threshold partial blind signature. Science in China Series F: Information Sciences 49(5): 604-615 (2006)
10EERongxing Lu, Zhenfu Cao, Xiaolei Dong: Authenticated encryption protocol with perfect forward secrecy for mobile communication. Wireless Communications and Mobile Computing 6: 273-280 (2006)
2005
9EEYuan Zhou, Zhenfu Cao, Rongxing Lu: Constructing Secure Warrant-Based Proxy Signcryption Schemes. CANS 2005: 172-185
8EEShiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu: Identity Based Conference Key Distribution Scheme from Parings. ICCNMC 2005: 845-852
7EERongxing Lu, Zhenfu Cao, Yuan Zhou: Threshold undeniable signature scheme based on conic. Applied Mathematics and Computation 162(1): 165-177 (2005)
6EERongxing Lu, Zhenfu Cao, Yuan Zhou: Proxy blind multi-signature scheme without a secure channel. Applied Mathematics and Computation 164(1): 179-187 (2005)
5EEYuan Zhou, Zhenfu Cao, Rongxing Lu: Provably secure proxy-protected signature schemes based on factoring. Applied Mathematics and Computation 164(1): 83-98 (2005)
4EERongxing Lu, Zhenfu Cao: A new deniable authentication protocol from bilinear pairings. Applied Mathematics and Computation 168(2): 954-961 (2005)
3EERongxing Lu, Zhenfu Cao: Designated verifier proxy signature scheme with message recovery. Applied Mathematics and Computation 169(2): 1237-1246 (2005)
2EEHaiyong Bao, Zhenfu Cao, Rongxing Lu: Proxy signature scheme using self-certified public keys. Applied Mathematics and Computation 169(2): 1380-1389 (2005)
1EERongxing Lu, Zhenfu Cao: Efficient remote user authentication scheme using smart card. Computer Networks 49(4): 535-540 (2005)

Coauthor Index

1Haiyong Bao [2] [20]
2Zhenfu Cao [1] [2] [3] [4] [5] [6] [7] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [26] [28] [29] [30] [31] [33]
3Zhenchuan Chai [13] [18] [23]
4Anyi Chen [35]
5Kefei Chen [8]
6Xiaolei Dong [10] [14] [16] [17] [21] [28]
7Sheng Guo [15]
8Pin-Han Ho [24] [25] [27] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42]
9Shiqun Li [8]
10Xiangxue Li [8]
11Xiaohui Liang [29] [30]
12Xiaodong Lin [24] [25] [29] [30] [31] [32] [33] [34] [36] [37] [38] [39] [40] [41] [42]
13Liuquan Qin [29]
14Jun Shao [12] [19] [26] [30]
15Xuemin Shen (Sherman X. Shen) [24] [25] [31] [32] [33] [34] [36] [37] [38] [39] [41] [42]
16Renwang Su [14] [16]
17Licheng Wang [26]
18Shengbao Wang [20]
19Chenxi Zhang [34] [35] [36] [39] [40]
20Zonghua Zhang [27]
21Yuan Zhou [5] [6] [7] [9]
22Haojin Zhu [11] [24] [25] [32] [33] [34] [37] [38] [39] [41] [42]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)