2008 |
42 | EE | Haojin Zhu,
Xiaodong Lin,
Rongxing Lu,
Xuemin Shen,
Pin-Han Ho:
BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
GLOBECOM 2008: 1882-1886 |
41 | EE | Haojin Zhu,
Xiaodong Lin,
Rongxing Lu,
Pin-Han Ho,
Xuemin Shen:
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
ICC 2008: 1436-1440 |
40 | EE | Chenxi Zhang,
Xiaodong Lin,
Rongxing Lu,
Pin-Han Ho:
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
ICC 2008: 1451-1457 |
39 | EE | Rongxing Lu,
Xiaodong Lin,
Chenxi Zhang,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen:
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
ICC 2008: 1499-1504 |
38 | EE | Xiaodong Lin,
Rongxing Lu,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen:
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
ICC 2008: 1530-1535 |
37 | EE | Rongxing Lu,
Xiaodong Lin,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen:
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
INFOCOM 2008: 1229-1237 |
36 | EE | Chenxi Zhang,
Rongxing Lu,
Xiaodong Lin,
Pin-Han Ho,
Xuemin Shen:
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.
INFOCOM 2008: 246-250 |
35 | EE | Chenxi Zhang,
Rongxing Lu,
Pin-Han Ho,
Anyi Chen:
A Location Privacy Preserving Authentication Scheme in Vehicular Networks.
WCNC 2008: 2543-2548 |
34 | EE | Rongxing Lu,
Xiaodong Lin,
Haojin Zhu,
Chenxi Zhang,
Pin-Han Ho,
Xuemin Shen:
A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
WCNC 2008: 3237-3242 |
33 | EE | Rongxing Lu,
Xiaodong Lin,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen,
Zhenfu Cao:
A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
WCNC 2008: 3243-3248 |
32 | EE | Haojin Zhu,
Xiaodong Lin,
Rongxing Lu,
Pin-Han Ho,
Xuemin Shen:
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Transactions on Wireless Communications 7(10): 3858-3868 (2008) |
31 | EE | Xiaodong Lin,
Rongxing Lu,
Pin-Han Ho,
Xuemin Shen,
Zhenfu Cao:
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Transactions on Wireless Communications 7(4): 1389-1399 (2008) |
30 | EE | Rongxing Lu,
Xiaodong Lin,
Zhenfu Cao,
Jun Shao,
Xiaohui Liang:
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci. 178(3): 756-765 (2008) |
29 | EE | Rongxing Lu,
Xiaodong Lin,
Zhenfu Cao,
Liuquan Qin,
Xiaohui Liang:
A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math. 85(9): 1315-1323 (2008) |
28 | EE | Rongxing Lu,
Xiaolei Dong,
Zhenfu Cao:
Designing efficient proxy signature schemes for mobile communication.
Science in China Series F: Information Sciences 51(2): 183-195 (2008) |
27 | EE | Pin-Han Ho,
Zonghua Zhang,
Rongxing Lu:
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Security and Communication Networks 1(3): 191-193 (2008) |
2007 |
26 | EE | Jun Shao,
Zhenfu Cao,
Licheng Wang,
Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information.
ESORICS 2007: 299-310 |
25 | EE | Haojin Zhu,
Xiaodong Lin,
Rongxing Lu,
Pin-Han Ho,
Xuemin Shen:
Secure Localized Authentication and Billing for Wireless Mesh Networks.
GLOBECOM 2007: 486-491 |
24 | EE | Xiaodong Lin,
Rongxing Lu,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen,
Zhenfu Cao:
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
ICC 2007: 1247-1253 |
23 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Threshold password authentication against guessing attacks in Ad hoc networks.
Ad Hoc Networks 5(7): 1046-1054 (2007) |
22 | EE | Rongxing Lu,
Zhenfu Cao:
Simple three-party key exchange protocol.
Computers & Security 26(1): 94-97 (2007) |
21 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong:
A New Practical Limited Identity-Based Encryption Scheme.
Fundam. Inform. 80(4): 461-474 (2007) |
20 | EE | Rongxing Lu,
Zhenfu Cao,
Shengbao Wang,
Haiyong Bao:
A New ID-Based Deniable Authentication Protocol.
Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007) |
19 | EE | Jun Shao,
Zhenfu Cao,
Rongxing Lu:
Improvement of Yang et al.'s threshold proxy signature scheme.
Journal of Systems and Software 80(2): 172-177 (2007) |
2006 |
18 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Remote Authentication with Forward Security.
ATC 2006: 418-427 |
17 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong:
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
CANS 2006: 153-167 |
16 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong,
Renwang Su:
Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
IMSCCS (2) 2006: 40-47 |
15 | EE | Sheng Guo,
Zhenfu Cao,
Rongxing Lu:
An Efficient ID-Based Multi-proxy Multi-Signature Scheme.
IMSCCS (2) 2006: 81-88 |
14 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong,
Renwang Su:
Group Oriented Deniable Authentication Protocol.
IMSCCS (2) 2006: 89-92 |
13 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
WASA 2006: 467-477 |
12 | EE | Jun Shao,
Zhenfu Cao,
Rongxing Lu:
An improved deniable authentication protocol.
Networks 48(4): 179-181 (2006) |
11 | EE | Zhenfu Cao,
Haojin Zhu,
Rongxing Lu:
Provably secure robust threshold partial blind signature.
Science in China Series F: Information Sciences 49(5): 604-615 (2006) |
10 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong:
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wireless Communications and Mobile Computing 6: 273-280 (2006) |
2005 |
9 | EE | Yuan Zhou,
Zhenfu Cao,
Rongxing Lu:
Constructing Secure Warrant-Based Proxy Signcryption Schemes.
CANS 2005: 172-185 |
8 | EE | Shiqun Li,
Kefei Chen,
Xiangxue Li,
Rongxing Lu:
Identity Based Conference Key Distribution Scheme from Parings.
ICCNMC 2005: 845-852 |
7 | EE | Rongxing Lu,
Zhenfu Cao,
Yuan Zhou:
Threshold undeniable signature scheme based on conic.
Applied Mathematics and Computation 162(1): 165-177 (2005) |
6 | EE | Rongxing Lu,
Zhenfu Cao,
Yuan Zhou:
Proxy blind multi-signature scheme without a secure channel.
Applied Mathematics and Computation 164(1): 179-187 (2005) |
5 | EE | Yuan Zhou,
Zhenfu Cao,
Rongxing Lu:
Provably secure proxy-protected signature schemes based on factoring.
Applied Mathematics and Computation 164(1): 83-98 (2005) |
4 | EE | Rongxing Lu,
Zhenfu Cao:
A new deniable authentication protocol from bilinear pairings.
Applied Mathematics and Computation 168(2): 954-961 (2005) |
3 | EE | Rongxing Lu,
Zhenfu Cao:
Designated verifier proxy signature scheme with message recovery.
Applied Mathematics and Computation 169(2): 1237-1246 (2005) |
2 | EE | Haiyong Bao,
Zhenfu Cao,
Rongxing Lu:
Proxy signature scheme using self-certified public keys.
Applied Mathematics and Computation 169(2): 1380-1389 (2005) |
1 | EE | Rongxing Lu,
Zhenfu Cao:
Efficient remote user authentication scheme using smart card.
Computer Networks 49(4): 535-540 (2005) |