dblp.uni-trier.dewww.uni-trier.de

Wenbo Mao

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
36EEWenbo Mao, Fei Yan, Chunrun Chen: Daonity: grid security with behaviour conformity from trusted computing. STC 2006: 43-46
2005
35 Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings Springer 2005
34EELiqun Chen, Hoon Wei Lim, Wenbo Mao: User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156
33EEColin Boyd, Wenbo Mao: Preface to the special issue on ISC 2003. Int. J. Inf. Sec. 4(4): 227-227 (2005)
2004
32EEColin Boyd, Wenbo Mao, Kenneth G. Paterson: Key Agreement Using Statically Keyed Authenticators. ACNS 2004: 248-262
2003
31 Colin Boyd, Wenbo Mao: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings Springer 2003
30EEJohn Malone-Lee, Wenbo Mao: Two Birds One Stone: Signcryption Using RSA. CT-RSA 2003: 211-225
29EESteven D. Galbraith, Wenbo Mao: Invisibility and Anonymity of Undeniable and Confirmer Signatures. CT-RSA 2003: 80-97
28EEColin Boyd, Wenbo Mao, Kenneth G. Paterson: Deniable Authenticated Key Establishment for Internet Protocols. Security Protocols Workshop 2003: 255-271
27EEWenbo Mao: Deniable Authenticated Key Establishment for Internet Protocols (Discussion). Security Protocols Workshop 2003: 272-273
2002
26EESteven D. Galbraith, Wenbo Mao, Kenneth G. Paterson: RSA-Based Undeniable Signatures for General Moduli. CT-RSA 2002: 200-217
25EEWenbo Mao: A Structured Operational Modelling of the Dolev-Yao Threat Model. Security Protocols Workshop 2002: 34-46
2001
24EELiqun Chen, Wenbo Mao: An Auditable Metering Scheme for Web Advertisement Applications. ISC 2001: 475-485
23EEWenbo Mao: Timed-Release Cryptography. Selected Areas in Cryptography 2001: 342-358
22 Wenbo Mao: Verifiable Partial Escrow of Integer Factors. Des. Codes Cryptography 24(3): 327-342 (2001)
2000
21EEWenbo Mao: Short Certification of Secure RSA Modulus (Transcript of Discussion). Security Protocols Workshop 2000: 234-237
1999
20 Wenbo Mao: Send Message into a Definite Future. ICICS 1999: 244-251
19 Wenbo Mao: Time-Lock Puzzle with Examinable Evidence of Unlocking Time. Security Protocols Workshop 1999: 95-102
1998
18EEWenbo Mao, Chae Hoon Lim: Cryptoanalysis in Prime Order Subgroups of Z*n. ASIACRYPT 1998: 214-226
17EEWenbo Mao: Necessity and Realization of Universally Verifiable Secret Sharing. IEEE Symposium on Security and Privacy 1998: 208-214
16EEFeng Bao, Robert H. Deng, Wenbo Mao: Efficient and Practical Fair Exchange Protocols with Off-Line TTP. IEEE Symposium on Security and Privacy 1998: 77-85
15EEWenbo Mao: Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. Public Key Cryptography 1998: 60-71
14EEWenbo Mao: Verifiable Partial Sharing of Integer Fractions. Selected Areas in Cryptography 1998: 94-105
1997
13 Wenbo Mao: Verifiable Escrowed Signature. ACISP 1997: 240-248
12 Wenbo Mao: Publicly verifiable partial key escrow. ICICS 1997: 409-413
1996
11EEWenbo Mao: Light-Weight Micro-cash Payment for the Internet. ESORICS 1996: 15-32
10EEWenbo Mao: On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. IEEE Symposium on Security and Privacy 1996: 201-210
9 Wenbo Mao: On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks. Security Protocols Workshop 1996: 1-17
1995
8EEWenbo Mao: An augmentation of BAN-like logics. CSFW 1995: 44-
1994
7 Colin Boyd, Wenbo Mao: Design and Analysis of Key Exchange Protocols via Secure Channel Identification. ASIACRYPT 1994: 171-181
6 Wenbo Mao, Colin Boyd: Development of Authentication Protocols: Some Misconceptions and a New Approach. CSFW 1994: 178-186
5EEWenbo Mao, Colin Boyd: On Strengthening Authentication Protocols to Foil Cryptanalysis. ESORICS 1994: 193-204
4EEColin Boyd, Wenbo Mao: Designing Secure Key Exchange Protocols. ESORICS 1994: 93-105
1993
3 Wenbo Mao, Colin Boyd: Towards Formal Analysis of Security Protocols. CSFW 1993: 147-158
2EEColin Boyd, Wenbo Mao: On a Limitation of BAN Logic. EUROCRYPT 1993: 240-247
1991
1 Wenbo Mao, George J. Milne: An Automated Proof Technique for Finite-State Machine Equivalence. CAV 1991: 233-243

Coauthor Index

1Feng Bao [16]
2Colin Boyd [2] [3] [4] [5] [6] [7] [28] [31] [32] [33]
3Chunrun Chen [36]
4Liqun Chen [24] [34]
5Robert H. Deng (Robert Huijie Deng) [16]
6Steven D. Galbraith [26] [29]
7Chae Hoon Lim [18]
8Hoon Wei Lim [34]
9Javier Lopez [35]
10John Malone-Lee [30]
11George J. Milne [1]
12Kenneth G. Paterson [26] [28] [32]
13Sihan Qing [35]
14Guilin Wang [35]
15Fei Yan [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)