2006 |
36 | EE | Wenbo Mao,
Fei Yan,
Chunrun Chen:
Daonity: grid security with behaviour conformity from trusted computing.
STC 2006: 43-46 |
2005 |
35 | | Sihan Qing,
Wenbo Mao,
Javier Lopez,
Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
Springer 2005 |
34 | EE | Liqun Chen,
Hoon Wei Lim,
Wenbo Mao:
User-Friendly Grid Security Architecture and Protocols.
Security Protocols Workshop 2005: 139-156 |
33 | EE | Colin Boyd,
Wenbo Mao:
Preface to the special issue on ISC 2003.
Int. J. Inf. Sec. 4(4): 227-227 (2005) |
2004 |
32 | EE | Colin Boyd,
Wenbo Mao,
Kenneth G. Paterson:
Key Agreement Using Statically Keyed Authenticators.
ACNS 2004: 248-262 |
2003 |
31 | | Colin Boyd,
Wenbo Mao:
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
Springer 2003 |
30 | EE | John Malone-Lee,
Wenbo Mao:
Two Birds One Stone: Signcryption Using RSA.
CT-RSA 2003: 211-225 |
29 | EE | Steven D. Galbraith,
Wenbo Mao:
Invisibility and Anonymity of Undeniable and Confirmer Signatures.
CT-RSA 2003: 80-97 |
28 | EE | Colin Boyd,
Wenbo Mao,
Kenneth G. Paterson:
Deniable Authenticated Key Establishment for Internet Protocols.
Security Protocols Workshop 2003: 255-271 |
27 | EE | Wenbo Mao:
Deniable Authenticated Key Establishment for Internet Protocols (Discussion).
Security Protocols Workshop 2003: 272-273 |
2002 |
26 | EE | Steven D. Galbraith,
Wenbo Mao,
Kenneth G. Paterson:
RSA-Based Undeniable Signatures for General Moduli.
CT-RSA 2002: 200-217 |
25 | EE | Wenbo Mao:
A Structured Operational Modelling of the Dolev-Yao Threat Model.
Security Protocols Workshop 2002: 34-46 |
2001 |
24 | EE | Liqun Chen,
Wenbo Mao:
An Auditable Metering Scheme for Web Advertisement Applications.
ISC 2001: 475-485 |
23 | EE | Wenbo Mao:
Timed-Release Cryptography.
Selected Areas in Cryptography 2001: 342-358 |
22 | | Wenbo Mao:
Verifiable Partial Escrow of Integer Factors.
Des. Codes Cryptography 24(3): 327-342 (2001) |
2000 |
21 | EE | Wenbo Mao:
Short Certification of Secure RSA Modulus (Transcript of Discussion).
Security Protocols Workshop 2000: 234-237 |
1999 |
20 | | Wenbo Mao:
Send Message into a Definite Future.
ICICS 1999: 244-251 |
19 | | Wenbo Mao:
Time-Lock Puzzle with Examinable Evidence of Unlocking Time.
Security Protocols Workshop 1999: 95-102 |
1998 |
18 | EE | Wenbo Mao,
Chae Hoon Lim:
Cryptoanalysis in Prime Order Subgroups of Z*n.
ASIACRYPT 1998: 214-226 |
17 | EE | Wenbo Mao:
Necessity and Realization of Universally Verifiable Secret Sharing.
IEEE Symposium on Security and Privacy 1998: 208-214 |
16 | EE | Feng Bao,
Robert H. Deng,
Wenbo Mao:
Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
IEEE Symposium on Security and Privacy 1998: 77-85 |
15 | EE | Wenbo Mao:
Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders.
Public Key Cryptography 1998: 60-71 |
14 | EE | Wenbo Mao:
Verifiable Partial Sharing of Integer Fractions.
Selected Areas in Cryptography 1998: 94-105 |
1997 |
13 | | Wenbo Mao:
Verifiable Escrowed Signature.
ACISP 1997: 240-248 |
12 | | Wenbo Mao:
Publicly verifiable partial key escrow.
ICICS 1997: 409-413 |
1996 |
11 | EE | Wenbo Mao:
Light-Weight Micro-cash Payment for the Internet.
ESORICS 1996: 15-32 |
10 | EE | Wenbo Mao:
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions.
IEEE Symposium on Security and Privacy 1996: 201-210 |
9 | | Wenbo Mao:
On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks.
Security Protocols Workshop 1996: 1-17 |
1995 |
8 | EE | Wenbo Mao:
An augmentation of BAN-like logics.
CSFW 1995: 44- |
1994 |
7 | | Colin Boyd,
Wenbo Mao:
Design and Analysis of Key Exchange Protocols via Secure Channel Identification.
ASIACRYPT 1994: 171-181 |
6 | | Wenbo Mao,
Colin Boyd:
Development of Authentication Protocols: Some Misconceptions and a New Approach.
CSFW 1994: 178-186 |
5 | EE | Wenbo Mao,
Colin Boyd:
On Strengthening Authentication Protocols to Foil Cryptanalysis.
ESORICS 1994: 193-204 |
4 | EE | Colin Boyd,
Wenbo Mao:
Designing Secure Key Exchange Protocols.
ESORICS 1994: 93-105 |
1993 |
3 | | Wenbo Mao,
Colin Boyd:
Towards Formal Analysis of Security Protocols.
CSFW 1993: 147-158 |
2 | EE | Colin Boyd,
Wenbo Mao:
On a Limitation of BAN Logic.
EUROCRYPT 1993: 240-247 |
1991 |
1 | | Wenbo Mao,
George J. Milne:
An Automated Proof Technique for Finite-State Machine Equivalence.
CAV 1991: 233-243 |