| 2009 |
| 20 | EE | Xiaohui Liang,
Zhenfu Cao,
Huang Lin,
Jun Shao:
Attribute based proxy re-encryption with delegating capabilities.
ASIACCS 2009: 276-286 |
| 19 | EE | Jun Shao,
Zhenfu Cao:
CCA-Secure Proxy Re-encryption without Pairings.
Public Key Cryptography 2009: 357-376 |
| 2008 |
| 18 | EE | Chunyang Hu,
Yongwang Zhao,
Dianfu Ma,
Xiaoliang Sun,
Jun Shao,
Xuan Li:
Collaborative geospatial web services for multi-dimension remote sensing data.
ICDIM 2008: 456-463 |
| 17 | EE | Huang Lin,
Zhenfu Cao,
Xiaohui Liang,
Jun Shao:
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority.
INDOCRYPT 2008: 426-436 |
| 16 | EE | Rongxing Lu,
Xiaodong Lin,
Zhenfu Cao,
Jun Shao,
Xiaohui Liang:
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci. 178(3): 756-765 (2008) |
| 2007 |
| 15 | EE | Jun Shao,
Zhenfu Cao,
Licheng Wang,
Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information.
ESORICS 2007: 299-310 |
| 14 | EE | Jun Shao,
Brian T. Davis:
A Burst Scheduling Access Reordering Mechanism.
HPCA 2007: 285-294 |
| 13 | EE | Xiaohui Liang,
Zhenfu Cao,
Jun Shao,
Huang Lin:
Short Group Signature Without Random Oracles.
ICICS 2007: 69-82 |
| 12 | EE | Jun Shao,
Zhenfu Cao,
Licheng Wang,
Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles.
INDOCRYPT 2007: 197-209 |
| 11 | EE | Lihua Wang,
Jun Shao,
Zhenfu Cao,
Masahiro Mambo,
Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
INDOCRYPT 2007: 297-311 |
| 10 | EE | Jun Shao,
Min Feng,
Bin Zhu,
Zhenfu Cao:
An Efficient Certified Email Protocol.
ISC 2007: 145-157 |
| 9 | EE | Jun Shao,
Zhenfu Cao,
Rongxing Lu:
Improvement of Yang et al.'s threshold proxy signature scheme.
Journal of Systems and Software 80(2): 172-177 (2007) |
| 2006 |
| 8 | EE | Lizheng Zhang,
Jun Shao,
Charlie Chung-Ping Chen:
Non-gaussian statistical parameter modeling for SSTA with confidence interval analysis.
ISPD 2006: 33-38 |
| 7 | EE | Xiaochuan Chen,
Jun Shao,
Zhongxu Tian:
Family Cars' Life Cycle Cost (LCC) Estimation Model Based on the Neural Network Ensemble.
PROLAMAT 2006: 610-618 |
| 6 | EE | Jun Shao,
Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies.
Computers & Security 25(3): 201-206 (2006) |
| 5 | EE | Jun Shao,
Zhenfu Cao,
Rongxing Lu:
An improved deniable authentication protocol.
Networks 48(4): 179-181 (2006) |
| 2005 |
| 4 | EE | Jun Shao,
Brian T. Davis:
The Bit-reversal SDRAM Address Mapping.
SCOPES 2005: 62-71 |
| 3 | EE | Jun Shao,
Zhenfu Cao:
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme.
Applied Mathematics and Computation 168(1): 135-140 (2005) |
| 1997 |
| 2 | EE | Jin Wang,
J. Sunil Rao,
Jun Shao:
Weighted Jackknife-after-Bootstrap: A Heuristic Approach.
Winter Simulation Conference 1997: 240-245 |
| 1988 |
| 1 | | Jun Shao,
Qingda Yao:
A Knowledge-Based Query Optimization System.
DS-3 1988: 557-566 |