dblp.uni-trier.dewww.uni-trier.de

Shengbao Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
9EEShengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3): 307-318 (2009)
2007
8EEShengbao Wang: Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications CoRR abs/cs/0703106: (2007)
7EERongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao: A New ID-Based Deniable Authentication Protocol. Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007)
2006
6EEShengbao Wang, Zhenfu Cao, Haiyong Bao: Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. IMSCCS (2) 2006: 109-112
5EEHaiyong Bao, Zhenfu Cao, Shengbao Wang: Identity-Based Threshold Proxy Signature Scheme with Known Signers. TAMC 2006: 538-546
2005
4EEQin Wang, Zhenfu Cao, Shengbao Wang: Formalized Security Model of Multi-Proxy Signature Schemes. CIT 2005: 668-672
3EEShengbao Wang, Zhenfu Cao, Haiyong Bao: Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. ISPA Workshops 2005: 342-349
2EEHaiyong Bao, Zhenfu Cao, Shengbao Wang: Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Applied Mathematics and Computation 169(2): 1419-1430 (2005)
1EEHaiyong Bao, Zhenfu Cao, Shengbao Wang: Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. Journal of Systems and Software 78(1): 56-59 (2005)

Coauthor Index

1Haiyong Bao [1] [2] [3] [5] [6] [7]
2Zhenfu Cao [1] [2] [3] [4] [5] [6] [7] [9]
3Kim-Kwang Raymond Choo [9]
4Rongxing Lu [7]
5Lihua Wang [9]
6Qin Wang [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)