2009 |
9 | EE | Shengbao Wang,
Zhenfu Cao,
Kim-Kwang Raymond Choo,
Lihua Wang:
An improved identity-based key agreement protocol and its security proof.
Inf. Sci. 179(3): 307-318 (2009) |
2007 |
8 | EE | Shengbao Wang:
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
CoRR abs/cs/0703106: (2007) |
7 | EE | Rongxing Lu,
Zhenfu Cao,
Shengbao Wang,
Haiyong Bao:
A New ID-Based Deniable Authentication Protocol.
Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007) |
2006 |
6 | EE | Shengbao Wang,
Zhenfu Cao,
Haiyong Bao:
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
IMSCCS (2) 2006: 109-112 |
5 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Identity-Based Threshold Proxy Signature Scheme with Known Signers.
TAMC 2006: 538-546 |
2005 |
4 | EE | Qin Wang,
Zhenfu Cao,
Shengbao Wang:
Formalized Security Model of Multi-Proxy Signature Schemes.
CIT 2005: 668-672 |
3 | EE | Shengbao Wang,
Zhenfu Cao,
Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
ISPA Workshops 2005: 342-349 |
2 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Applied Mathematics and Computation 169(2): 1419-1430 (2005) |
1 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys.
Journal of Systems and Software 78(1): 56-59 (2005) |