dblp.uni-trier.dewww.uni-trier.de

Jian Weng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
8EEJian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai: Conditional proxy re-encryption secure against chosen-ciphertext attack. ASIACCS 2009: 322-332
2008
7EERobert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17
6EEJian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220
5EEJian Weng, Xiangxue Li, Kefei Chen, Shengli Liu: Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008)
2007
4EEJian Weng, Shengli Liu, Kefei Chen: Pirate decoder for the broadcast encryption schemes from Crypto 2005. Science in China Series F: Information Sciences 50(3): 318-323 (2007)
2006
3EEJian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480
2EEJian Weng, Shengli Liu, Kefei Chen, Changshe Ma: Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423
1EEJian Weng, Shengli Liu, Kefei Chen, Xiangxue Li: Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26

Coauthor Index

1Kefei Chen [1] [2] [3] [4] [5] [6] [7]
2Cheng-Kang Chu [8]
3Robert H. Deng (Robert Huijie Deng) [7] [8]
4Xuhua Ding [8]
5Junzuo Lai [8]
6Xiangxue Li [1] [5]
7Shengli Liu [1] [2] [3] [4] [5] [6] [7]
8Changshe Ma [2] [3]
9Weidong Qiu [6]
10Dong Zheng [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)