dblp.uni-trier.dewww.uni-trier.de

Huafei Zhu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
33EEHuafei Zhu: New Constructions for Reusable, Non-erasure and Universally Composable Commitments. ISPEC 2009: 102-111
2008
32EEHuafei Zhu: Fully-Simulatable Oblivious Set Transfer. ACISP 2008: 141-154
31EEHuafei Zhu: Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. CANS 2008: 214-225
30EEHuafei Zhu, Feng Bao, Robert H. Deng: Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641
29EEHuafei Zhu: Round Optimal Universally Composable Oblivious Transfer Protocols. ProvSec 2008: 328-334
2007
28EEHuafei Zhu, Feng Bao: Oblivious Keyword Search Protocols in the Public Database Model. ICC 2007: 1336-1341
27EEHuafei Zhu, Feng Bao: Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. ICC 2007: 1503-1508
26EEHuafei Zhu, Feng Bao, A. Lakshminarayanan: Price Negotiation Systems for M-commerce. ICC 2007: 1521-1526
25EEMarc Mouffron, Frederic Rousseau, Huafei Zhu: Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. Inscrypt 2007: 138-152
24EEHuafei Zhu, Willy Susilo, Yi Mu: Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149
23EEYi Mu, Willy Susilo, Huafei Zhu: Compact sequential aggregate signatures. SAC 2007: 249-253
2006
22EEHuafei Zhu, Feng Bao: More on Stand-Alone and Setup-Free Verifiably Committed Signatures. ACISP 2006: 148-158
21EEHuafei Zhu, Feng Bao: Oblivious Scalar-Product Protocols. ACISP 2006: 313-323
20EEHuafei Zhu, Feng Bao: Stand-Alone and Setup-Free Verifiably Committed Signatures. CT-RSA 2006: 159-173
19EEHuafei Zhu, Feng Bao, Jianwei Liu: Computing of Trust in Ad-Hoc Networks. Communications and Multimedia Security 2006: 1-11
18EEHuafei Zhu, Jianying Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81
17EEHuafei Zhu, Feng Bao, Tieyan Li, Ying Qiu: More on Shared-Scalar-Product Protocols. ISPEC 2006: 142-152
16EEHuafei Zhu, Tieyan Li, Feng Bao: Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. SEC 2006: 340-350
15EETieyan Li, Yongdong Wu, Huafei Zhu: An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. VTC Spring 2006: 831-835
2005
14EEXiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang: Efficient Group Signatures from Bilinear Pairing. CISC 2005: 128-139
13EEHuafei Zhu, Feng Bao, Tieyan Li: Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005: 200-209
12EEHuafei Zhu, Feng Bao: Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. ESORICS 2005: 222-230
11EEHuafei Zhu, Feng Bao, Robert H. Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219
10EETieyan Li, Huafei Zhu, Yongdong Wu: Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. ICICS 2005: 389-401
9EEHuafei Zhu, Feng Bao: A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. TrustBus 2005: 266-273
2004
8EEFeng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187
7EEBo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324
6EETieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91
5EEHuafei Zhu: Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. Public Key Cryptography 2004: 101-114
2003
4EETieyan Li, Huafei Zhu, Kwok-Yan Lam: A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225
3EEFeng Bao, Robert H. Deng, Huafei Zhu: Variations of Diffie-Hellman Problem. ICICS 2003: 301-312
2002
2EEChan H. Lee, Xiaotie Deng, Huafei Zhu: Design and Security Analysis of Anonymous Group Identification Protocols. Public Key Cryptography 2002: 188-198
2001
1EEChan H. Lee, Xiaotie Deng, Huafei Zhu: An Identification Scheme Provably Secure against Reset Attack. ICICS 2001: 271-279

Coauthor Index

1Feng Bao [3] [7] [8] [9] [11] [12] [13] [16] [17] [19] [20] [21] [22] [26] [27] [28] [30]
2Xiangguo Cheng [14]
3Robert H. Deng (Robert Huijie Deng) [3] [6] [7] [11] [30]
4Xiaotie Deng [1] [2]
5Mohan S. Kankanhalli [7]
6A. Lakshminarayanan [26]
7Kwok-Yan Lam [4]
8Chan H. Lee [1] [2]
9Tieyan Li [4] [6] [7] [10] [13] [15] [16] [17]
10Jianwei Liu [19]
11Di Ma [6]
12Marc Mouffron [25]
13Yi Mu [23] [24]
14Ying Qiu [14] [17]
15Frederic Rousseau [25]
16Willy Susilo [23] [24]
17Guilin Wang [8]
18Xinmei Wang [14]
19Yongdong Wu [6] [10] [15]
20Jianying Zhou [8] [18]
21Bo Zhu [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)