2008 | ||
---|---|---|
3 | EE | Wen Tao Zhu: General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. ICC 2008: 1620-1624 |
2005 | ||
2 | EE | Wen Tao Zhu: Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. CANS 2005: 35-48 |
2004 | ||
1 | EE | Wen Tao Zhu, Jinsheng Li, Peilin Hong: Rethinking of Iolus: Constructing the Secure Multicast Infrastructure. ICOIN 2004: 895-904 |
1 | Peilin Hong | [1] |
2 | Jinsheng Li | [1] |