The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Huafei Zhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
    Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:176-187 [Conf]
  2. Huafei Zhu, Feng Bao
    More on Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:148-158 [Conf]
  3. Huafei Zhu, Feng Bao
    Oblivious Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:313-323 [Conf]
  4. Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
    Efficient Group Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:128-139 [Conf]
  5. Huafei Zhu, Feng Bao, Tieyan Li
    Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:200-209 [Conf]
  6. Huafei Zhu, Feng Bao, Jianwei Liu
    Computing of Trust in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:1-11 [Conf]
  7. Huafei Zhu, Feng Bao
    Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:159-173 [Conf]
  8. Huafei Zhu, Feng Bao
    Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:222-230 [Conf]
  9. Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:317-324 [Conf]
  10. Feng Bao, Robert H. Deng, Huafei Zhu
    Variations of Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:301-312 [Conf]
  11. Chan H. Lee, Xiaotie Deng, Huafei Zhu
    An Identification Scheme Provably Secure against Reset Attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:271-279 [Conf]
  12. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:79-91 [Conf]
  13. Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam
    A Novel Two-Level Trust Model for Grid. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:214-225 [Conf]
  14. Tieyan Li, Huafei Zhu, Yongdong Wu
    Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:389-401 [Conf]
  15. Huafei Zhu, Feng Bao, Robert H. Deng
    Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:207-219 [Conf]
  16. Huafei Zhu, Jianying Zhou
    Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:72-81 [Conf]
  17. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
    More on Shared-Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:142-152 [Conf]
  18. Huafei Zhu
    Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:101-114 [Conf]
  19. Chan H. Lee, Xiaotie Deng, Huafei Zhu
    Design and Security Analysis of Anonymous Group Identification Protocols. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:188-198 [Conf]
  20. Yi Mu, Willy Susilo, Huafei Zhu
    Compact sequential aggregate signatures. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:249-253 [Conf]
  21. Huafei Zhu, Tieyan Li, Feng Bao
    Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:340-350 [Conf]
  22. Huafei Zhu, Feng Bao
    A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:266-273 [Conf]
  23. Huafei Zhu, Willy Susilo, Yi Mu
    Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:134-149 [Conf]

  24. Fully-Simulatable Oblivious Set Transfer. [Citation Graph (, )][DBLP]


  25. Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. [Citation Graph (, )][DBLP]


  26. Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism. [Citation Graph (, )][DBLP]


  27. Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders. [Citation Graph (, )][DBLP]


  28. Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. [Citation Graph (, )][DBLP]


  29. Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. [Citation Graph (, )][DBLP]


  30. Oblivious Keyword Search Protocols in the Public Database Model. [Citation Graph (, )][DBLP]


  31. Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. [Citation Graph (, )][DBLP]


  32. Price Negotiation Systems for M-commerce. [Citation Graph (, )][DBLP]


  33. Adaptive and Composable Oblivious Transfer Protocols (Short Paper). [Citation Graph (, )][DBLP]


  34. Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. [Citation Graph (, )][DBLP]


  35. New Constructions for Reusable, Non-erasure and Universally Composable Commitments. [Citation Graph (, )][DBLP]


  36. Private Searching on MapReduce. [Citation Graph (, )][DBLP]


  37. An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. [Citation Graph (, )][DBLP]


  38. Round Optimal Universally Composable Oblivious Transfer Protocols. [Citation Graph (, )][DBLP]


  39. Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. [Citation Graph (, )][DBLP]


  40. Towards a Theory of Universally Composable Cloud Computing. [Citation Graph (, )][DBLP]


  41. Towards a Theory of Cloud Computing in the Protocol-Composition Framework. [Citation Graph (, )][DBLP]


Search in 0.029secs, Finished in 0.032secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002