The SCEAS System
Navigation Menu

Search the dblp DataBase


Wenbo Mao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wenbo Mao
    Verifiable Escrowed Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:240-248 [Conf]
  2. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Key Agreement Using Statically Keyed Authenticators. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:248-262 [Conf]
  3. Colin Boyd, Wenbo Mao
    Design and Analysis of Key Exchange Protocols via Secure Channel Identification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:171-181 [Conf]
  4. Wenbo Mao, Chae Hoon Lim
    Cryptoanalysis in Prime Order Subgroups of Z*n. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:214-226 [Conf]
  5. Wenbo Mao, George J. Milne
    An Automated Proof Technique for Finite-State Machine Equivalence. [Citation Graph (0, 0)][DBLP]
    CAV, 1991, pp:233-243 [Conf]
  6. Wenbo Mao
    An augmentation of BAN-like logics. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:44-0 [Conf]
  7. Wenbo Mao, Colin Boyd
    Towards Formal Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:147-158 [Conf]
  8. Wenbo Mao, Colin Boyd
    Development of Authentication Protocols: Some Misconceptions and a New Approach. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:178-186 [Conf]
  9. John Malone-Lee, Wenbo Mao
    Two Birds One Stone: Signcryption Using RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:211-225 [Conf]
  10. Steven D. Galbraith, Wenbo Mao
    Invisibility and Anonymity of Undeniable and Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:80-97 [Conf]
  11. Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson
    RSA-Based Undeniable Signatures for General Moduli. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:200-217 [Conf]
  12. Wenbo Mao
    Light-Weight Micro-cash Payment for the Internet. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:15-32 [Conf]
  13. Colin Boyd, Wenbo Mao
    Designing Secure Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:93-105 [Conf]
  14. Wenbo Mao, Colin Boyd
    On Strengthening Authentication Protocols to Foil Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:193-204 [Conf]
  15. Colin Boyd, Wenbo Mao
    On a Limitation of BAN Logic. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:240-247 [Conf]
  16. Wenbo Mao
    Publicly verifiable partial key escrow. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:409-413 [Conf]
  17. Wenbo Mao
    Send Message into a Definite Future. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:244-251 [Conf]
  18. Liqun Chen, Wenbo Mao
    An Auditable Metering Scheme for Web Advertisement Applications. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:475-485 [Conf]
  19. Wenbo Mao
    Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:60-71 [Conf]
  20. Wenbo Mao
    Timed-Release Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:342-358 [Conf]
  21. Wenbo Mao
    Verifiable Partial Sharing of Integer Fractions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:94-105 [Conf]
  22. Wenbo Mao
    On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:201-210 [Conf]
  23. Wenbo Mao
    Short Certification of Secure RSA Modulus (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:234-237 [Conf]
  24. Wenbo Mao
    A Structured Operational Modelling of the Dolev-Yao Threat Model. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:34-46 [Conf]
  25. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Deniable Authenticated Key Establishment for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:255-271 [Conf]
  26. Wenbo Mao
    Time-Lock Puzzle with Examinable Evidence of Unlocking Time. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:95-102 [Conf]
  27. Wenbo Mao
    Deniable Authenticated Key Establishment for Internet Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:272-273 [Conf]
  28. Wenbo Mao
    On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:1-17 [Conf]
  29. Wenbo Mao
    Verifiable Partial Escrow of Integer Factors. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:24, n:3, pp:327-342 [Journal]
  30. Colin Boyd, Wenbo Mao
    Preface to the special issue on ISC 2003. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:227-227 [Journal]

  31. Daonity: grid security with behaviour conformity from trusted computing. [Citation Graph (, )][DBLP]

  32. A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing. [Citation Graph (, )][DBLP]

  33. Necessity and Realization of Universally Verifiable Secret Sharing. [Citation Graph (, )][DBLP]

  34. Efficient and Practical Fair Exchange Protocols with Off-Line TTP. [Citation Graph (, )][DBLP]

  35. Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]

  36. User-Friendly Grid Security Architecture and Protocols. [Citation Graph (, )][DBLP]

  37. Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002