Colin Boyd, Wenbo Mao Design and Analysis of Key Exchange Protocols via Secure Channel Identification. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:171-181 [Conf]
Wenbo Mao Verifiable Partial Sharing of Integer Fractions. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:94-105 [Conf]
Wenbo Mao On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:201-210 [Conf]
Wenbo Mao Short Certification of Secure RSA Modulus (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:234-237 [Conf]
Wenbo Mao A Structured Operational Modelling of the Dolev-Yao Threat Model. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:34-46 [Conf]
Wenbo Mao Time-Lock Puzzle with Examinable Evidence of Unlocking Time. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:95-102 [Conf]
Wenbo Mao Deniable Authenticated Key Establishment for Internet Protocols (Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:272-273 [Conf]
Wenbo Mao On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1996, pp:1-17 [Conf]
Wenbo Mao Verifiable Partial Escrow of Integer Factors. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2001, v:24, n:3, pp:327-342 [Journal]