The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fangguo Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fangguo Zhang, Kwangjo Kim
    Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:312-323 [Conf]
  2. Fangguo Zhang, Shengli Liu, Kwangjo Kim
    Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:203-213 [Conf]
  3. Willy Susilo, Fangguo Zhang, Yi Mu
    Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:313-324 [Conf]
  4. Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
    Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:468-480 [Conf]
  5. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Limited Verifier Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:135-148 [Conf]
  6. Willy Susilo, Fangguo Zhang, Yi Mu
    Privacy-Enhanced Internet Storage. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:603-608 [Conf]
  7. Fangguo Zhang, Yi Mu, Willy Susilo
    Reducing Security Overhead for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:398-403 [Conf]
  8. Fangguo Zhang, Kwangjo Kim
    ID-Based Blind Signature and Ring Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:533-547 [Conf]
  9. Yi Mu, Fangguo Zhang, Willy Susilo
    Deniable Partial Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2004, pp:182-194 [Conf]
  10. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Efficient Signcryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:449-458 [Conf]
  11. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-Based Restrictive Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:117-124 [Conf]
  12. Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang
    New traitor tracing schemes using bilinear map. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:67-76 [Conf]
  13. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
    A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:480-489 [Conf]
  14. Jin Li, Fangguo Zhang, Yanming Wang
    A Strong Identity Based Key-Insulated Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:352-361 [Conf]
  15. Jin Li, Fangguo Zhang, Yanming Wang
    A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:362-371 [Conf]
  16. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
    Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:825-834 [Conf]
  17. Fangguo Zhang, Willy Susilo, Yi Mu
    Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:45-56 [Conf]
  18. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
    Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:251-265 [Conf]
  19. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:345-354 [Conf]
  20. Willy Susilo, Yi Mu, Fangguo Zhang
    Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:14-26 [Conf]
  21. Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
    ID-Based Distributed "Magic Ink" Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:249-259 [Conf]
  22. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:74-83 [Conf]
  23. Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
    An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:410-423 [Conf]
  24. Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
    New ID-Based Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:371-383 [Conf]
  25. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:191-204 [Conf]
  26. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:367-378 [Conf]
  27. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Chameleon Hashing Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:87-98 [Conf]
  28. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:120-135 [Conf]
  29. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    An Efficient Signature Scheme from Bilinear Pairings and Its Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:277-290 [Conf]
  30. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:461-470 [Conf]
  31. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
    A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:67-80 [Conf]
  32. Changjie Wang, Fangguo Zhang, Yumin Wang
    SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2002, v:34, n:1, pp:34-46 [Journal]
  33. Changjie Wang, Yumin Wang, Fangguo Zhang
    An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  34. Fangguo Zhang, Xiaofeng Chen
    Attack on an ID-based authenticated group key agreement scheme from PKC 2004. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:91, n:4, pp:191-193 [Journal]
  35. Changjie Wang, Fangguo Zhang, Yumin Wang
    Secure Web Transaction with Anonymous Mobile Agent over Internet. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:1, pp:84-89 [Journal]
  36. Fangguo Zhang, Futai Zhang, Yumin Wang
    Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:836-842 [Journal]
  37. Fangguo Zhang, Xiaofeng Chen
    Cryptanalysis of Huang-Chang partially blind signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:3, pp:323-325 [Journal]
  38. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
    ID-based restrictive partially blind signatures and applications. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:164-171 [Journal]
  39. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
    Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:18-30 [Conf]
  40. Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang
    Generalization of the Selective-ID Security Model for HIBS Protocols. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:894-902 [Conf]
  41. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Efficient Partially Blind Signatures with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1096-1105 [Conf]
  42. Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen
    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:208-217 [Conf]

  43. Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP]


  44. Efficient designated confirmer signature from bilinear pairings. [Citation Graph (, )][DBLP]


  45. New Efficient Certificateless Signature Scheme. [Citation Graph (, )][DBLP]


  46. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP]


  47. ID-Based Adaptive Oblivious Transfer. [Citation Graph (, )][DBLP]


  48. Improved Implementations of Cryptosystems Based on Tate Pairing. [Citation Graph (, )][DBLP]


Search in 0.038secs, Finished in 0.040secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002