The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhiguo Wan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhiguo Wan, Shuhong Wang
    Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:164-175 [Conf]
  2. Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao
    Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:328-335 [Conf]
  3. Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:102-108 [Conf]
  4. Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim
    Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal]
  5. Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel
    n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:31-43 [Conf]
  6. Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:285-292 [Conf]
  7. Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda
    Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal]

  8. Anonymous user communication for privacy protection in wireless metropolitan mesh networks. [Citation Graph (, )][DBLP]


  9. Privacy-Aware Attribute-Based Encryption with User Accountability. [Citation Graph (, )][DBLP]


  10. Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  11. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. [Citation Graph (, )][DBLP]


  12. Anonymous ID-Based Group Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002