The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hui-Feng Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hui-Feng Huang, Chin-Chen Chang
    A New Design for Efficient t-out-n Oblivious Transfer Scheme. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:499-502 [Conf]
  2. Hui-Feng Huang, Chin-Chen Chang
    Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:554-559 [Conf]
  3. Hui-Feng Huang, Chin-Chen Chang
    An efficient deniable authentication protocol. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:307-310 [Conf]
  4. Hui-Feng Huang, Chin-Chen Chang
    Cryptanalysis of the WD Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:249-254 [Conf]
  5. Hui-Feng Huang, Chin-Chen Chang
    A Novel Conference Key Distribution System with Re-keying Protocol. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:282-290 [Conf]
  6. Hui-Feng Huang, Chin-Chen Chang
    An Untraceable Electronic Cash System Using Fair Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:39-46 [Conf]
  7. Hui-Feng Huang, Chin-Chen Chang
    An Efficient Convertible Authenticated Encryption Scheme and Its Variant. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:382-392 [Conf]
  8. Hui-Feng Huang, Chin-Chen Chang
    An Untraceable Forward-Secure Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:441-446 [Conf]
  9. Hui-Feng Huang
    A New Efficient Authentication Scheme for Session Initiation Protocol. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  10. Hui-Feng Huang
    A New Cryptographic Key Assignment Scheme using a One-way Hash Function. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  11. Hui-Feng Huang, Chin-Chen Chang
    An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:982-986 [Conf]
  12. Hui-Feng Huang, Chin-Chen Chang
    An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:56, n:3, pp:243-253 [Journal]
  13. Hui-Feng Huang, Chin-Chen Chang
    A novel efficient (t, n) threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:10, pp:1338-1349 [Journal]
  14. Hui-Feng Huang, Chin-Chen Chang
    A new design of efficient partially blind signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:73, n:3, pp:397-403 [Journal]

  15. An Efficient Mutual Authentication Protocol on RFID Tags. [Citation Graph (, )][DBLP]


  16. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  17. An Efficient Three Party Authenticated Key Exchange for Mobile Communications. [Citation Graph (, )][DBLP]


  18. A New Dynamic Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002