The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Futai Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:649-654 [Conf]
  2. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Certificateless Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:15-19 [Conf]
  3. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:13-25 [Conf]
  4. Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
    Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:835-844 [Conf]
  5. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:74-83 [Conf]
  6. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:214-225 [Conf]
  7. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:461-470 [Conf]
  8. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Restricted Universal Designated Verifier Signature. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:874-882 [Conf]
  9. Fangguo Zhang, Futai Zhang, Yumin Wang
    Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:836-842 [Journal]
  10. Yinxia Sun, Futai Zhang, Joonsang Baek
    Strongly Secure Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:194-208 [Conf]
  11. Lei Zhang, Futai Zhang, Wei Wu
    A Provably Secure Ring Signature Scheme in Certificateless Cryptography. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:103-121 [Conf]
  12. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal]

  13. Novel Efficient Certificateless Aggregate Signatures. [Citation Graph (, )][DBLP]


  14. Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme. [Citation Graph (, )][DBLP]


  15. Security Model for Certificateless Aggregate Signature Schemes. [Citation Graph (, )][DBLP]


  16. Efficient ID. [Citation Graph (, )][DBLP]


  17. Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing. [Citation Graph (, )][DBLP]


  18. Batch Verification for Certificateless Signature Schemes. [Citation Graph (, )][DBLP]


  19. New Efficient Certificateless Signature Scheme. [Citation Graph (, )][DBLP]


  20. A New Provably Secure Certificateless Signature Scheme. [Citation Graph (, )][DBLP]


  21. Efficient many-to-one authentication with certificateless aggregate signatures. [Citation Graph (, )][DBLP]


  22. A new certificateless aggregate signature scheme. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002