|
Search the dblp DataBase
Futai Zhang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:649-654 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Certificateless Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:15-19 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:13-25 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:835-844 [Conf]
- Fangguo Zhang, Futai Zhang, Yumin Wang
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:74-83 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:214-225 [Conf]
- Fangguo Zhang, Futai Zhang, Yumin Wang
Fair Electronic Cash Systems with Multiple Banks. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:461-470 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Restricted Universal Designated Verifier Signature. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:874-882 [Conf]
- Fangguo Zhang, Futai Zhang, Yumin Wang
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:836-842 [Journal]
- Yinxia Sun, Futai Zhang, Joonsang Baek
Strongly Secure Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:194-208 [Conf]
- Lei Zhang, Futai Zhang, Wei Wu
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. [Citation Graph (0, 0)][DBLP] ProvSec, 2007, pp:103-121 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2007, v:22, n:1, pp:71-74 [Journal]
Novel Efficient Certificateless Aggregate Signatures. [Citation Graph (, )][DBLP]
Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme. [Citation Graph (, )][DBLP]
Security Model for Certificateless Aggregate Signature Schemes. [Citation Graph (, )][DBLP]
Efficient ID. [Citation Graph (, )][DBLP]
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing. [Citation Graph (, )][DBLP]
Batch Verification for Certificateless Signature Schemes. [Citation Graph (, )][DBLP]
New Efficient Certificateless Signature Scheme. [Citation Graph (, )][DBLP]
A New Provably Secure Certificateless Signature Scheme. [Citation Graph (, )][DBLP]
Efficient many-to-one authentication with certificateless aggregate signatures. [Citation Graph (, )][DBLP]
A new certificateless aggregate signature scheme. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|