The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rongxing Lu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Remote Authentication with Forward Security. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:418-427 [Conf]
  2. Rongxing Lu, Zhenfu Cao, Xiaolei Dong
    Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:153-167 [Conf]
  3. Yuan Zhou, Zhenfu Cao, Rongxing Lu
    Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:172-185 [Conf]
  4. Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu
    Identity Based Conference Key Distribution Scheme from Parings. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:845-852 [Conf]
  5. Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
    Designated Verifier Proxy Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:40-47 [Conf]
  6. Sheng Guo, Zhenfu Cao, Rongxing Lu
    An Efficient ID-Based Multi-proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:81-88 [Conf]
  7. Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
    Group Oriented Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:89-92 [Conf]
  8. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:467-477 [Conf]
  9. Rongxing Lu, Zhenfu Cao
    Efficient remote user authentication scheme using smart card. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:49, n:4, pp:535-540 [Journal]
  10. Rongxing Lu, Zhenfu Cao
    Simple three-party key exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:94-97 [Journal]
  11. Jun Shao, Zhenfu Cao, Rongxing Lu
    Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal]
  12. Jun Shao, Zhenfu Cao, Rongxing Lu
    An improved deniable authentication protocol. [Citation Graph (0, 0)][DBLP]
    Networks, 2006, v:48, n:4, pp:179-181 [Journal]
  13. Rongxing Lu, Zhenfu Cao, Xiaolei Dong
    Authenticated encryption protocol with perfect forward secrecy for mobile communication. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:273-280 [Journal]
  14. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
    Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:299-310 [Conf]
  15. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Threshold password authentication against guessing attacks in Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:7, pp:1046-1054 [Journal]
  16. Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao
    A New ID-Based Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:67-78 [Journal]

  17. Secure provenance: the essential of bread and butter of data forensics in cloud computing. [Citation Graph (, )][DBLP]


  18. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  19. Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]


  20. AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  21. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. [Citation Graph (, )][DBLP]


  22. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  23. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. [Citation Graph (, )][DBLP]


  24. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  25. SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. [Citation Graph (, )][DBLP]


  26. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]


  27. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  28. Secure Localized Authentication and Billing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  29. BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  30. A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]


  31. A Location Privacy Preserving Authentication Scheme in Vehicular Networks. [Citation Graph (, )][DBLP]


  32. A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002