|
Search the dblp DataBase
Rongxing Lu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Remote Authentication with Forward Security. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:418-427 [Conf]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:153-167 [Conf]
- Yuan Zhou, Zhenfu Cao, Rongxing Lu
Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:172-185 [Conf]
- Shiqun Li, Kefei Chen, Xiangxue Li, Rongxing Lu
Identity Based Conference Key Distribution Scheme from Parings. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:845-852 [Conf]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:40-47 [Conf]
- Sheng Guo, Zhenfu Cao, Rongxing Lu
An Efficient ID-Based Multi-proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:81-88 [Conf]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
Group Oriented Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:89-92 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. [Citation Graph (0, 0)][DBLP] WASA, 2006, pp:467-477 [Conf]
- Rongxing Lu, Zhenfu Cao
Efficient remote user authentication scheme using smart card. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:49, n:4, pp:535-540 [Journal]
- Rongxing Lu, Zhenfu Cao
Simple three-party key exchange protocol. [Citation Graph (0, 0)][DBLP] Computers & Security, 2007, v:26, n:1, pp:94-97 [Journal]
- Jun Shao, Zhenfu Cao, Rongxing Lu
Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal]
- Jun Shao, Zhenfu Cao, Rongxing Lu
An improved deniable authentication protocol. [Citation Graph (0, 0)][DBLP] Networks, 2006, v:48, n:4, pp:179-181 [Journal]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong
Authenticated encryption protocol with perfect forward secrecy for mobile communication. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:273-280 [Journal]
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:299-310 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Threshold password authentication against guessing attacks in Ad hoc networks. [Citation Graph (0, 0)][DBLP] Ad Hoc Networks, 2007, v:5, n:7, pp:1046-1054 [Journal]
- Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao
A New ID-Based Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:67-78 [Journal]
Secure provenance: the essential of bread and butter of data forensics in cloud computing. [Citation Graph (, )][DBLP]
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. [Citation Graph (, )][DBLP]
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. [Citation Graph (, )][DBLP]
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. [Citation Graph (, )][DBLP]
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. [Citation Graph (, )][DBLP]
SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. [Citation Graph (, )][DBLP]
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]
SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. [Citation Graph (, )][DBLP]
Secure Localized Authentication and Billing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]
BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. [Citation Graph (, )][DBLP]
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]
A Location Privacy Preserving Authentication Scheme in Vehicular Networks. [Citation Graph (, )][DBLP]
A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Search in 0.016secs, Finished in 0.017secs
|