The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jianhong Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yujie Mou, Jian Cao, Shen-sheng Zhang, Jianhong Zhang
    Interactive Web Service Choice-Making Based on Extended QoS Model. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:1130-1134 [Conf]
  2. Jianhong Zhang, Shen-sheng Zhang, Jian Cao, Yujie Mou
    Improved HTN Planning Approach for Service Composition. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:609-612 [Conf]
  3. Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang
    Provably Secure and ID-Based Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:384-388 [Conf]
  4. Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang
    An Improved Nominative Proxy Signature Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:23-26 [Conf]
  5. Jianhong Zhang, Wei Zou
    A Robust Verifiably Encrypted Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:731-740 [Conf]
  6. Jianhong Zhang, Jiancheng Zou, Yumin Wang
    A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:836-844 [Conf]
  7. Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou
    Linkability of a Blind Signature Scheme and Its Improved Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:262-270 [Conf]
  8. Qian-Hong Wu, Jian-Hong Zhang, Yu-Min Wang
    Practical t-out-n Oblivious Transfer and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:226-237 [Conf]
  9. Jianhong Zhang, Qianhong Wu, Yumin Wang
    A Novel Efficient Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:292-300 [Conf]
  10. Jianhong Zhang, Jian Mao
    A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:65-78 [Conf]
  11. Jianhong Zhang, Shen-sheng Zhang, Jian Cao
    Planning Based Service Composition System. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:878-881 [Conf]
  12. Jianhong Zhang, Jiancheng Zou, Yumin Wang
    An Improved Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:185-194 [Conf]
  13. Jianhong Zhang, Hu'an Li, Jilin Wang
    A Convertible Limited Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:638-644 [Conf]
  14. Jianhong Zhang, Wei Zou
    Linkability of Two Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:468-471 [Conf]
  15. Jianhong Zhang, Qianhong Wu, Yumin Wang
    A New Efficient Group Signature With Forward Security. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2005, v:29, n:3, pp:321-326 [Journal]
  16. Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang
    On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2005, v:29, n:3, pp:243-346 [Journal]
  17. Jianhong Zhang, Jian Mao
    Linkability Analysis of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:556-566 [Conf]
  18. Jianhong Zhang, Jane Mao
    Security Analysis of Two Signature Schemes and Their Improved Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:589-602 [Conf]
  19. Jianhong Zhang
    An Efficient Identity-Based Ring Signature Scheme and Its Extension. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:63-74 [Conf]

  20. Efficient and Provably Secure Self-certified Signature Scheme. [Citation Graph (, )][DBLP]


  21. A Special Proxy Signature Scheme with Multi-warrant. [Citation Graph (, )][DBLP]


  22. A Controllable Anonymous Proxy Signature Scheme with Revocation. [Citation Graph (, )][DBLP]


  23. Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. [Citation Graph (, )][DBLP]


  24. On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. [Citation Graph (, )][DBLP]


  25. A Novel ID-Based Anonymous Signcryption Scheme. [Citation Graph (, )][DBLP]


  26. On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. [Citation Graph (, )][DBLP]


  27. A verifiably encrypted signature scheme with strong unforgeability. [Citation Graph (, )][DBLP]


  28. Cryptoanalysis of Two Signcryption Schemes. [Citation Graph (, )][DBLP]


  29. Fuzzy logic based adjustment control of a cable-driven auto-leveling parallel robot. [Citation Graph (, )][DBLP]


  30. On the Security of two Authenticated Encryption Schemes. [Citation Graph (, )][DBLP]


  31. On the Security of A Group Signature Scheme. [Citation Graph (, )][DBLP]


  32. An Efficient Proxy Signature Scheme with Full-delegation. [Citation Graph (, )][DBLP]


  33. An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. [Citation Graph (, )][DBLP]


  34. An Improved Designated-Verifier Proxy Signature Scheme. [Citation Graph (, )][DBLP]


  35. Efficient Provable Secure ID-Based Anonymous Signcryption Scheme. [Citation Graph (, )][DBLP]


  36. Comment on a Digital Signature Scheme with Using Self-Certified Public Keys. [Citation Graph (, )][DBLP]


  37. A novel identity-based multi-signcryption scheme. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.326secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002