The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhenfu Cao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qin Wang, Zhenfu Cao, Shengbao Wang
    Formalized Security Model of Multi-Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:668-672 [Conf]
  2. Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue
    Efficient Non-interactive Deniable Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:673-679 [Conf]
  3. Qingshui Xue, Zhenfu Cao
    Improvement of Multi-Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:450-455 [Conf]
  4. Shanshan Duan, Zhenfu Cao
    Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:195-206 [Conf]
  5. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Remote Authentication with Forward Security. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:418-427 [Conf]
  6. Haiyong Bao, Zhenfu Cao, Haifeng Qian
    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:26-34 [Conf]
  7. Feng Cao, Zhenfu Cao
    Security Model of Proxy-Multi Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:144-152 [Conf]
  8. Rongxing Lu, Zhenfu Cao, Xiaolei Dong
    Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:153-167 [Conf]
  9. Qin Wang, Zhenfu Cao
    Two Proxy Signcryption Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:161-171 [Conf]
  10. Yuan Zhou, Zhenfu Cao, Rongxing Lu
    Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:172-185 [Conf]
  11. Shanshan Duan, Zhenfu Cao, Yuan Zhou
    Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:445-450 [Conf]
  12. Zhenchuan Chai, Zhenfu Cao
    Factoring-Based Proxy Signature Schemes with Forward-Security. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:1034-1040 [Conf]
  13. Qin Wang, Zhenfu Cao
    Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:167-172 [Conf]
  14. Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
    Certificateless Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:104-109 [Conf]
  15. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    Constructing Secure Proxy Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:150-161 [Conf]
  16. Feng Cao, Zhenfu Cao
    A Proxy-Protected Signature Scheme Based on Finite Automaton. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:48-55 [Conf]
  17. Feng Cao, Zhenfu Cao
    Cryptanalysis on a Proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:117-120 [Conf]
  18. Feng Cao, Zhenfu Cao, Licheng Wang
    An Improvement of an Identity-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:13-18 [Conf]
  19. Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
    Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:148-154 [Conf]
  20. Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
    Designated Verifier Proxy Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:40-47 [Conf]
  21. Sheng Guo, Zhenfu Cao, Rongxing Lu
    An Efficient ID-Based Multi-proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:81-88 [Conf]
  22. Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
    Group Oriented Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:89-92 [Conf]
  23. Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo
    Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:113-116 [Conf]
  24. Shengbao Wang, Zhenfu Cao, Haiyong Bao
    Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:109-112 [Conf]
  25. Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
    Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:8-12 [Conf]
  26. Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
    Encryption Based on Reversible Second-Order Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:350-358 [Conf]
  27. Haifeng Qian, Zhenfu Cao
    A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:323-331 [Conf]
  28. Shengbao Wang, Zhenfu Cao, Haiyong Bao
    Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:342-349 [Conf]
  29. Qingshui Xue, Zhenfu Cao
    A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:715-724 [Conf]
  30. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    An Efficient Proxy-Protected Signature Scheme Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:332-341 [Conf]
  31. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    Identity Based Key Insulated Signature. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:226-234 [Conf]
  32. Fengying Li, Qingshui Xue, Zhenfu Cao
    Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:815-818 [Conf]
  33. Qingshui Xue, Zhenfu Cao, Haifeng Qian
    A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:662-665 [Conf]
  34. Qingshui Xue, Zhenfu Cao, Feilong Tang
    An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2004, pp:901-907 [Conf]
  35. Haiyong Bao, Zhenfu Cao, Shengbao Wang
    Identity-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    TAMC, 2006, pp:538-546 [Conf]
  36. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:467-477 [Conf]
  37. Rongxing Lu, Zhenfu Cao
    Efficient remote user authentication scheme using smart card. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:49, n:4, pp:535-540 [Journal]
  38. Jun Shao, Zhenfu Cao
    A traceable threshold signature scheme with multiple signing policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:201-206 [Journal]
  39. Rongxing Lu, Zhenfu Cao
    Simple three-party key exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:94-97 [Journal]
  40. Zhenfu Cao, Gennian Ge, Ying Miao
    Combinatorial characterizations of one-coincidence frequency-hopping sequences. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:41, n:2, pp:177-184 [Journal]
  41. Kejun Chen, Zhenfu Cao, Dianhua Wu
    Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4). [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2004, v:279, n:1-3, pp:153-161 [Journal]
  42. Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
    Simulatability and security of certificateless threshold signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1382-1394 [Journal]
  43. Jiguo Li, Zhenfu Cao, Yichen Zhang
    Nonrepudiable Proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:3, pp:399-402 [Journal]
  44. Haiyong Bao, Zhenfu Cao, Shengbao Wang
    Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:56-59 [Journal]
  45. Jun Shao, Zhenfu Cao, Rongxing Lu
    Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal]
  46. Jun Shao, Zhenfu Cao, Rongxing Lu
    An improved deniable authentication protocol. [Citation Graph (0, 0)][DBLP]
    Networks, 2006, v:48, n:4, pp:179-181 [Journal]
  47. Rongxing Lu, Zhenfu Cao, Xiaolei Dong
    Authenticated encryption protocol with perfect forward secrecy for mobile communication. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:273-280 [Journal]
  48. Xuemin Shen, Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao
    Wireless network security. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:269-271 [Journal]
  49. Yu Long, Zhenfu Cao, Kefei Chen
    A dynamic threshold commercial key escrow scheme based on conic. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:2, pp:972-982 [Journal]
  50. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
    Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:299-310 [Conf]
  51. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
    Short Group Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:69-82 [Conf]
  52. Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
    An Efficient Certified Email Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:145-157 [Conf]
  53. Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
    Threshold password authentication against guessing attacks in Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:7, pp:1046-1054 [Journal]
  54. Haifeng Qian, Zhenfu Cao, Qingshui Xue
    Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:261-274 [Journal]
  55. Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao
    A New ID-Based Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:67-78 [Journal]
  56. Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng
    How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal]
  57. Qin Wang, Zhenfu Cao
    Identity based proxy multi-signature. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1023-1029 [Journal]

  58. How to Construct Interval Encryption from Binary Tree Encryption. [Citation Graph (, )][DBLP]


  59. Non-malleable Statistically Hiding Commitment from Any One-Way Function. [Citation Graph (, )][DBLP]


  60. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. [Citation Graph (, )][DBLP]


  61. Attribute based proxy re-encryption with delegating capabilities. [Citation Graph (, )][DBLP]


  62. Provably secure and efficient bounded ciphertext policy attribute based encryption. [Citation Graph (, )][DBLP]


  63. Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. [Citation Graph (, )][DBLP]


  64. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]


  65. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  66. An Insider-Resistant Group Key Exchange Protocol without Signatures. [Citation Graph (, )][DBLP]


  67. Transitive Signatures from Braid Groups. [Citation Graph (, )][DBLP]


  68. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]


  69. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. [Citation Graph (, )][DBLP]


  70. Proxy Re-signature Schemes Without Random Oracles. [Citation Graph (, )][DBLP]


  71. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]


  72. CCA-Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]


  73. Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. [Citation Graph (, )][DBLP]


  74. An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. [Citation Graph (, )][DBLP]


  75. A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. [Citation Graph (, )][DBLP]


  76. An Identity Based Proxy Signature Scheme Secure in the Standard Model. [Citation Graph (, )][DBLP]


  77. Spatial Encryption under Simpler Assumption. [Citation Graph (, )][DBLP]


  78. Multi-Receiver Identity-Based Encryption in Multiple PKG Environment. [Citation Graph (, )][DBLP]


  79. A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]


  80. HTM: A Topic Model for Hypertexts. [Citation Graph (, )][DBLP]


  81. An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. [Citation Graph (, )][DBLP]


  82. Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


Search in 0.081secs, Finished in 0.084secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002