|
Search the dblp DataBase
Zhenfu Cao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Qin Wang, Zhenfu Cao, Shengbao Wang
Formalized Security Model of Multi-Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:668-672 [Conf]
- Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue
Efficient Non-interactive Deniable Authentication Protocols. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:673-679 [Conf]
- Qingshui Xue, Zhenfu Cao
Improvement of Multi-Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP] CIT, 2004, pp:450-455 [Conf]
- Shanshan Duan, Zhenfu Cao
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:195-206 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Remote Authentication with Forward Security. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:418-427 [Conf]
- Haiyong Bao, Zhenfu Cao, Haifeng Qian
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:26-34 [Conf]
- Feng Cao, Zhenfu Cao
Security Model of Proxy-Multi Signature Schemes. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:144-152 [Conf]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:153-167 [Conf]
- Qin Wang, Zhenfu Cao
Two Proxy Signcryption Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:161-171 [Conf]
- Yuan Zhou, Zhenfu Cao, Rongxing Lu
Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:172-185 [Conf]
- Shanshan Duan, Zhenfu Cao, Yuan Zhou
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:445-450 [Conf]
- Zhenchuan Chai, Zhenfu Cao
Factoring-Based Proxy Signature Schemes with Forward-Security. [Citation Graph (0, 0)][DBLP] CIS, 2004, pp:1034-1040 [Conf]
- Qin Wang, Zhenfu Cao
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:167-172 [Conf]
- Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
Certificateless Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:104-109 [Conf]
- Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
Constructing Secure Proxy Cryptosystem. [Citation Graph (0, 0)][DBLP] CISC, 2005, pp:150-161 [Conf]
- Feng Cao, Zhenfu Cao
A Proxy-Protected Signature Scheme Based on Finite Automaton. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:48-55 [Conf]
- Feng Cao, Zhenfu Cao
Cryptanalysis on a Proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:117-120 [Conf]
- Feng Cao, Zhenfu Cao, Licheng Wang
An Improvement of an Identity-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:13-18 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:148-154 [Conf]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:40-47 [Conf]
- Sheng Guo, Zhenfu Cao, Rongxing Lu
An Efficient ID-Based Multi-proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:81-88 [Conf]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su
Group Oriented Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:89-92 [Conf]
- Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo
Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:113-116 [Conf]
- Shengbao Wang, Zhenfu Cao, Haiyong Bao
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:109-112 [Conf]
- Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:8-12 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
Encryption Based on Reversible Second-Order Cellular Automata. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:350-358 [Conf]
- Haifeng Qian, Zhenfu Cao
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:323-331 [Conf]
- Shengbao Wang, Zhenfu Cao, Haiyong Bao
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:342-349 [Conf]
- Qingshui Xue, Zhenfu Cao
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:715-724 [Conf]
- Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
An Efficient Proxy-Protected Signature Scheme Based on Factoring. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:332-341 [Conf]
- Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
Identity Based Key Insulated Signature. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:226-234 [Conf]
- Fengying Li, Qingshui Xue, Zhenfu Cao
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. [Citation Graph (0, 0)][DBLP] ITNG, 2007, pp:815-818 [Conf]
- Qingshui Xue, Zhenfu Cao, Haifeng Qian
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:662-665 [Conf]
- Qingshui Xue, Zhenfu Cao, Feilong Tang
An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP] PDPTA, 2004, pp:901-907 [Conf]
- Haiyong Bao, Zhenfu Cao, Shengbao Wang
Identity-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP] TAMC, 2006, pp:538-546 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. [Citation Graph (0, 0)][DBLP] WASA, 2006, pp:467-477 [Conf]
- Rongxing Lu, Zhenfu Cao
Efficient remote user authentication scheme using smart card. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:49, n:4, pp:535-540 [Journal]
- Jun Shao, Zhenfu Cao
A traceable threshold signature scheme with multiple signing policies. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:201-206 [Journal]
- Rongxing Lu, Zhenfu Cao
Simple three-party key exchange protocol. [Citation Graph (0, 0)][DBLP] Computers & Security, 2007, v:26, n:1, pp:94-97 [Journal]
- Zhenfu Cao, Gennian Ge, Ying Miao
Combinatorial characterizations of one-coincidence frequency-hopping sequences. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:41, n:2, pp:177-184 [Journal]
- Kejun Chen, Zhenfu Cao, Dianhua Wu
Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4). [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2004, v:279, n:1-3, pp:153-161 [Journal]
- Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
Simulatability and security of certificateless threshold signatures. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:6, pp:1382-1394 [Journal]
- Jiguo Li, Zhenfu Cao, Yichen Zhang
Nonrepudiable Proxy Multi-Signature Scheme. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2003, v:18, n:3, pp:399-402 [Journal]
- Haiyong Bao, Zhenfu Cao, Shengbao Wang
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:78, n:1, pp:56-59 [Journal]
- Jun Shao, Zhenfu Cao, Rongxing Lu
Improvement of Yang et al.'s threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:2, pp:172-177 [Journal]
- Jun Shao, Zhenfu Cao, Rongxing Lu
An improved deniable authentication protocol. [Citation Graph (0, 0)][DBLP] Networks, 2006, v:48, n:4, pp:179-181 [Journal]
- Rongxing Lu, Zhenfu Cao, Xiaolei Dong
Authenticated encryption protocol with perfect forward secrecy for mobile communication. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:273-280 [Journal]
- Xuemin Shen, Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao
Wireless network security. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:269-271 [Journal]
- Yu Long, Zhenfu Cao, Kefei Chen
A dynamic threshold commercial key escrow scheme based on conic. [Citation Graph (0, 0)][DBLP] Applied Mathematics and Computation, 2005, v:171, n:2, pp:972-982 [Journal]
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Efficient Password-Based Authenticated Key Exchange Without Public Information. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:299-310 [Conf]
- Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
Short Group Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:69-82 [Conf]
- Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
An Efficient Certified Email Protocol. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:145-157 [Conf]
- Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
Threshold password authentication against guessing attacks in Ad hoc networks. [Citation Graph (0, 0)][DBLP] Ad Hoc Networks, 2007, v:5, n:7, pp:1046-1054 [Journal]
- Haifeng Qian, Zhenfu Cao, Qingshui Xue
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:261-274 [Journal]
- Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao
A New ID-Based Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:67-78 [Journal]
- Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng
How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal]
- Qin Wang, Zhenfu Cao
Identity based proxy multi-signature. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:7, pp:1023-1029 [Journal]
How to Construct Interval Encryption from Binary Tree Encryption. [Citation Graph (, )][DBLP]
Non-malleable Statistically Hiding Commitment from Any One-Way Function. [Citation Graph (, )][DBLP]
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. [Citation Graph (, )][DBLP]
Attribute based proxy re-encryption with delegating capabilities. [Citation Graph (, )][DBLP]
Provably secure and efficient bounded ciphertext policy attribute based encryption. [Citation Graph (, )][DBLP]
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. [Citation Graph (, )][DBLP]
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]
An Insider-Resistant Group Key Exchange Protocol without Signatures. [Citation Graph (, )][DBLP]
Transitive Signatures from Braid Groups. [Citation Graph (, )][DBLP]
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. [Citation Graph (, )][DBLP]
Proxy Re-signature Schemes Without Random Oracles. [Citation Graph (, )][DBLP]
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]
CCA-Secure Proxy Re-encryption without Pairings. [Citation Graph (, )][DBLP]
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. [Citation Graph (, )][DBLP]
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. [Citation Graph (, )][DBLP]
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. [Citation Graph (, )][DBLP]
An Identity Based Proxy Signature Scheme Secure in the Standard Model. [Citation Graph (, )][DBLP]
Spatial Encryption under Simpler Assumption. [Citation Graph (, )][DBLP]
Multi-Receiver Identity-Based Encryption in Multiple PKG Environment. [Citation Graph (, )][DBLP]
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]
HTM: A Topic Model for Hypertexts. [Citation Graph (, )][DBLP]
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. [Citation Graph (, )][DBLP]
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]
Search in 0.081secs, Finished in 0.084secs
|