|
Search the dblp DataBase
Shengbao Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Qin Wang, Zhenfu Cao, Shengbao Wang
Formalized Security Model of Multi-Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:668-672 [Conf]
- Shengbao Wang, Zhenfu Cao, Haiyong Bao
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:109-112 [Conf]
- Shengbao Wang, Zhenfu Cao, Haiyong Bao
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2005, pp:342-349 [Conf]
- Haiyong Bao, Zhenfu Cao, Shengbao Wang
Identity-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP] TAMC, 2006, pp:538-546 [Conf]
- Haiyong Bao, Zhenfu Cao, Shengbao Wang
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:78, n:1, pp:56-59 [Journal]
- Shengbao Wang
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao
A New ID-Based Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:67-78 [Journal]
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|