The SCEAS System
Navigation Menu

Search the dblp DataBase


Shengbao Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qin Wang, Zhenfu Cao, Shengbao Wang
    Formalized Security Model of Multi-Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:668-672 [Conf]
  2. Shengbao Wang, Zhenfu Cao, Haiyong Bao
    Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:109-112 [Conf]
  3. Shengbao Wang, Zhenfu Cao, Haiyong Bao
    Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:342-349 [Conf]
  4. Haiyong Bao, Zhenfu Cao, Shengbao Wang
    Identity-Based Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    TAMC, 2006, pp:538-546 [Conf]
  5. Haiyong Bao, Zhenfu Cao, Shengbao Wang
    Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:56-59 [Journal]
  6. Shengbao Wang
    Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  7. Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao
    A New ID-Based Deniable Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:67-78 [Journal]

  8. On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002