The SCEAS System
Navigation Menu

Search the dblp DataBase


Yuefei Zhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lei Xie, Yongjun Xu, Xiaowei Li, Yuefei Zhu
    A Lightweight Scheme for Trust Relationship Establishment in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:229- [Conf]
  2. BaiJie Kuang, Yuefei Zhu, YaJuan Zhang
    An Improved Algorithm for uP + vQ Using JSF13. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:467-478 [Conf]
  3. Chunxiang Gu, Yuefei Zhu, YaJuan Zhang
    An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:9-16 [Conf]
  4. Chunxiang Gu, Yuefei Zhu
    An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:42-52 [Conf]
  5. Yuefei Zhu, Dan Xu
    An Efficient Key-Evolving Signature Scheme Based on Pairing. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:68-73 [Conf]
  6. Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu
    A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:437-443 [Conf]
  7. Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei
    A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1287-1294 [Conf]
  8. Chunxiang Gu, Yuefei Zhu
    Provable Security of ID-Based Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1277-1286 [Conf]
  9. Shuhua Wu, Yuefei Zhu, Qiong Pu
    Resource Efficient Hardware Design for RSA. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:64-68 [Conf]
  10. Yuefei Zhu, BaiJie Kuang, YaJuan Zhang
    An Improved Algorithm for uP + vQ on a Family of Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  11. Shuhua Wu, Yuefei Zhu
    Efficient Augmented Password-Based Encrypted Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:533-542 [Conf]
  12. JingFeng Li, Yuefei Zhu, Heng Pan, DaWei Wei
    A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:670-675 [Conf]
  13. Heng Pan, Yuefei Zhu, ZhengYun Pan, XianLing Lu
    An Efficient Scheme of Merging Multiple Public Key Infrastructures in ERP. [Citation Graph (0, 0)][DBLP]
    WAIM, 2005, pp:919-924 [Conf]
  14. Haojun Zhang, Yuefei Zhu
    Self-Updating Hash Chains and Their Implementations. [Citation Graph (0, 0)][DBLP]
    WISE, 2006, pp:387-397 [Conf]
  15. Yuefei Zhu, Xueli Wang
    A criterion for primitive polynomials over Galois rings. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2005, v:303, n:1-3, pp:243-255 [Journal]
  16. Chunxiang Gu, Yuefei Zhu, Yonghui Zheng
    Certified E-Mail Protocol in the ID-Based Setting. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:340-353 [Conf]
  17. Shuhua Wu, Yuefei Zhu
    Practical Password-Based Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:523-533 [Conf]
  18. Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang
    Universally Composable Key-Evolving Signature. [Citation Graph (0, 0)][DBLP]
    CISIM, 2007, pp:97-102 [Conf]

  19. Universally Composable Three-Party Key Distribution. [Citation Graph (, )][DBLP]

  20. Forward Security for an Efficient Password-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP]

  21. An Efficient ID-Based Proxy Signature Scheme from Pairings. [Citation Graph (, )][DBLP]

  22. Efficient Public Key Encryption with Keyword Search Schemes from Pairings. [Citation Graph (, )][DBLP]

  23. Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. [Citation Graph (, )][DBLP]

  24. A Framework for Authenticated Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]

  25. Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. [Citation Graph (, )][DBLP]

  26. Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. [Citation Graph (, )][DBLP]

  27. A New-Style Domain Integrating Management of Windows and UNIX. [Citation Graph (, )][DBLP]

  28. Efficient Hybrid Password-Based Authenticated Group Key Exchange. [Citation Graph (, )][DBLP]

  29. Collecting Internet Malware Based on Client-side Honeypot. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002