The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shaohua Tang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shaohua Tang
    Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:186-191 [Conf]
  2. Shaohua Tang
    Correlative Message Group Digital Signature and Its Application to E-Commerce. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 2002, v:11, n:1, pp:73-80 [Journal]
  3. Shaohua Tang, Weihua Ma
    Directed User Authentication Scheme Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 1999, v:9, n:5-6, pp:299-306 [Journal]
  4. Shaohua Tang, Gang Wei
    ID-Based Digital Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 1999, v:9, n:3-4, pp:223-227 [Journal]
  5. Dongxi Zheng, Shaohua Tang, Shaofa Li
    Web Services Single Sign-on Protocol and Formal Analysis on It. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 2005, v:14, n:5, pp:923-930 [Journal]
  6. Anthony S. Maida, Shaohua Tang
    Description-based communication for autonomous agents under ideal conditions. [Citation Graph (0, 0)][DBLP]
    J. Exp. Theor. Artif. Intell., 1997, v:9, n:1, pp:103-135 [Journal]

  7. Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism. [Citation Graph (, )][DBLP]


  8. Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation. [Citation Graph (, )][DBLP]


  9. Sharing Multi-Secret Based on Circle Properties. [Citation Graph (, )][DBLP]


  10. Formal Privacy Analysis of an Electronic Voting Scheme. [Citation Graph (, )][DBLP]


  11. A CPK-Based Security Scheme at Network Layer. [Citation Graph (, )][DBLP]


  12. A Multi-level Trust Evaluation Model Based on D-S Theory for Grid. [Citation Graph (, )][DBLP]


  13. Formal security analysis of automated trust negotiation. [Citation Graph (, )][DBLP]


  14. Dual-Role Based Access Control Framework for Grid Services. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002