|
Search the dblp DataBase
Changshe Ma:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Changshe Ma
Efficient Short Signcryption Scheme with Public Verifiability. [Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:118-129 [Conf]
- Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:409-423 [Conf]
- Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:233-243 [Conf]
- Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:48-56 [Conf]
- Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
Identity-Based Key-Insulated Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:470-480 [Conf]
- Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen
Efficient Authenticated Encryption Schemes with Public Verifiability [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP]
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. [Citation Graph (, )][DBLP]
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP]
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP]
Efficient discrete logarithm based multi-signature scheme in the plain public key model. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|