Shengbao Wang
TitleCited byYear
On the anonymity of some authentication schemes for wireless communications
P Zeng, Z Cao, KKR Choo, S Wang
IEEE Communications Letters 13 (3), 170-171, 2009
722009
Efficient certificateless authenticated key agreement protocol from pairings
W Shengbao, C Zhenfu, W Licheng
Wuhan University Journal of Natural Sciences 11 (5), 1278-1282, 2006
622006
An improved identity-based key agreement protocol and its security proof
S Wang, Z Cao, KKR Choo, L Wang
Information Sciences 179 (3), 307-318, 2009
602009
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing.
S Wang, Z Cao, H Bao
IJ Network Security 7 (3), 342-347, 2008
492008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
S Wang, Z Cao, MA Strangio, L Wang
IEEE Communications Letters 12 (2), 2008
392008
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
S Wu, Q Pu, S Wang, D He
Information Sciences 215, 83-96, 2012
352012
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
S Wang, Z Cao, Z Cheng, KKR Choo
Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009
342009
Provably secure identity-based authenticated key agreement protocols in the standard model [J]
W Shengbao, C Zhenfu, D Xiaolei
CHINESE JOURNAL OF COMPUTERS 10 (30), 1842-1852, 2007
33*2007
Identity-based threshold proxy signature scheme with known signers
H Bao, Z Cao, S Wang
TAMC, 538-546, 2006
262006
Breaking and repairing the certificateless key agreement protocol from ASIAN 2006
L Xia, S Wang, J Shen, G Xu
Wuhan University Journal of Natural Sciences 13 (5), 562-566, 2008
252008
Formalized security model of multi-proxy signature schemes
Q Wang, Z Cao, S Wang
Computer and Information Technology, 2005. CIT 2005. The Fifth International …, 2005
252005
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
H Bao, Z Cao, S Wang
Applied mathematics and computation 169 (2), 1419-1430, 2005
242005
Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care
Q Xie, W Liu, S Wang, L Han, B Hu, T Wu
Journal of medical systems 38 (9), 91, 2014
222014
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.
S Wang, Z Cao, F Cao
IJ Network Security 7 (2), 181-186, 2008
192008
Practical identity-based encryption (IBE) in multiple PKG environments and its applications
S Wang
Arxiv preprint cs/0703106, 2007
192007
A new id-based deniable authentication protocol
R Lu, Z Cao, S Wang, H Bao
Informatica 18 (1), 67-78, 2007
152007
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
L Han, X Tan, S Wang, X Liang
Peer-to-Peer Networking and Applications, 1-11, 2016
142016
Security weakness in a dynamic program update protocol for wireless sensor networks
P Zeng, Z Cao, KK Choo, S Wang
IEEE Communications Letters 13 (6), 2009
142009
Security of an efficient ID-based authenticated key agreement protocol from pairings
S Wang, Z Cao, H Bao
Lecture notes in computer science 3759, 342, 2005
132005
Escrow-free certificate-based authenticated key agreement protocol from pairings
S Wang, Z Cao
Wuhan University Journal of Natural Sciences 12 (1), 63-66, 2007
122007
The system can't perform the operation now. Try again later.
Articles 1–20