Follow
Shengbao Wang
Title
Cited by
Cited by
Year
Efficient certificateless authenticated key agreement protocol from pairings
W Shengbao, C Zhenfu, W Licheng
Wuhan University Journal of Natural Sciences 11 (5), 1278-1282, 2006
772006
On the anonymity of some authentication schemes for wireless communications
P Zeng, Z Cao, KKR Choo, S Wang
IEEE Communications Letters 13 (3), 170-171, 2009
762009
An improved identity-based key agreement protocol and its security proof
S Wang, Z Cao, KKR Choo, L Wang
Information Sciences 179 (3), 307-318, 2009
692009
Efficient certificateless authentication and key agreement (CL-AK) for grid computing.
S Wang, Z Cao, H Bao
Int. J. Netw. Secur. 7 (3), 342-347, 2008
602008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
S Wang, Z Cao, MA Strangio, L Wang
IEEE Communications Letters 12 (2), 2008
532008
Provably secure identity-based authenticated key agreement protocols in the standard model [J]
W Shengbao, C Zhenfu, D Xiaolei
CHINESE JOURNAL OF COMPUTERS 10 (30), 1842-1852, 2007
40*2007
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
S Wu, Q Pu, S Wang, D He
Information Sciences 215, 83-96, 2012
392012
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
S Wang, Z Cao, Z Cheng, KKR Choo
Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009
372009
Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care
Q Xie, W Liu, S Wang, L Han, B Hu, T Wu
Journal of medical systems 38, 1-10, 2014
362014
Formalized security model of multi-proxy signature schemes
Q Wang, Z Cao, S Wang
The Fifth International Conference on Computer and Information Technology …, 2005
302005
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
L Han, X Tan, S Wang, X Liang
Peer-to-peer Networking and Applications 11, 63-73, 2018
292018
Breaking and repairing the certificateless key agreement protocol from ASIAN 2006
L Xia, S Wang, J Shen, G Xu
Wuhan University Journal of Natural Sciences 13 (5), 562-566, 2008
282008
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.
S Wang, Z Cao, F Cao
Int. J. Netw. Secur. 7 (2), 181-186, 2008
252008
Identity-based threshold proxy signature scheme with known signers
H Bao, Z Cao, S Wang
International Conference on Theory and Applications of Models of Computation …, 2006
252006
Improvement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
H Bao, Z Cao, S Wang
Applied Mathematics and Computation 169 (2), 1419-1430, 2005
242005
Practical identity-based encryption (IBE) in multiple PKG environments and its applications
S Wang
arXiv preprint cs/0703106, 2007
222007
An improved authenticated key agreement protocol for telecare medicine information system
W Liu, Q Xie, S Wang, B Hu
SpringerPlus 5, 1-16, 2016
202016
Certificateless signature scheme without bilinear pairings
SB Wang, WH Liu, Q Xie
Journal of China Institute of Communications 33 (4), 93-98, 2012
192012
Security weakness in a dynamic program update protocol for wireless sensor networks
P Zeng, Z Cao, KK Choo, S Wang
IEEE Communications Letters 13 (6), 426-428, 2009
192009
A new id-based deniable authentication protocol
R Lu, Z Cao, S Wang, H Bao
Informatica 18 (1), 67-78, 2007
162007
The system can't perform the operation now. Try again later.
Articles 1–20