Zhaohui Cheng
Zhaohui Cheng
Lecturer of Computer Science, Middlesex University
olymtech.net üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6 (4), 213-241, 2007
5292007
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
Cryptography and Coding, 442-459, 2005
1462005
Efficient Certificateless Public Key Encryption.
Z Cheng, R Comley
IACR Cryptology ePrint Archive 2005, 12, 2005
882005
Efficient certificateless public key encryption
Z Cheng, R Comley
Cryptology ePrint Archive, Report 2005/012, 2005
88*2005
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases.
Z Cheng, M Nistazakis, R Comley, L Vasiu
IACR Cryptology ePrint Archive 2005, 129, 2005
822005
Efficient ID-KEM based on the Sakai–Kasahara key construction
L Chen, Z Cheng, J Malone-Lee, MP Smart
IEE Proceedings-Information Security 153 (1), 19-26, 2006
672006
On security proof of McCullaghBarreto's key agreement protocol and its variants
Z Cheng, L Chen
International Journal of Security and Networks 2 (3), 251-259, 2007
452007
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
S Wang, Z Cao, Z Cheng, KKR Choo
Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009
352009
General and efficient certificateless public key encryption constructions
Z Cheng, L Chen, L Ling, R Comley
Pairing-Based Cryptography–Pairing 2007, 83-107, 2007
332007
Pairing-Based One-Round Tripartite Key Agreement Protocols.
Z Cheng, L Vasiu, R Comley
IACR Cryptology ePrint Archive 2004, 79, 2004
322004
Identity-based key agreement with unilateral identity privacy using pairings
Z Cheng, L Chen, R Comley, Q Tang
Information Security Practice and Experience, 202-213, 2006
282006
Remove key escrow from the identity-based encryption system.
RA Comley, L Vasiu, Z Cheng
IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd …, 2004
26*2004
Remove key escrow from the identity-based encryption system
Z Cheng, R Comley, L Vasiu
Exploring New Frontiers of Theoretical Informatics, 37-50, 2004
262004
Attacks on an ISO/IEC 11770-2 key establishment protocol.
RA Comley, Z Cheng
International Journal of Network Security 3 (3), 290-295, 2005
17*2005
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol.
Z Cheng, R Comley
IACR Cryptology ePrint Archive 2004, 249, 2004
172004
SK− KEM: An Identity− based Kem
M Barbosa, L Chen, Z Cheng, M Chimley, A Dent, P Farshim, K Harrison, ...
IEEE P1363. 3: Identity-Based Public Key Cryptography, 2006
132006
Implementing pairing-based cryptosystems
Z Cheng, M Nistazakis
Proceedings of IWWST, 2005
122005
Security Analysis of LWAPP
Z Cheng, M Nistazakis, R Comely
IWWST’04, 60, 2004
52004
Pairing-based cryptosystems and key agreement protocols
Z Cheng
Thesis, Middlesex University, 2007
32007
Simple SK-ID-KEM1
Z Cheng
12005
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20