Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tianjie Cao
@article{DBLP:journals/mis/PengC21, author = {Fei Peng and Tianjie Cao}, title = {Software-Defined Network Resource Optimization of the Data Center Based on {P4} Programming Language}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {3601104:1--3601104:7}, year = {2021}, url = {https://doi.org/10.1155/2021/3601104}, doi = {10.1155/2021/3601104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/PengC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ChenCDZ17, author = {Xiuqing Chen and Tianjie Cao and Robin Doss and Jingxuan Zhai}, title = {Attacks on and Countermeasures for Two {RFID} Protocols}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {4}, pages = {5825--5848}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4449-z}, doi = {10.1007/S11277-017-4449-Z}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ChenCDZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaoCDZWZ16, author = {Tianjie Cao and Xiuqing Chen and Robin Doss and Jingxuan Zhai and Lucas J. Wise and Qiang Zhao}, title = {{RFID} ownership transfer protocol based on cloud}, journal = {Comput. Networks}, volume = {105}, pages = {47--59}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.05.017}, doi = {10.1016/J.COMNET.2016.05.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaoCDZWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WuCZ15, author = {Jijie Wu and Tianjie Cao and Jingxuan Zhai}, title = {BlindLock: {\unicode{19968}}{\unicode{31181}}{\unicode{26377}}{\unicode{25928}}{\unicode{38450}}{\unicode{33539}}{\unicode{27745}}{\unicode{36857}}{\unicode{25915}}{\unicode{20987}}{\unicode{30340}}{\unicode{22270}}{\unicode{26696}}{\unicode{38145}}{\unicode{31995}}{\unicode{32479}} (BlindLock: An Effective Pattern Lock System Against Smudge Attack)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {{Z11}}, pages = {364--367}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/IZ11/364}, doi = {Y2015/V42/IZ11/364}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/WuCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/ChenCZLG14, author = {Xiuqing Chen and Tianjie Cao and Mingxiang Zhu and Wenzhuo Liu and Yu Guo}, title = {Traceability Attack Algorithm on {EOHLCAP} {RFID} Authentication Protocol}, journal = {J. Comput.}, volume = {9}, number = {4}, pages = {938--946}, year = {2014}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=83\&\#38;id=1160}, doi = {10.4304/JCP.9.4.938-946}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/ChenCZLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/ZhuCJ14, author = {Mingxiang Zhu and Tianjie Cao and Xiangying Jiang}, title = {Using clustering coefficient to construct weighted networks for supervised link prediction}, journal = {Soc. Netw. Anal. Min.}, volume = {4}, number = {1}, pages = {215}, year = {2014}, url = {https://doi.org/10.1007/s13278-014-0215-3}, doi = {10.1007/S13278-014-0215-3}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/ZhuCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/CaoZ13, author = {Tianjie Cao and Jingxuan Zhai}, title = {Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems}, journal = {J. Medical Syst.}, volume = {37}, number = {2}, pages = {9912}, year = {2013}, url = {https://doi.org/10.1007/s10916-012-9912-5}, doi = {10.1007/S10916-012-9912-5}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/CaoZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CuiC11, author = {Hui Cui and Tianjie Cao}, title = {A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1337--1343}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1337-1343}, doi = {10.4304/JNW.6.9.1337-1343}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/CuiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/BaoCZ11, author = {Yu Bao and Tianjie Cao and Guosun Zeng}, title = {Multistage Filtering for Collusion Detection in {P2P} Network}, booktitle = {{IEEE} Ninth International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia}, pages = {911--916}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DASC.2011.152}, doi = {10.1109/DASC.2011.152}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/BaoCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdma/DingC11, author = {Fang Ding and Tianjie Cao}, title = {Application of Daubechies Wavelet Transform in the Estimation of Standard Deviation of White Noise}, booktitle = {Second International Conference on Digital Manufacturing and Automation, {ICDMA} 2011, Zhangjiajie, Hunan, China, August 5-7, 2011}, pages = {212--215}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDMA.2011.59}, doi = {10.1109/ICDMA.2011.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdma/DingC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/BaoCZ11, author = {Yu Bao and Tianjie Cao and Guosun Zeng}, editor = {Sumitra Reddy and Samir Tata}, title = {Resisting Collusion by Game in Culture Web}, booktitle = {20th {IEEE} International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, {WETICE} 2011, Paris, France, 27-29 June 2011, Proceedings}, pages = {262--267}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WETICE.2011.45}, doi = {10.1109/WETICE.2011.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/BaoCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/GaoC10, author = {Yuhang Gao and Tianjie Cao}, title = {Memory Forensics for {QQ} from a Live System}, journal = {J. Comput.}, volume = {5}, number = {4}, pages = {541--548}, year = {2010}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=128\&\#38;id=1861}, doi = {10.4304/JCP.5.4.541-548}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/GaoC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoS09, author = {Tianjie Cao and Peng Shen}, title = {Cryptanalysis of Two {RFID} Authentication Protocols}, journal = {Int. J. Netw. Secur.}, volume = {9}, number = {1}, pages = {95--100}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n1/ijns-2009-v9-n1-p95-100.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/ZhaoC09, author = {Qian Zhao and Tianjie Cao}, title = {Collecting Sensitive Information from Windows Physical Memory}, journal = {J. Comput.}, volume = {4}, number = {1}, pages = {3--10}, year = {2009}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=108\&\#38;id=1717}, doi = {10.4304/JCP.4.1.3-10}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/ZhaoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/CaoHCWL09, author = {Tianjie Cao and Shi Huang and Hui Cui and Yipeng Wu and Qihan Luo}, title = {Controlled Secret Leakage}, journal = {J. Comput.}, volume = {4}, number = {1}, pages = {61--68}, year = {2009}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=108\&\#38;id=1734}, doi = {10.4304/JCP.4.1.61-68}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/CaoHCWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaoQZ09, author = {Tianjie Cao and Tao Quan and Bo Zhang}, title = {Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {263--270}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.263-270}, doi = {10.4304/JNW.4.4.263-270}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaoQZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CuiC09, author = {Hui Cui and Tianjie Cao}, title = {An Novel Anonymous Authenticated and Key Exchange Protocol}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {985--992}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.985-992}, doi = {10.4304/JNW.4.10.985-992}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/CuiC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoBL09, author = {Tianjie Cao and Elisa Bertino and Hong Lei}, title = {Security Analysis of the {SASI} Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {1}, pages = {73--77}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.32}, doi = {10.1109/TDSC.2008.32}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/CaoSB08, author = {Tianjie Cao and Peng Shen and Elisa Bertino}, title = {Cryptanalysis of Some {RFID} Authentication Protocols}, journal = {J. Commun.}, volume = {3}, number = {7}, pages = {20--27}, year = {2008}, url = {https://doi.org/10.4304/jcm.3.7.20-27}, doi = {10.4304/JCM.3.7.20-27}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/CaoSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscsct/CaoHL08, author = {Tianjie Cao and Tao He and Qihan Luo}, title = {Smart-Phone Based Server-Aided Computation}, booktitle = {2008 International Symposium on Computer Science and Computational Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2 Volumes}, pages = {295--298}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCSCT.2008.75}, doi = {10.1109/ISCSCT.2008.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscsct/CaoHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/CaoSB08, author = {Tianjie Cao and Peng Shen and Elisa Bertino}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Cryptanalysis of the {LCSS} {RFID} Authentication Protocol}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {305--309}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.73}, doi = {10.1109/ISECS.2008.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/CaoSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoM07, author = {Tianjie Cao and Xianping Mao}, title = {Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {355--360}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p355-360.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/ZhangWC07, author = {Yongping Zhang and Wei Wei and Tianjie Cao}, editor = {Kevin Chen{-}Chuan Chang and Wei Wang and Lei Chen and Clarence A. Ellis and Ching{-}Hsien Hsu and Ah Chung Tsoi and Haixun Wang}, title = {Improvement of an Authenticated Key Agreement Protocol}, booktitle = {Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: {DBMAN} 2007, WebETrends 2007, {PAIS} 2007 and {ASWAN} 2007, Huang Shan, China, June 16-18, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4537}, pages = {593--601}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72909-9\_66}, doi = {10.1007/978-3-540-72909-9\_66}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/apweb/ZhangWC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoHCWL07, author = {Tianjie Cao and Shi Huang and Hui Cui and Yipeng Wu and Qihan Luo}, title = {Controlled Secret Leakage}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {868--872}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.79}, doi = {10.1109/CIS.2007.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoHCWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/LeiC07, author = {Hong Lei and Tianjie Cao}, editor = {Kokou Y{\'{e}}tongnon and Richard Chbeir and Albert Dipanda}, title = {Cryptanalysis of {SPA} Protocol}, booktitle = {Third International {IEEE} Conference on Signal-Image Technologies and Internet-Based System, {SITIS} 2007, Shanghai, China, December 16-18, 2007}, pages = {1049--1052}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SITIS.2007.51}, doi = {10.1109/SITIS.2007.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/LeiC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/CaoL06, author = {Tianjie Cao and Dongdai Lin}, title = {Cryptanalysis of two password authenticated key exchange protocols based on {RSA}}, journal = {{IEEE} Commun. Lett.}, volume = {10}, number = {8}, pages = {623--625}, year = {2006}, url = {https://doi.org/10.1109/LCOMM.2006.1665131}, doi = {10.1109/LCOMM.2006.1665131}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/CaoL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoLX06, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {Security Analysis of Some Batch Verifying Signatures from Pairings}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {2}, pages = {138--143}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p138-143.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoLX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaoML06, author = {Tianjie Cao and Xianping Mao and Dongdai Lin}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Security Analysis of a Server-Aided {RSA} Key Generation Protocol}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {314--320}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_29}, doi = {10.1007/11689522\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CaoML06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {A randomized RSA-based partially blind signature scheme for electronic cash}, journal = {Comput. Secur.}, volume = {24}, number = {1}, pages = {44--49}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2004.05.008}, doi = {10.1016/J.COSE.2004.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {An Efficient ID-Based Deniable Authentication Protocol from Pairings}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {388--391}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.100}, doi = {10.1109/AINA.2005.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CaoLX05a, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, title = {ID-Based Ring Authenticated Encryption}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {591--596}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.203}, doi = {10.1109/AINA.2005.203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CaoLX05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Universal Designated-Verifier Proxy Blind Signatures for E-Commerce}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1036--1041}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_154}, doi = {10.1007/11596981\_154}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CaoL05, author = {Tianjie Cao and Dongdai Lin}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {233--241}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_20}, doi = {10.1007/11599548\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CaoL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WuZC05, author = {Ying Wu and Yongping Zhang and Tianjie Cao}, editor = {Hamid R. Arabnia}, title = {Security Analysis of {A} Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {58--64}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WuZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awcc/CaoLX04, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Chi{-}Hung Chi and Kwok{-}Yan Lam}, title = {Security Analysis of User Efficient Blind Signatures}, booktitle = {Content Computing, Advanced Workshop on Content Computing, {AWCC} 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3309}, pages = {167--172}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30483-8\_21}, doi = {10.1007/978-3-540-30483-8\_21}, timestamp = {Sun, 02 Jun 2019 21:13:11 +0200}, biburl = {https://dblp.org/rec/conf/awcc/CaoLX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awcc/CaoLX04a, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Chi{-}Hung Chi and Kwok{-}Yan Lam}, title = {Improved Privacy-Protecting Proxy Signature Scheme}, booktitle = {Content Computing, Advanced Workshop on Content Computing, {AWCC} 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3309}, pages = {208--213}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30483-8\_25}, doi = {10.1007/978-3-540-30483-8\_25}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/awcc/CaoLX04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.