default search action
BibTeX records: Zhenchuan Chai
@article{DBLP:journals/ijnsec/LuCCL08, author = {Rongxing Lu and Zhenfu Cao and Zhenchuan Chai and Xiaohui Liang}, title = {A Simple User Authentication Scheme for Grid Computing}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {2}, pages = {202--206}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p202-206.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuCCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ChaiCL07, author = {Zhenchuan Chai and Zhenfu Cao and Rongxing Lu}, title = {Threshold password authentication against guessing attacks in Ad hoc networks}, journal = {Ad Hoc Networks}, volume = {5}, number = {7}, pages = {1046--1054}, year = {2007}, url = {https://doi.org/10.1016/j.adhoc.2006.05.003}, doi = {10.1016/J.ADHOC.2006.05.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ChaiCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ChaiCD07, author = {Zhenchuan Chai and Zhenfu Cao and Xiaolei Dong}, title = {Identity-based signature scheme based on quadratic residues}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {50}, number = {3}, pages = {373--380}, year = {2007}, url = {https://doi.org/10.1007/s11432-007-0038-1}, doi = {10.1007/S11432-007-0038-1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ChaiCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/ChaiCD07, author = {Zhenchuan Chai and Zhenfu Cao and Xiaolei Dong}, title = {Efficient ID-Based Multi-Receiver Threshold Decryption}, journal = {Int. J. Found. Comput. Sci.}, volume = {18}, number = {5}, pages = {987--1004}, year = {2007}, url = {https://doi.org/10.1142/S0129054107005091}, doi = {10.1142/S0129054107005091}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/ChaiCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ChaiCZ07, author = {Zhenchuan Chai and Zhenfu Cao and Yuan Zhou}, title = {Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {1}, pages = {103--108}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9014-x}, doi = {10.1007/S11390-007-9014-X}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ChaiCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/ChaiCL06, author = {Zhenchuan Chai and Zhenfu Cao and Rongxing Lu}, editor = {Laurence Tianruo Yang and Hai Jin and Jianhua Ma and Theo Ungerer}, title = {Remote Authentication with Forward Security}, booktitle = {Autonomic and Trusted Computing, Third International Conference, {ATC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4158}, pages = {418--427}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11839569\_40}, doi = {10.1007/11839569\_40}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/ChaiCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/ChaiCZ06, author = {Zhenchuan Chai and Zhenfu Cao and Yuan Zhou}, editor = {Jun Ni and Jack J. Dongarra}, title = {Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {148--154}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.217}, doi = {10.1109/IMSCCS.2006.217}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imsccs/ChaiCZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhouCC06, author = {Yuan Zhou and Zhenfu Cao and Zhenchuan Chai}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Identity Based Key Insulated Signature}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {226--234}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_21}, doi = {10.1007/11689522\_21}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhouCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ChaiCL06, author = {Zhenchuan Chai and Zhenfu Cao and Rongxing Lu}, editor = {Xiuzhen Cheng and Wei Wayne Li and Taieb Znati}, title = {Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy}, booktitle = {Wireless Algorithms, Systems, and Applications, First International Conference, {WASA} 2006, Xi'an, China, August 15-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4138}, pages = {467--477}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11814856\_45}, doi = {10.1007/11814856\_45}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/ChaiCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouCC05, author = {Yuan Zhou and Zhenfu Cao and Zhenchuan Chai}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Constructing Secure Proxy Cryptosystem}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {150--161}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_13}, doi = {10.1007/11599548\_13}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZhouCC05, author = {Yuan Zhou and Zhenfu Cao and Zhenchuan Chai}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {An Efficient Proxy-Protected Signature Scheme Based on Factoring}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {332--341}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_37}, doi = {10.1007/11576259\_37}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/ZhouCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ChaiCZ05, author = {Zhenchuan Chai and Zhenfu Cao and Yuan Zhou}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {Encryption Based on Reversible Second-Order Cellular Automata}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {350--358}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_39}, doi = {10.1007/11576259\_39}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/ChaiCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChaiC04, author = {Zhenchuan Chai and Zhenfu Cao}, editor = {Jun Zhang and Ji{-}Huan He and Yuxi Fu}, title = {Factoring-Based Proxy Signature Schemes with Forward-Security}, booktitle = {Computational and Information Science, First International Symposium, {CIS} 2004, Shanghai, China, December 16-18, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3314}, pages = {1034--1040}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30497-5\_159}, doi = {10.1007/978-3-540-30497-5\_159}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChaiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ChaiCL04, author = {Zhenchuan Chai and Zhenfu Cao and Rongxing Lu}, editor = {John R. White and Huanye Sheng}, title = {ID-based threshold decryption without random oracles and its application in key escrow}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {119--124}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046314}, doi = {10.1145/1046290.1046314}, timestamp = {Tue, 15 Feb 2022 16:17:26 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ChaiCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.