BibTeX records: Zhenchuan Chai

download as .bib file

@article{DBLP:journals/ijnsec/LuCCL08,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Zhenchuan Chai and
                  Xiaohui Liang},
  title        = {A Simple User Authentication Scheme for Grid Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {202--206},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p202-206.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuCCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChaiCL07,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Rongxing Lu},
  title        = {Threshold password authentication against guessing attacks in Ad hoc
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {5},
  number       = {7},
  pages        = {1046--1054},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.adhoc.2006.05.003},
  doi          = {10.1016/J.ADHOC.2006.05.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChaiCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChaiCD07,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Identity-based signature scheme based on quadratic residues},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {373--380},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-0038-1},
  doi          = {10.1007/S11432-007-0038-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChaiCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/ChaiCD07,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Efficient ID-Based Multi-Receiver Threshold Decryption},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {18},
  number       = {5},
  pages        = {987--1004},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0129054107005091},
  doi          = {10.1142/S0129054107005091},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/ChaiCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ChaiCZ07,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Yuan Zhou},
  title        = {Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {1},
  pages        = {103--108},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9014-x},
  doi          = {10.1007/S11390-007-9014-X},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ChaiCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/ChaiCL06,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Rongxing Lu},
  editor       = {Laurence Tianruo Yang and
                  Hai Jin and
                  Jianhua Ma and
                  Theo Ungerer},
  title        = {Remote Authentication with Forward Security},
  booktitle    = {Autonomic and Trusted Computing, Third International Conference, {ATC}
                  2006, Wuhan, China, September 3-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4158},
  pages        = {418--427},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11839569\_40},
  doi          = {10.1007/11839569\_40},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/ChaiCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/ChaiCZ06,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Yuan Zhou},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {148--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.217},
  doi          = {10.1109/IMSCCS.2006.217},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imsccs/ChaiCZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhouCC06,
  author       = {Yuan Zhou and
                  Zhenfu Cao and
                  Zhenchuan Chai},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Identity Based Key Insulated Signature},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {226--234},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_21},
  doi          = {10.1007/11689522\_21},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhouCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ChaiCL06,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Rongxing Lu},
  editor       = {Xiuzhen Cheng and
                  Wei Wayne Li and
                  Taieb Znati},
  title        = {Efficient Password-Based Authentication and Key Exchange Scheme Preserving
                  User Privacy},
  booktitle    = {Wireless Algorithms, Systems, and Applications, First International
                  Conference, {WASA} 2006, Xi'an, China, August 15-17, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4138},
  pages        = {467--477},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11814856\_45},
  doi          = {10.1007/11814856\_45},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/ChaiCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhouCC05,
  author       = {Yuan Zhou and
                  Zhenfu Cao and
                  Zhenchuan Chai},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Constructing Secure Proxy Cryptosystem},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_13},
  doi          = {10.1007/11599548\_13},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhouCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZhouCC05,
  author       = {Yuan Zhou and
                  Zhenfu Cao and
                  Zhenchuan Chai},
  editor       = {Guihai Chen and
                  Yi Pan and
                  Minyi Guo and
                  Jian Lu},
  title        = {An Efficient Proxy-Protected Signature Scheme Based on Factoring},
  booktitle    = {Parallel and Distributed Processing and Applications - {ISPA} 2005
                  Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC,
                  IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3759},
  pages        = {332--341},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576259\_37},
  doi          = {10.1007/11576259\_37},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/ZhouCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ChaiCZ05,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Yuan Zhou},
  editor       = {Guihai Chen and
                  Yi Pan and
                  Minyi Guo and
                  Jian Lu},
  title        = {Encryption Based on Reversible Second-Order Cellular Automata},
  booktitle    = {Parallel and Distributed Processing and Applications - {ISPA} 2005
                  Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC,
                  IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3759},
  pages        = {350--358},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576259\_39},
  doi          = {10.1007/11576259\_39},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/ChaiCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChaiC04,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao},
  editor       = {Jun Zhang and
                  Ji{-}Huan He and
                  Yuxi Fu},
  title        = {Factoring-Based Proxy Signature Schemes with Forward-Security},
  booktitle    = {Computational and Information Science, First International Symposium,
                  {CIS} 2004, Shanghai, China, December 16-18, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3314},
  pages        = {1034--1040},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30497-5\_159},
  doi          = {10.1007/978-3-540-30497-5\_159},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ChaiC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ChaiCL04,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Rongxing Lu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {ID-based threshold decryption without random oracles and its application
                  in key escrow},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046314},
  doi          = {10.1145/1046290.1046314},
  timestamp    = {Tue, 15 Feb 2022 16:17:26 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ChaiCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}