Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Bhupendra Singh
Michele Pace
Charles Parker
Marco Vannucci
Silvia Scirpoli
Ross Lambert
Songhua Li
Sebastian Magda
David MacDonald
Meng Jiang
Home
/
Author
/
SHENGBAO WANG
Author Info
Open Visualization
Name
Affiliation
Papers
SHENGBAO WANG
Department of Computer Science and Engineering, Shanghai Jiao tong University, 1954 Huashan Road, Shanghai 200030, People's Republic of China
23
Collaborators
Citations
PageRank
20
169
13.37
Referers
Referees
References
376
343
258
Search Limit
100
376
Publications (23 rows)
Collaborators (20 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
2
0.36
2017
A Cca2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles
0
0.34
2015
Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices.
0
0.34
2015
Practical identity-based encryption in multiple private key generator PKG environments
1
0.37
2015
Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.
0
0.34
2015
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
16
0.66
2012
On the anonymity of some authentication schemes for wireless communications
32
1.85
2009
An improved identity-based key agreement protocol and its security proof
31
1.18
2009
Security weakness in a dynamic program update protocol for wireless sensor networks
4
0.47
2009
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings.
1
0.35
2009
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
9
0.53
2008
Security Proof for the Improved Ryu{Yoon{Yoo Identity-Based Key Agreement Protocol ?
1
0.34
2008
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
15
0.92
2008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol
12
0.82
2007
A New ID-Based Deniable Authentication Protocol
7
0.56
2007
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.
4
0.42
2007
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
1
0.36
2006
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings
0
0.34
2006
Identity-Based threshold proxy signature scheme with known signers
8
0.51
2006
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
8
0.71
2005
Security of an efficient ID-Based authenticated key agreement protocol from pairings
4
0.45
2005
Formalized security model of multi-proxy signature schemes
10
0.70
2005
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys
3
0.44
2005
1