Name
Affiliation
Papers
SHENGBAO WANG
Department of Computer Science and Engineering, Shanghai Jiao tong University, 1954 Huashan Road, Shanghai 200030, People's Republic of China
23
Collaborators
Citations 
PageRank 
20
169
13.37
Referers 
Referees 
References 
376
343
258
Search Limit
100376
Title
Citations
PageRank
Year
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.20.362017
A Cca2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles00.342015
Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices.00.342015
Practical identity-based encryption in multiple private key generator PKG environments10.372015
Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.00.342015
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol160.662012
On the anonymity of some authentication schemes for wireless communications321.852009
An improved identity-based key agreement protocol and its security proof311.182009
Security weakness in a dynamic program update protocol for wireless sensor networks40.472009
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings.10.352009
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy90.532008
Security Proof for the Improved Ryu{Yoon{Yoo Identity-Based Key Agreement Protocol ?10.342008
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing150.922008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol120.822007
A New ID-Based Deniable Authentication Protocol70.562007
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.40.422007
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).10.362006
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings00.342006
Identity-Based threshold proxy signature scheme with known signers80.512006
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification80.712005
Security of an efficient ID-Based authenticated key agreement protocol from pairings40.452005
Formalized security model of multi-proxy signature schemes100.702005
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys30.442005