Items where Author is "Cheng, Zhaohui "

See full list of headings
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 10.

Article

Comley, Richard A. and Cheng, Zhaohui and Chen, Liqun and Ling, Li (2007) General and efficient Certificateless Public Key Encryption constructions. Pairing Based Cryptography, Lecture Notes in Computer Science, 2007 (4575). pp. 83-107. ISSN 978-3-540-73488-8

Cheng, Zhaohui and Chen, Liqun and Smart, Nigel P. (2007) Identity-based key agreement protocols from pairings. International Journal of Information Security, 6 (4). pp. 213-241. ISSN 1615-5262

Cheng, Zhaohui and Chen, Liqun (2007) On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Network, 2 (3-4). pp. 251-259. ISSN 1747-8405

Comley, Richard A. and Chen, Liqun and Tang, Qiang and Cheng, Zhaohui (2006) Identity-based key agreement with unilateral identity privacy using pairings. 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China. Proceedings, Lecture Notes in Computer Science LNCS 3903/2006 . pp. 202-213. ISSN 978-3-540-33052-3

Comley, Richard A. and Cheng, Zhaohui (2005) Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security, 3 (3). pp. 290-295. ISSN 1816-353X

Comley, Richard A. and Vasiu, Luminita and Cheng, Zhaohui (2004) Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings., 3 (3). pp. 37-50. ISSN 1-4020-8140-5

Book Section

Cheng, Zhaohui and Malone-Lee, John and Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722

Cheng, Zhaohui and Chen, Liqun (2005) Security proof of Sakai-Kasahara's identity-based encryption scheme. In: 10th IMA International Conference on Cryptography and Coding, Cirencester, UK. Proceedings. Springer Verlag, Heidelberg, pp. 442-459. ISBN 3-540-30276-X

Luo, Yuan and Cheng, Zhaohui and Chin, Kenneth (2003) Computing migration through context awareness and context transmission. In: Proceedings of the IADIS international conference WWW/Internet 2003. IADIS, pp. 386-394. ISBN 972989471X

Thesis

Cheng, Zhaohui (2007) Pairing-based cryptosystems and key agreement protocols. PhD thesis, Middlesex University.

This list was generated on Fri Aug 1 19:00:42 2014 IST.