Items where Author / Artist / Editor is "Cheng, Zhaohui"
![]() | See full list of headings |
Article
Comley, Richard A. ORCID: https://orcid.org/0000-0003-0265-1010, Cheng, Zhaohui, Chen, Liqun and Ling, Li
(2007)
General and efficient Certificateless Public Key Encryption constructions.
Pairing Based Cryptography, Lecture Notes in Computer Science, 2007
(4575)
.
pp. 83-107.
ISSN 978-3-540-73488-8
[Article]
(doi:10.1007/978-3-540-73489-5_6)
Cheng, Zhaohui, Chen, Liqun and Smart, Nigel P. (2007) Identity-based key agreement protocols from pairings. International Journal of Information Security, 6 (4) . pp. 213-241. ISSN 1615-5262 [Article] (doi:10.1007/s10207-006-0011-9)
Cheng, Zhaohui and Chen, Liqun (2007) On security proof of McCullagh Barreto's key agreement protocol and its variants. International Journal of Security and Networks, 2 (3-4) . pp. 251-259. ISSN 1747-8405 [Article] (doi:10.1504/IJSN.2007.013178)
Comley, Richard A. ORCID: https://orcid.org/0000-0003-0265-1010, Chen, Liqun, Tang, Qiang and Cheng, Zhaohui
(2006)
Identity-based key agreement with unilateral identity privacy using pairings.
2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China. Proceedings, Lecture Notes in Computer Science LNCS 3903/2006
.
pp. 202-213.
ISSN 978-3-540-33052-3
[Article]
(doi:10.1007/11689522_19)
Comley, Richard A. ORCID: https://orcid.org/0000-0003-0265-1010 and Cheng, Zhaohui
(2005)
Attacks on an ISO/IEC 11770-2 key establishment protocol.
International Journal of Network Security, 3
(3)
.
pp. 290-295.
ISSN 1816-353X
[Article]
Comley, Richard A. ORCID: https://orcid.org/0000-0003-0265-1010, Vasiu, Luminita and Cheng, Zhaohui
(2004)
Remove key escrow from the identity-based encryption system.
IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings., 3
(3)
.
pp. 37-50.
ISSN 1-4020-8140-5
[Article]
Book Section
Cheng, Zhaohui, Malone-Lee, John, Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722. [Book Section] (doi:10.1049/ip-ifs:20055070)
Cheng, Zhaohui and Chen, Liqun (2005) Security proof of Sakai-Kasahara's identity-based encryption scheme. In: 10th IMA International Conference on Cryptography and Coding, Cirencester, UK. Proceedings. Springer Verlag, Heidelberg, pp. 442-459. ISBN 3-540-30276-X. [Book Section] (doi:10.1007/11586821_29)
Luo, Yuan Roger ORCID: https://orcid.org/0000-0002-9812-5543, Cheng, Zhaohui and Chin, Kenneth
(2003)
Computing migration through context awareness and context transmission.
In:
Proceedings of the IADIS international conference WWW/Internet 2003.
IADIS, pp. 386-394.
ISBN 972989471X.
[Book Section]
Thesis
Cheng, Zhaohui (2007) Pairing-based cryptosystems and key agreement protocols. PhD thesis, Middlesex University. [Thesis]