Items where Author / Artist / Editor is "Cheng, Zhaohui"

See full list of headings
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 10.


Comley, Richard A. ORCID logoORCID:, Cheng, Zhaohui, Chen, Liqun and Ling, Li (2007) General and efficient Certificateless Public Key Encryption constructions. Pairing Based Cryptography, Lecture Notes in Computer Science, 2007 (4575) . pp. 83-107. ISSN 978-3-540-73488-8 [Article] (doi:10.1007/978-3-540-73489-5_6)

Cheng, Zhaohui, Chen, Liqun and Smart, Nigel P. (2007) Identity-based key agreement protocols from pairings. International Journal of Information Security, 6 (4) . pp. 213-241. ISSN 1615-5262 [Article] (doi:10.1007/s10207-006-0011-9)

Cheng, Zhaohui and Chen, Liqun (2007) On security proof of McCullagh Barreto's key agreement protocol and its variants. International Journal of Security and Networks, 2 (3-4) . pp. 251-259. ISSN 1747-8405 [Article] (doi:10.1504/IJSN.2007.013178)

Comley, Richard A. ORCID logoORCID:, Chen, Liqun, Tang, Qiang and Cheng, Zhaohui (2006) Identity-based key agreement with unilateral identity privacy using pairings. 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China. Proceedings, Lecture Notes in Computer Science LNCS 3903/2006 . pp. 202-213. ISSN 978-3-540-33052-3 [Article] (doi:10.1007/11689522_19)

Comley, Richard A. ORCID logoORCID: and Cheng, Zhaohui (2005) Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security, 3 (3) . pp. 290-295. ISSN 1816-353X [Article]

Comley, Richard A. ORCID logoORCID:, Vasiu, Luminita and Cheng, Zhaohui (2004) Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings., 3 (3) . pp. 37-50. ISSN 1-4020-8140-5 [Article]

Book Section

Cheng, Zhaohui, Malone-Lee, John, Chen, Liqun and Smart, Nigel P. (2006) An efficient ID-KEM based on the Sakai-Kasahara key construction. In: IET Proceedings Information Security. IET Proceedings, pp. 19-26. ISBN 1747-0722. [Book Section] (doi:10.1049/ip-ifs:20055070)

Cheng, Zhaohui and Chen, Liqun (2005) Security proof of Sakai-Kasahara's identity-based encryption scheme. In: 10th IMA International Conference on Cryptography and Coding, Cirencester, UK. Proceedings. Springer Verlag, Heidelberg, pp. 442-459. ISBN 3-540-30276-X. [Book Section] (doi:10.1007/11586821_29)

Luo, Yuan Roger ORCID logoORCID:, Cheng, Zhaohui and Chin, Kenneth (2003) Computing migration through context awareness and context transmission. In: Proceedings of the IADIS international conference WWW/Internet 2003. IADIS, pp. 386-394. ISBN 972989471X. [Book Section]


Cheng, Zhaohui (2007) Pairing-based cryptosystems and key agreement protocols. PhD thesis, Middlesex University. [Thesis]

This list was generated on Wed Jun 7 06:14:46 2023 BST.