Qiong Pu

According to our database1, Qiong Pu authored at least 19 papers between 2006 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Secure SIP authentication scheme supporting lawful interception.
Secur. Commun. Networks, 2013

Practical authentication scheme for SIP.
Peer-to-Peer Netw. Appl., 2013

Secure verifier-based three-party password-authenticated key exchange.
Peer-to-Peer Netw. Appl., 2013

Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013

Scalable and efficient mobile authentication scheme preserving user privacy.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2013

2012
Robust smart-cards-based user authentication scheme with user anonymity.
Secur. Commun. Networks, 2012

Strong Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012

Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks.
Int. J. Netw. Secur., 2012

Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service.
Int. J. Electron. Secur. Digit. Forensics, 2012

Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks.
Int. Arab J. Inf. Technol., 2012

2011
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
J. Inf. Sci. Eng., 2011

A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
Int. J. Netw. Manag., 2011

2010
Comments on an Efficient Secret Broadcast in the Broadcasting Networks.
IEEE Commun. Lett., 2010

Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS.
IEEE Commun. Lett., 2010

2009
Montgomery Exponentiation with No Final Comparisons: Improved Results.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

2008
Paradox Stems from the Security Model or the Security Proof?.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2006
Resource Efficient Hardware Design for RSA.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006


  Loading...