Shengbao Wang

Orcid: 0000-0001-9656-9602

According to our database1, Shengbao Wang authored at least 35 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Using Iterative Correction to Improve the Accuracy of the Blind-Hole Welding Residual Stress Test.
Sensors, October, 2024

Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., March, 2024

2023
Proof of retrievability with flexible designated verification for cloud storage.
Comput. Secur., December, 2023

Security Analysis of a User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., April, 2023

CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage.
IEEE Access, 2023

2018
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems.
Peer-to-Peer Netw. Appl., 2018

2017
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017

Analysis of USBSCAN Driver.
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017

2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015

A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles.
Informatica, 2015

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices.
CoRR, 2015

Identity-Based One Round Key Agreement Protocol without Bilinear Pairings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014

Pairing-Free Certificateless Signature with Security Proof.
J. Comput. Networks Commun., 2014

A Generic Methodological Framework for Cyber-ITS: Using Cyber-infrastructure in ITS Data Analysis Cases.
Fundam. Informaticae, 2014

2012
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012

2009
An improved identity-based key agreement protocol and its security proof.
Inf. Sci., 2009

Security weakness in a dynamic program update protocol for wireless sensor networks.
IEEE Commun. Lett., 2009

On the anonymity of some authentication schemes for wireless communications.
IEEE Commun. Lett., 2009

On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings.
IACR Cryptol. ePrint Arch., 2009

Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009

2008
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.
Int. J. Netw. Secur., 2008

Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing.
Int. J. Netw. Secur., 2008

Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol.
IEEE Commun. Lett., 2008

Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2008

2007
A New ID-Based Deniable Authentication Protocol.
Informatica, 2007

Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.
IACR Cryptol. ePrint Arch., 2007

Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
CoRR, 2007

2006
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006

Identity-Based Threshold Proxy Signature Scheme with Known Signers.
Proceedings of the Theory and Applications of Models of Computation, 2006

Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys.
J. Syst. Softw., 2005

Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Appl. Math. Comput., 2005

Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Formalized Security Model of Multi-Proxy Signature Schemes.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005


  Loading...