Shengbao Wang
Orcid: 0000-0001-9656-9602
According to our database1,
Shengbao Wang
authored at least 35 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Using Iterative Correction to Improve the Accuracy of the Blind-Hole Welding Residual Stress Test.
Sensors, October, 2024
Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., March, 2024
2023
Comput. Secur., December, 2023
IEEE Internet Things J., April, 2023
IEEE Access, 2023
2018
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems.
Peer-to-Peer Netw. Appl., 2018
2017
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017
2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015
Informatica, 2015
CoRR, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014
J. Comput. Networks Commun., 2014
A Generic Methodological Framework for Cyber-ITS: Using Cyber-infrastructure in ITS Data Analysis Cases.
Fundam. Informaticae, 2014
2012
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012
2009
Inf. Sci., 2009
IEEE Commun. Lett., 2009
IEEE Commun. Lett., 2009
IACR Cryptol. ePrint Arch., 2009
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009
2008
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.
Int. J. Netw. Secur., 2008
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing.
Int. J. Netw. Secur., 2008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol.
IEEE Commun. Lett., 2008
IACR Cryptol. ePrint Arch., 2008
2007
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.
IACR Cryptol. ePrint Arch., 2007
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
CoRR, 2007
2006
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Theory and Applications of Models of Computation, 2006
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
2005
J. Syst. Softw., 2005
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Appl. Math. Comput., 2005
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005