Shuhua Wu
According to our database1,
Shuhua Wu
authored at least 39 papers
between 2006 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Research on intellisense information service oriented to value network model in smart city.
Proceedings of the IEEE International Conference on Information and Automation, 2016
2014
Int. J. Netw. Secur., 2014
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014
2013
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment.
Wirel. Pers. Commun., 2013
Secur. Commun. Networks, 2013
Peer-to-Peer Netw. Appl., 2013
Math. Comput. Model., 2013
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards.
Int. J. Netw. Secur., 2013
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013
Int. J. Ad Hoc Ubiquitous Comput., 2013
Int. Arab J. Inf. Technol., 2013
2012
Secur. Commun. Networks, 2012
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Math. Comput. Model., 2012
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Syst., 2012
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2012
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012
Int. J. Netw. Secur., 2012
Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service.
Int. J. Electron. Secur. Digit. Forensics, 2012
Int. Arab J. Inf. Technol., 2012
2011
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
J. Inf. Sci. Eng., 2011
Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting.
J. Inf. Sci. Eng., 2011
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
Int. J. Netw. Manag., 2011
Int. Arab J. Inf. Technol., 2011
2010
IEEE Commun. Lett., 2010
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS.
IEEE Commun. Lett., 2010
2009
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting.
J. Networks, 2009
J. Networks, 2009
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009
Proceedings of the Information Security Practice and Experience, 2009
2008
Int. J. Netw. Secur., 2008
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006