Wenbo Mao

Orcid: 0009-0004-8409-7045

According to our database1, Wenbo Mao authored at least 49 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Indirect Coordinated Attack Against Relay via Load-Side Power Electronics and Its Defense Strategy.
IEEE Trans. Ind. Informatics, April, 2024

2023
Two stage Robust Nash Bargaining based Benefit Sharing between Electric and HCNG Distribution Networks Bridged with SOFC.
CoRR, 2023

2021
GoUncle: A Blockchain Of, By, For Modest Computers.
IACR Cryptol. ePrint Arch., 2021

2020
LotMint: Blockchain Returning to Decentralization with Decentralized Clock.
IACR Cryptol. ePrint Arch., 2020

2014
An instance selection and optimization method for multiple instance learning.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

2013
The role and effectiveness of cryptography in network virtualization: a position paper.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2009
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing.
Proceedings of the Security Protocols XVI, 2008

2007
Daonity - Grid security from two levels of virtualization.
Inf. Secur. Tech. Rep., 2007

Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment.
Proceedings of the Security Protocols, 2007

2006
Innovations for Grid Security from Trusted Computing.
Proceedings of the Security Protocols, 2006

Innovations for Grid Security from Trusted Computing.
Proceedings of the Security Protocols, 2006

Daonity: grid security with behaviour conformity from trusted computing.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
Preface to the special issue on ISC 2003.
Int. J. Inf. Sec., 2005

A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols.
Comput. Stand. Interfaces, 2005

User-Friendly Grid Security Architecture and Protocols.
Proceedings of the Security Protocols, 2005

2004
Key Agreement Using Statically Keyed Authenticators.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Deniable Authenticated Key Establishment for Internet Protocols (Discussion).
Proceedings of the Security Protocols, 2003

Deniable Authenticated Key Establishment for Internet Protocols.
Proceedings of the Security Protocols, 2003

Two Birds One Stone: Signcryption Using RSA.
Proceedings of the Topics in Cryptology, 2003

Invisibility and Anonymity of Undeniable and Confirmer Signatures.
Proceedings of the Topics in Cryptology, 2003

2002
A Structured Operational Modelling of the Dolev-Yao Threat Model.
Proceedings of the Security Protocols, 2002

RSA-Based Undeniable Signatures for General Moduli.
Proceedings of the Topics in Cryptology, 2002

2001
Timed-Release Cryptography.
IACR Cryptol. ePrint Arch., 2001

New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation.
IACR Cryptol. ePrint Arch., 2001

Verifiable Partial Escrow of Integer Factors.
Des. Codes Cryptogr., 2001

An Auditable Metering Scheme for Web Advertisement Applications.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Short Certification of Secure RSA Modulus (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
Time-Lock Puzzle with Examinable Evidence of Unlocking Time.
Proceedings of the Security Protocols, 1999

Send Message into a Definite Future.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
Necessity and Realization of Universally Verifiable Secret Sharing.
Proceedings of the Security and Privacy, 1998

Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
Proceedings of the Security and Privacy, 1998

Verifiable Partial Sharing of Integer Fractions.
Proceedings of the Selected Areas in Cryptography '98, 1998

Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders.
Proceedings of the Public Key Cryptography, 1998

Cryptanalysis in Prime Order Subgroups of <i>Z</i><sup>*</sup><sub>n</sub>.
Proceedings of the Advances in Cryptology, 1998

1997
Publicly verifiable partial key escrow.
Proceedings of the Information and Communication Security, First International Conference, 1997

Verifiable Escrowed Signature.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks.
Proceedings of the Security Protocols, 1996

On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Light-Weight Micro-cash Payment for the Internet.
Proceedings of the Computer Security, 1996

1995
An augmentation of BAN-like logics.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
On Strengthening Authentication Protocols to Foil Cryptanalysis.
Proceedings of the Computer Security, 1994

Designing Secure Key Exchange Protocols.
Proceedings of the Computer Security, 1994

Development of Authentication Protocols: Some Misconceptions and a New Approach.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

Design and Analysis of Key Exchange Protocols via Secure Channel Identification.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
On a Limitation of BAN Logic.
Proceedings of the Advances in Cryptology, 1993

Towards Formal Analysis of Security Protocols.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

1991
An Automated Proof Technique for Finite-State Machine Equivalence.
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991


  Loading...