Wenbo Mao
Orcid: 0009-0004-8409-7045
According to our database1,
Wenbo Mao
authored at least 49 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Indirect Coordinated Attack Against Relay via Load-Side Power Electronics and Its Defense Strategy.
IEEE Trans. Ind. Informatics, April, 2024
2023
Two stage Robust Nash Bargaining based Benefit Sharing between Electric and HCNG Distribution Networks Bridged with SOFC.
CoRR, 2023
2021
2020
IACR Cryptol. ePrint Arch., 2020
2014
Proceedings of the Proceedings IEEE International Conference on Security, 2014
2013
The role and effectiveness of cryptography in network virtualization: a position paper.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing.
Proceedings of the Security Protocols XVI, 2008
2007
Inf. Secur. Tech. Rep., 2007
Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment.
Proceedings of the Security Protocols, 2007
2006
Proceedings of the Security Protocols, 2006
Proceedings of the Security Protocols, 2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
2005
A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols.
Comput. Stand. Interfaces, 2005
Proceedings of the Security Protocols, 2005
2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Security Protocols, 2002
Proceedings of the Topics in Cryptology, 2002
2001
New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation.
IACR Cryptol. ePrint Arch., 2001
Verifiable Partial Escrow of Integer Factors.
Des. Codes Cryptogr., 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
Proceedings of the Security Protocols, 2000
1999
Proceedings of the Security Protocols, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks.
Proceedings of the Security Protocols, 1996
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Computer Security, 1996
1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1994
Proceedings of the Computer Security, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
1991
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991