Zuhua Shao
According to our database1,
Zuhua Shao
authored at least 43 papers
between 2001 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
2002
2004
2006
2008
2010
2012
2014
2016
0
1
2
3
4
5
6
7
8
9
1
3
1
1
1
4
4
4
2
3
6
4
4
1
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Secur. Commun. Networks, 2016
2015
IET Inf. Secur., 2015
Fundam. Informaticae, 2015
Trans. Emerg. Telecommun. Technol., 2015
2014
2012
Ann. des Télécommunications, 2012
2011
2010
Informatica (Slovenia), 2010
IACR Cryptol. ePrint Arch., 2010
Fundam. Informaticae, 2010
Comput. Electr. Eng., 2010
2009
Comput. Electr. Eng., 2009
Comput. Electr. Eng., 2009
2008
Comput. Commun., 2008
Comput. Networks, 2008
2007
Inf. Sci., 2007
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
Proceedings of the Information Security Practice and Experience, 2007
2006
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys.
Informatica, 2006
Int. J. Netw. Secur., 2006
2005
Int. J. Netw. Secur., 2005
Security of a new digital signature scheme based on factoring and discrete logarithms.
Int. J. Comput. Math., 2005
Security of meta-He digital signature scheme based on factoring and discrete logarithms.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the Advances in Web-Age Information Management, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2004
Efficient deniable authentication protocol based on generalized ElGamal signature scheme.
Comput. Stand. Interfaces, 2004
Improvement of digital signature with message recovery using self-certified public keys and its variants.
Appl. Math. Comput., 2004
2003
Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers".
Inf. Process. Lett., 2003
IACR Cryptol. ePrint Arch., 2003
Security of robust generalized MQV key agreement protocol without using one-way hash functions.
Comput. Stand. Interfaces, 2003
2001