A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext. B Meng J. Networks 4 (5), 370-377, 2009 | 46 | 2009 |
A fair non-repudiation protocol B Meng, S Wang, Q Xiong The 7th International Conference on Computer Supported Cooperative Work in …, 2002 | 37 | 2002 |
A critical review of receipt-freeness and coercion-resistance B Meng Information Technology Journal 8 (7), 934-964, 2009 | 27 | 2009 |
A receiver deniable encryption scheme B Meng, JQ Wang Proceedings. The 2009 International Symposium on Information Processing …, 2009 | 26 | 2009 |
An efficient receiver deniable encryption scheme and its applications B Meng, JQ Wang Journal of Networks 5 (6), 683, 2010 | 25 | 2010 |
An internet voting protocol with receipt-free and coercion-resistant B Meng 7th IEEE International Conference on Computer and Information Technology …, 2007 | 24 | 2007 |
Research on electronic payment model B Meng, Q Xiong 8th International Conference on Computer Supported Cooperative Work in …, 2004 | 24 | 2004 |
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme. B Meng, Z Li, J Qin J. Softw. 5 (9), 942-949, 2010 | 13 | 2010 |
A secure and efficient distributed storage scheme SAONT-RS based on an improved AONT and erasure coding L Yao, J Lu, J Liu, D Wang, B Meng IEEE Access 6, 55126-55138, 2018 | 12 | 2018 |
A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol B Meng Information Technology Journal 8 (3), 302-309, 2009 | 12 | 2009 |
Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model X Xu, L Niu, B Meng Information Technology Journal 12 (12), 2273, 2013 | 9 | 2013 |
A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model B Meng Information Technology Journal 10 (6), 1068-1091, 2011 | 9 | 2011 |
A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol. B Meng J. Comput. 4 (3), 184-192, 2009 | 9 | 2009 |
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology BM Xudong HE, Jiabing LIU, Chin-Tser HUANG, Dejun WANG IEEE access 7, 131050-131067, 2019 | 8 | 2019 |
Formal analysis of key properties in the Internet voting protocol using applied PI calculus B Meng Information Technology Journal 7 (8), 1130-1140, 2008 | 8 | 2008 |
A Security Analysis Method for Security Protocol Implementations Based on Message Construction Jintian Lu , Lili Yao , Xudong He , Chintser Huang , Dejun Wang, Bo Meng Applied Sciences 8 (12), 2018 | 7 | 2018 |
Automatic verification of security of openid connect protocol with proverif J Lu, J Zhang, J Li, Z Wan, B Meng Advances on P2P, Parallel, Grid, Cloud and Internet Computing: Proceedings …, 2017 | 7 | 2017 |
Analyzing and improving internet voting protocol B Meng IEEE International Conference on e-Business Engineering (ICEBE'07), 351-354, 2007 | 7 | 2007 |
Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover. B Meng, W Huang, Z Li J. Comput. 8 (7), 1728-1741, 2013 | 6 | 2013 |
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model. B Meng, W Huang, D Wang J. Networks 6 (9), 1262-1271, 2011 | 6 | 2011 |