On the anonymity of some authentication schemes for wireless communications P Zeng, Z Cao, KKR Choo, S Wang IEEE Communications Letters 13 (3), 170-171, 2009 | 76 | 2009 |
Efficient certificateless authenticated key agreement protocol from pairings W Shengbao, C Zhenfu, W Licheng Wuhan University Journal of Natural Sciences 11 (5), 1278-1282, 2006 | 76 | 2006 |
An improved identity-based key agreement protocol and its security proof S Wang, Z Cao, KKR Choo, L Wang Information Sciences 179 (3), 307-318, 2009 | 70 | 2009 |
Efficient certificateless authentication and key agreement (CL-AK) for grid computing. S Wang, Z Cao, H Bao Int. J. Netw. Secur. 7 (3), 342-347, 2008 | 58 | 2008 |
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol S Wang, Z Cao, MA Strangio, L Wang IEEE Communications Letters 12 (2), 2008 | 54 | 2008 |
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol S Wu, Q Pu, S Wang, D He Information Sciences 215, 83-96, 2012 | 39 | 2012 |
Provably secure identity-based authenticated key agreement protocols in the standard model [J] W Shengbao, C Zhenfu, D Xiaolei CHINESE JOURNAL OF COMPUTERS 10 (30), 1842-1852, 2007 | 39* | 2007 |
Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care Q Xie, W Liu, S Wang, L Han, B Hu, T Wu Journal of medical systems 38, 1-10, 2014 | 38 | 2014 |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode S Wang, Z Cao, Z Cheng, KKR Choo Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009 | 37 | 2009 |
Formalized security model of multi-proxy signature schemes Q Wang, Z Cao, S Wang The Fifth International Conference on Computer and Information Technology …, 2005 | 30 | 2005 |
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems L Han, X Tan, S Wang, X Liang Peer-to-peer Networking and Applications 11, 63-73, 2018 | 29 | 2018 |
Breaking and repairing the certificateless key agreement protocol from ASIAN 2006 L Xia, S Wang, J Shen, G Xu Wuhan University Journal of Natural Sciences 13 (5), 562-566, 2008 | 28 | 2008 |
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy. S Wang, Z Cao, F Cao Int. J. Netw. Secur. 7 (2), 181-186, 2008 | 25 | 2008 |
Identity-based threshold proxy signature scheme with known signers H Bao, Z Cao, S Wang International Conference on Theory and Applications of Models of Computation …, 2006 | 25 | 2006 |
Improvement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification H Bao, Z Cao, S Wang Applied Mathematics and Computation 169 (2), 1419-1430, 2005 | 24 | 2005 |
An improved authenticated key agreement protocol for telecare medicine information system W Liu, Q Xie, S Wang, B Hu SpringerPlus 5, 1-16, 2016 | 23 | 2016 |
Practical identity-based encryption (IBE) in multiple PKG environments and its applications S Wang arXiv preprint cs/0703106, 2007 | 22 | 2007 |
Security weakness in a dynamic program update protocol for wireless sensor networks P Zeng, Z Cao, KK Choo, S Wang IEEE Communications Letters 13 (6), 426-428, 2009 | 19 | 2009 |
Certificateless signature scheme without bilinear pairings SB Wang, WH Liu, Q Xie Journal of China Institute of Communications 33 (4), 93-98, 2012 | 18 | 2012 |
A new id-based deniable authentication protocol R Lu, Z Cao, S Wang, H Bao Informatica 18 (1), 67-78, 2007 | 16 | 2007 |