Efficient and practical fair exchange protocols with off-line TTP F Bao, RH Deng, W Mao Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 470 | 1998 |
Variations of diffie-hellman problem F Bao, RH Deng, H Zhu International conference on information and communications security, 301-312, 2003 | 362 | 2003 |
A signcryption scheme with signature directly verifiable by public key F Bao, RH Deng International workshop on public key cryptography, 55-59, 1998 | 321 | 1998 |
Anonymous secure routing in mobile ad-hoc networks B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng 29th annual IEEE international conference on local computer networks, 102-108, 2004 | 314 | 2004 |
High-yield seedless synthesis of triangular gold nanoplates through oxidative etching L Chen, F Ji, Y Xu, L He, Y Mi, F Bao, B Sun, X Zhang, Q Zhang Nano letters 14 (12), 7201-7206, 2014 | 292 | 2014 |
Private query on encrypted data in multi-user settings F Bao, RH Deng, X Ding, Y Yang International Conference on Information Security Practice and Experience, 71-85, 2008 | 291 | 2008 |
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults F Bao, RH Deng, Y Han, A Jeng, AD Narasimhalu, T Ngair International Workshop on Security Protocols, 115-124, 1997 | 222 | 1997 |
Designated verifier signature schemes: Attacks, new security notions and a new construction H Lipmaa, G Wang, F Bao International Colloquium on Automata, Languages, and Programming, 459-471, 2005 | 187 | 2005 |
Facile, large-quantity synthesis of stable, tunable-color silicon nanoparticles and their application for long-term cellular imaging Y Zhong, X Sun, S Wang, F Peng, F Bao, Y Su, Y Li, ST Lee, Y He ACS nano 9 (6), 5958-5967, 2015 | 182 | 2015 |
Evolving privacy: From sensors to the Internet of Things J Lopez, R Rios, F Bao, G Wang Future Generation Computer Systems 75, 46-57, 2017 | 157 | 2017 |
Highly reliable trust establishment scheme in ad hoc networks K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim Computer Networks 45 (6), 687-699, 2004 | 153 | 2004 |
Security analysis of some proxy signatures G Wang, F Bao, J Zhou, RH Deng International Conference on Information Security and Cryptology, 305-319, 2003 | 134 | 2003 |
Building-damage detection using pre-and post-seismic high-resolution satellite stereo imagery: A case study of the May 2008 Wenchuan earthquake X Tong, Z Hong, S Liu, X Zhang, H Xie, Z Li, S Yang, W Wang, F Bao ISPRS Journal of Photogrammetry and Remote Sensing 68, 13-27, 2012 | 133 | 2012 |
Some remarks on a fair exchange protocol J Zhou, R Deng, F Bao International Workshop on Public Key Cryptography, 46-57, 2000 | 133 | 2000 |
Detecting node replication attacks in wireless sensor networks: a survey WT Zhu, J Zhou, RH Deng, F Bao Journal of Network and Computer Applications 35 (3), 1022-1034, 2012 | 123 | 2012 |
Efficient conditional proxy re-encryption with chosen-ciphertext security J Weng, Y Yang, Q Tang, RH Deng, F Bao International Conference on Information Security, 151-166, 2009 | 117 | 2009 |
Evolution of fair non-repudiation with TTP J Zhou, R Deng, F Bao Australasian Conference on Information Security and Privacy, 258-269, 1999 | 112 | 1999 |
A practical password-based two-server authentication and key exchange system Y Yang, RH Deng, F Bao IEEE Transactions on Dependable and Secure Computing 3 (2), 105-114, 2006 | 109 | 2006 |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao Science China Information Sciences 53 (3), 593-606, 2010 | 103 | 2010 |
Private information retrieval using trusted hardware S Wang, X Ding, RH Deng, F Bao European Symposium on Research in Computer Security, 49-64, 2006 | 99 | 2006 |