default search action
Wenbo Mao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Luyu Wang, Kaifeng Zhang, Wenjun Bi, Ying Wang, Yaping Li, Wenbo Mao:
Indirect Coordinated Attack Against Relay via Load-Side Power Electronics and Its Defense Strategy. IEEE Trans. Ind. Informatics 20(4): 5112-5124 (2024) - 2023
- [i5]Wenwen Zhang, Gao Qiu, Hongjun Gao, Tingjian Liu, Junyong Liu, Yaping Li, Shengchun Yang, Jiahao Yan, Wenbo Mao:
Two stage Robust Nash Bargaining based Benefit Sharing between Electric and HCNG Distribution Networks Bridged with SOFC. CoRR abs/2310.05999 (2023) - 2021
- [i4]Wenbo Mao, Wenxiang Wang:
GoUncle: A Blockchain Of, By, For Modest Computers. IACR Cryptol. ePrint Arch. 2021: 1705 (2021) - 2020
- [i3]Wenbo Mao, Wenxiang Wang:
LotMint: Blockchain Returning to Decentralization with Decentralized Clock. IACR Cryptol. ePrint Arch. 2020: 673 (2020)
2010 – 2019
- 2014
- [c40]Haifeng Zhao, Wenbo Mao, Jiangtao Wang:
An instance selection and optimization method for multiple instance learning. SPAC 2014: 208-211 - 2013
- [c39]Wenbo Mao:
The role and effectiveness of cryptography in network virtualization: a position paper. AsiaCCS 2013: 179-182
2000 – 2009
- 2009
- [c38]Wenbo Mao:
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing. ICICS 2009: 2 - 2008
- [c37]Haibo Chen, Jun Li, Wenbo Mao:
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing. Security Protocols Workshop 2008: 107-114 - [c36]Wenbo Mao:
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion). Security Protocols Workshop 2008: 115-117 - 2007
- [j4]Haibo Chen, Jieyun Chen, Wenbo Mao, Fei Yan:
Daonity - Grid security from two levels of virtualization. Inf. Secur. Tech. Rep. 12(3): 123-138 (2007) - [c35]Wenbo Mao, Fei Yan, Chuanjiang Yi, Haibo Chen:
Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment. Security Protocols Workshop 2007: 204-221 - 2006
- [c34]Wenbo Mao, Fei Yan, Chunrun Chen:
Daonity: grid security with behaviour conformity from trusted computing. STC 2006: 43-46 - [c33]Wenbo Mao, Andrew P. Martin, Hai Jin, Huanguo Zhang:
Innovations for Grid Security from Trusted Computing. Security Protocols Workshop 2006: 132-149 - [c32]Wenbo Mao:
Innovations for Grid Security from Trusted Computing. Security Protocols Workshop 2006: 150-152 - 2005
- [j3]Wenbo Mao:
A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols. Comput. Stand. Interfaces 27(5): 479-488 (2005) - [j2]Colin Boyd, Wenbo Mao:
Preface to the special issue on ISC 2003. Int. J. Inf. Sec. 4(4): 227-227 (2005) - [c31]Liqun Chen, Hoon Wei Lim, Wenbo Mao:
User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156 - [e2]Sihan Qing, Wenbo Mao, Javier López, Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9 [contents] - 2004
- [c30]Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Key Agreement Using Statically Keyed Authenticators. ACNS 2004: 248-262 - 2003
- [c29]Steven D. Galbraith, Wenbo Mao:
Invisibility and Anonymity of Undeniable and Confirmer Signatures. CT-RSA 2003: 80-97 - [c28]John Malone-Lee, Wenbo Mao:
Two Birds One Stone: Signcryption Using RSA. CT-RSA 2003: 211-225 - [c27]Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Deniable Authenticated Key Establishment for Internet Protocols. Security Protocols Workshop 2003: 255-271 - [c26]Wenbo Mao:
Deniable Authenticated Key Establishment for Internet Protocols (Discussion). Security Protocols Workshop 2003: 272-273 - [e1]Colin Boyd, Wenbo Mao:
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. Lecture Notes in Computer Science 2851, Springer 2003, ISBN 3-540-20176-9 [contents] - 2002
- [c25]Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson:
RSA-Based Undeniable Signatures for General Moduli. CT-RSA 2002: 200-217 - [c24]Wenbo Mao:
A Structured Operational Modelling of the Dolev-Yao Threat Model. Security Protocols Workshop 2002: 34-46 - 2001
- [j1]Wenbo Mao:
Verifiable Partial Escrow of Integer Factors. Des. Codes Cryptogr. 24(3): 327-342 (2001) - [c23]Liqun Chen, Wenbo Mao:
An Auditable Metering Scheme for Web Advertisement Applications. ISC 2001: 475-485 - [c22]Wenbo Mao:
Timed-Release Cryptography. Selected Areas in Cryptography 2001: 342-358 - [i2]Wenbo Mao:
New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation. IACR Cryptol. ePrint Arch. 2001: 11 (2001) - [i1]Wenbo Mao:
Timed-Release Cryptography. IACR Cryptol. ePrint Arch. 2001: 14 (2001) - 2000
- [c21]Wenbo Mao:
Short Certification of Secure RSA Modulus (Transcript of Discussion). Security Protocols Workshop 2000: 234-237
1990 – 1999
- 1999
- [c20]Wenbo Mao:
Send Message into a Definite Future. ICICS 1999: 244-251 - [c19]Wenbo Mao:
Time-Lock Puzzle with Examinable Evidence of Unlocking Time. Security Protocols Workshop 1999: 95-102 - 1998
- [c18]Wenbo Mao, Chae Hoon Lim:
Cryptanalysis in Prime Order Subgroups of Z*n. ASIACRYPT 1998: 214-226 - [c17]Wenbo Mao:
Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. Public Key Cryptography 1998: 60-71 - [c16]Wenbo Mao:
Verifiable Partial Sharing of Integer Fractions. Selected Areas in Cryptography 1998: 94-105 - [c15]Feng Bao, Robert H. Deng, Wenbo Mao:
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. S&P 1998: 77-85 - [c14]Wenbo Mao:
Necessity and Realization of Universally Verifiable Secret Sharing. S&P 1998: 208-214 - 1997
- [c13]Wenbo Mao:
Verifiable Escrowed Signature. ACISP 1997: 240-248 - [c12]Wenbo Mao:
Publicly verifiable partial key escrow. ICICS 1997: 409-413 - 1996
- [c11]Wenbo Mao:
Light-Weight Micro-cash Payment for the Internet. ESORICS 1996: 15-32 - [c10]Wenbo Mao:
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. S&P 1996: 201-210 - [c9]Wenbo Mao:
On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks. Security Protocols Workshop 1996: 1-17 - 1995
- [c8]Wenbo Mao:
An augmentation of BAN-like logics. CSFW 1995: 44- - 1994
- [c7]Colin Boyd, Wenbo Mao:
Design and Analysis of Key Exchange Protocols via Secure Channel Identification. ASIACRYPT 1994: 171-181 - [c6]Wenbo Mao, Colin Boyd:
Development of Authentication Protocols: Some Misconceptions and a New Approach. CSFW 1994: 178-186 - [c5]Colin Boyd, Wenbo Mao:
Designing Secure Key Exchange Protocols. ESORICS 1994: 93-105 - [c4]Wenbo Mao, Colin Boyd:
On Strengthening Authentication Protocols to Foil Cryptanalysis. ESORICS 1994: 193-204 - 1993
- [c3]Wenbo Mao, Colin Boyd:
Towards Formal Analysis of Security Protocols. CSFW 1993: 147-158 - [c2]Colin Boyd, Wenbo Mao:
On a Limitation of BAN Logic. EUROCRYPT 1993: 240-247 - 1991
- [c1]Wenbo Mao, George J. Milne:
An Automated Proof Technique for Finite-State Machine Equivalence. CAV 1991: 233-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint