Shuhua Wu

According to our database1, Shuhua Wu authored at least 39 papers between 2006 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Research on intellisense information service oriented to value network model in smart city.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2014
On the Security of a RSA-based Certificateless Signature Scheme.
Int. J. Netw. Secur., 2014

Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014

2013
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment.
Wirel. Pers. Commun., 2013

Secure SIP authentication scheme supporting lawful interception.
Secur. Commun. Networks, 2013

Practical authentication scheme for SIP.
Peer-to-Peer Netw. Appl., 2013

Secure verifier-based three-party password-authenticated key exchange.
Peer-to-Peer Netw. Appl., 2013

Re-attack on a three-party password-based authenticated key exchange protocol.
Math. Comput. Model., 2013

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013

Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards.
Int. J. Netw. Secur., 2013

Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2013

Scalable and efficient mobile authentication scheme preserving user privacy.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Enhancements of a three-party password-based authenticated key exchange protocol.
Int. Arab J. Inf. Technol., 2013

2012
Robust smart-cards-based user authentication scheme with user anonymity.
Secur. Commun. Networks, 2012

Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Math. Comput. Model., 2012

A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Syst., 2012

An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2012

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012

Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks.
Int. J. Netw. Secur., 2012

Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service.
Int. J. Electron. Secur. Digit. Forensics, 2012

Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks.
Int. Arab J. Inf. Technol., 2012

2011
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
J. Inf. Sci. Eng., 2011

Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting.
J. Inf. Sci. Eng., 2011

A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
Int. J. Netw. Manag., 2011

Improved two-factor authenticated key exchange protocol.
Int. Arab J. Inf. Technol., 2011

2010
Comments on an Efficient Secret Broadcast in the Broadcasting Networks.
IEEE Commun. Lett., 2010

Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS.
IEEE Commun. Lett., 2010

2009
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting.
J. Networks, 2009

Efficient Solution to Password-based Key Exchange for Large Groups.
J. Networks, 2009

Efficient Hybrid Password-Based Authenticated Group Key Exchange.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

A Framework for Authenticated Key Exchange in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2009

2008
Proof of Forward Security for Password-based Authenticated Key Exchange.
Int. J. Netw. Secur., 2008

Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Forward Security for an Efficient Password-Based Authenticated Key Exchange.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Efficient Augmented Password-Based Encrypted Key Exchange Protocol.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Resource Efficient Hardware Design for RSA.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Practical Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...