近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
[1]Baoyuan,Kang,MuWang,Dongya,Jing,AnOff-LinePaymentSchemeforDigitalContentviaSubliminalChannel,Journalofinformationscienceandengineering,vol.34,pp.171-192(2018)[2]BaoyuanKang,DongyangShaoandJiaqiangWang,Afairelectronicpaymentsystemfordigitalcontentusingellipticcurvecryptography,JournalofAlgorithms&ComputationalTechnology,vol.12,no.1,pp.13-19,2018[3]BaoyuanKang,LinSi,HongJiang,ChunqingLi,MingmingXie,ID-BasedPublicAuditingProtocolforCloudDataIntegrityCheckingwithPrivacy-PreservingandEffectiveAggregationVerification,SecurityandCommunicationNetworks,Volume2018,ArticleID3205898,9pages,https://doi.org/10.1155/2018/3205898[4]BaoyuanKang,JiaqiangWangandDongyangShao,Certificatelesspublicauditingwithprivacypreservingforcloudassistedwirelessbodyareanetworks,Mobileinformationsystems,vol.2017,ArticleID2925465,5pages.https://doi.org/10.1155/2017/2925465[5]BaoyuanKang,JiaqiangWangandDongyangShao,Attackonprivacy-reservingpublicauditingschemesforcloudstorage,Mathematicalproblemsinengineering,vol.2017,ArticleID8062182,https://doi.org/10.1155/2017/8062182
[6]KangBaoyuan,WangMu,JingDongya,Anefficientcertificatelessaggregatesignaturescheme,Wuhanuniversityjournalofnaturalsciences,vol.22,no.2,2017,pp.165-170.[7]Kang,Baoyuan,Xu,Danhui,SecureElectronicCashSchemewithAnonymityRevocation,MobileInformationSystems,vol.2016,ArticleID2620141http://dx.doi.org/10.1155/2016/2620141[8]BaoyuanKang,DanhuiXu,Perfect-Mail:Asecuree-mailprotocolwithperfectforwardsecrecy,BritishJournalofMathematicsandComputerScience,vol.12,no.5,pp.1-11,2016[9]Kang,Baoyuan,Xu,Danhui,Asecurecertificatelessaggregatesignaturescheme,InternationalJournalofSecurityanditsApplications,vol.10,no.3,pp.55-68,2016[10]Kang,Baoyuan,Xu,Danhui,Anuntraceableoff-lineelectroniccashschemewithoutmerchantfrauds,InternationalJournalofHybridInformationTechnology,vol.9,no.1,pp.431-442,2016[11]Kang,Baoyuan,Xu,Danhui,Asecuremulti-receiverse-mailprotocol,InternationalJournalofMultimediaandUbiquitousEngineering,vol.11,no.11,pp.335-342,2016[12]BaoyuanKang,Ondelegatabilityofsomestrongdesignatedverifiersignatureschemes,Mathematicsproblemsinengineering,Volume2014,ArticleID761487,5pages,doi:10.1155/2014/761487.[13]BaoyuanKang,ColinBoyd,EdDawson,Anovelidentity-basedstrongdesignatedverifiersignaturescheme,JournalofSystemsandSoftware,vol.82,no.2,February,2009,pp.270-273[14]BaoyuanKang,ColinBoyd,EdDawson,Identity-basedstrongdesignatedverifiersignatureschemes:Attacksandnewconstruction.ComputersandElectricalEngineering,vol.35,no.1,January,2009,pp.49-53[15]BaoyuanKang,ColinBoyd,EdDawson,Anovelnonrepudiablethresholdmulti-proxymulti-signatureschemewithsharedverification.ComputersandElectricalEngineering,vol.35,no.1,January,2009,pp.9-17[16]BaoyuanKang,ID-basedaggregatesignatureschemewithconstantpairingcomputations:attackandnewconstruction,JournalofComputationalInformationSystems,vol.8,no.16,pp.6611-6618,2012[17]BaoyuanKang,DongyangShao,JiaqiangWang,ImprovedIncentive-BasedElectronicPaymentSchemeforDigitalContent,InternationalJournalofEngineeringResearchAndManagement(IJERM),vol.4,no.9,September2017[18]BaoyuanKang,AttacksonOneDesignatedVerifierProxySignatureScheme,Journalofappliedmathematics,Volume2012,ArticleID508981,6pages,doi:10.1155/2012/508981[19]BaoyuanKang,Onthesecurityofsomeaggregatesignatureschemes,Journalofappliedmathematics,Volume2012,ArticleID416137,10pages,doi:10.1155/2012/416137[20]BaoyuanKang,Newtypesofverifiablyencryptedsignatureschemes,AdvancedMaterialsResearch,vol.490-495,pp.914-918,2012,Mechatronics
andIntelligentMaterialsII[21]BaoyuanKang,JinguangHanandQingjuWang,Anewthresholdmulti-proxymulti-signaturescheme,Journalofelectronics(china),no.4,2006,pp.560-563[22]BaoyuanKang,ImprovementonLin-Wu(t,n)-thresholdverifiablemult-secretsharingscheme,ChineseJournalofEngineeringMathematics,2006(5),pp881-885.[23]BaoyuanKang,Cryptanalysisonane-votingschemeovercomputernetwork,InternationalConferenceonComputerScienceandSoftwareEngineering,vol.3,December,2008,pp.826-829.[24]BaoyuanKang,JinguangHan,OntheSecurityofBlindSignatureandPartiallyBlindSignature,20102ndInternationalConferenceonEducationTechnologyandComputer.vol.5.June,2010,pp.206-208[25]BaoyuanKang,JinguangHan,AMorePracticalandEfficientThresholdProxySignatureScheme,20102ndInternationalConferenceonEducationTechnologyandComputer.vol.5,June,2010,pp.202-205[26]BaoyuanKang,JinguangHanandQingjuWang,OntheSecurityofProxyBlindMulti-signatureSchemewithoutaSecureChannel,20102ndInternationalConferenceonComputerEngineeringandTechnology.April,2010,vol.1,pp.62-64[27]BaoyuanKang,TongLu,CryptanalysisandImprovementonKey-InsulatedSignatureScheme,20101ndInternationalConferenceonComputerandAutomationEngineering.December,2010,pp.149-151