dblp: Wen Tao Zhu
https://dblp.org/pid/52/2707.html
dblp person page RSS feedMon, 07 Oct 2024 21:26:12 +0200en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Wen Tao Zhuhttps://dblp.org/pid/52/2707.html144515G evolution promoting innovation of antenna systems.https://doi.org/10.1631/FITEE.1900561Feng Gao, Peng Gao, Wen-Tao Zhu, Chenxi Zhang, Xian-kun Meng, Run-hong Shan: 5G evolution promoting innovation of antenna systems.Frontiers Inf. Technol. Electron. Eng.21(1): 188-194 (2020)]]>https://dblp.org/rec/journals/jzusc/GaoGZZMS20Wed, 01 Jan 2020 00:00:00 +0100Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.https://doi.org/10.1109/TDSC.2017.2685382Xiao Lan, Jing Xu, Zhenfeng Zhang, Wen-Tao Zhu: Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.IEEE Trans. Dependable Secur. Comput.16(2): 272-286 (2019)]]>https://dblp.org/rec/journals/tdsc/LanXZZ19Tue, 01 Jan 2019 00:00:00 +0100User-friendly deniable storage for mobile devices.https://doi.org/10.1016/j.cose.2017.09.005Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang: User-friendly deniable storage for mobile devices.Comput. Secur.72: 163-174 (2018)]]>https://dblp.org/rec/journals/compsec/ChangCCZZLW18Mon, 01 Jan 2018 00:00:00 +0100Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.https://doi.org/10.1186/s42400-018-0009-4Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng: Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.Cybersecur.1(1): 7 (2018)]]>https://dblp.org/rec/journals/cybersec/ChangLWZD18Mon, 01 Jan 2018 00:00:00 +0100Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.https://doi.org/10.1109/CNS.2018.8433195Shiran Pan, Fangyu Zheng, Wen Tao Zhu, Qiongxiao Wang: Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.CNS2018: 1-9]]>https://dblp.org/rec/conf/cns/PanZZW18Mon, 01 Jan 2018 00:00:00 +0100SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals.https://doi.org/10.1109/CNS.2018.8433202Mingyue Wang, Wen-Tao Zhu, Shen Yan, Qiongxiao Wang: SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals.CNS2018: 1-9]]>https://dblp.org/rec/conf/cns/WangZYW18Mon, 01 Jan 2018 00:00:00 +0100MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.https://doi.org/10.1109/DSN.2018.00054Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching: MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.DSN2018: 454-465]]>https://dblp.org/rec/conf/dsn/ChangZCLZTWC18Mon, 01 Jan 2018 00:00:00 +0100Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.https://doi.org/10.1007/978-3-030-01701-9_29Shiran Pan, Wen-Tao Zhu, Qiongxiao Wang, Bing Chang: Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.SecureComm (1)2018: 529-548]]>https://dblp.org/rec/conf/securecomm/PanZWC18Mon, 01 Jan 2018 00:00:00 +0100EvoPass: Evolvable graphical password against shoulder-surfing attacks.https://doi.org/10.1016/j.cose.2017.05.006Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song: EvoPass: Evolvable graphical password against shoulder-surfing attacks.Comput. Secur.70: 179-198 (2017)]]>https://dblp.org/rec/journals/compsec/YuWLLZS17Sun, 01 Jan 2017 00:00:00 +0100An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.https://doi.org/10.1109/TIFS.2016.2603974Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu, Jiwu Jing: An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.IEEE Trans. Inf. Forensics Secur.12(1): 111-122 (2017)]]>https://dblp.org/rec/journals/tifs/PanZZZJ17Sun, 01 Jan 2017 00:00:00 +0100Employing Smartwatch for Enhanced Password Authentication.https://doi.org/10.1007/978-3-319-60033-8_59Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang: Employing Smartwatch for Enhanced Password Authentication.WASA2017: 691-703]]>https://dblp.org/rec/conf/wasa/ChangLLWZW17Sun, 01 Jan 2017 00:00:00 +0100A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.http://eprint.iacr.org/2017/105Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan: A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.IACR Cryptol. ePrint Arch.2017: 105 (2017)]]>https://dblp.org/rec/journals/iacr/YangFLZWYP17Sun, 01 Jan 2017 00:00:00 +0100PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.https://doi.org/10.1016/j.cose.2016.07.004Zhiguo Wan, Wen Tao Zhu, Guilin Wang: PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.Comput. Secur.62: 246-256 (2016)]]>https://dblp.org/rec/journals/compsec/WanZW16Fri, 01 Jan 2016 00:00:00 +0100Generating Correlated Digital Certificates: Framework and Applications.https://doi.org/10.1109/TIFS.2016.2516818Wen Tao Zhu, Jingqiang Lin: Generating Correlated Digital Certificates: Framework and Applications.IEEE Trans. Inf. Forensics Secur.11(6): 1117-1127 (2016)]]>https://dblp.org/rec/journals/tifs/ZhuL16Fri, 01 Jan 2016 00:00:00 +0100Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy.https://doi.org/10.1007/978-3-319-40253-6_9Shen Yan, Shiran Pan, Yuhang Zhao, Wen Tao Zhu: Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy.ACISP (1)2016: 141-157]]>https://dblp.org/rec/conf/acisp/YanPZZ16Fri, 01 Jan 2016 00:00:00 +0100Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes.https://doi.org/10.1007/978-3-319-40367-0_29Shiran Pan, Shen Yan, Wen Tao Zhu: Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes.ACISP (2)2016: 446-453]]>https://dblp.org/rec/conf/acisp/PanYZ16Fri, 01 Jan 2016 00:00:00 +0100Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.https://doi.org/10.1145/2897845.2897901Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu: Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.AsiaCCS2016: 629-640]]>https://dblp.org/rec/conf/ccs/GuanSWZ16Fri, 01 Jan 2016 00:00:00 +0100DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.https://doi.org/10.1007/978-3-319-50011-9_27Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen: DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.ICICS2016: 347-357]]>https://dblp.org/rec/conf/icics/YanPZC16Fri, 01 Jan 2016 00:00:00 +0100A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.https://doi.org/10.1007/978-3-319-59608-2_23Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan: A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.SecureComm2016: 392-411]]>https://dblp.org/rec/conf/securecomm/YangFLZWYP16Fri, 01 Jan 2016 00:00:00 +0100RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.https://doi.org/10.1049/iet-ifs.2013.0552Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao: RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.IET Inf. Secur.9(2): 136-147 (2015)]]>https://dblp.org/rec/journals/iet-ifs/LinZWZJG15Thu, 01 Jan 2015 00:00:00 +0100WAVE: Secure Wireless Pairing Exploiting Human Body Movements.https://doi.org/10.1109/Trustcom.2015.512Wei Wang, Zhan Wang, Wen Tao Zhu, Lei Wang: WAVE: Secure Wireless Pairing Exploiting Human Body Movements.TrustCom/BigDataSE/ISPA (1)2015: 1243-1248]]>https://dblp.org/rec/conf/trustcom/WangWZW15Thu, 01 Jan 2015 00:00:00 +0100Publishing and sharing encrypted data with potential friends in online social networks.https://doi.org/10.1002/sec.806Huimin Shuai, Wen Tao Zhu, Xin Liu: Publishing and sharing encrypted data with potential friends in online social networks.Secur. Commun. Networks7(2): 409-421 (2014)]]>https://dblp.org/rec/journals/scn/ShuaiZL14Wed, 01 Jan 2014 00:00:00 +0100Remotely wiping sensitive data on stolen smartphones.https://doi.org/10.1145/2590296.2590318Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing: Remotely wiping sensitive data on stolen smartphones.AsiaCCS2014: 537-542]]>https://dblp.org/rec/conf/ccs/YuWSZGJ14Wed, 01 Jan 2014 00:00:00 +0100MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.https://doi.org/10.1007/978-3-319-13257-0_36Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing: MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.ISC2014: 555-567]]>https://dblp.org/rec/conf/isw/YuCWCZJ14Wed, 01 Jan 2014 00:00:00 +0100A Generic Framework for Anonymous Authentication in Mobile Networks.https://doi.org/10.1007/s11390-013-1371-zJing Xu, Wen Tao Zhu: A Generic Framework for Anonymous Authentication in Mobile Networks.J. Comput. Sci. Technol.28(4): 732-742 (2013)]]>https://dblp.org/rec/journals/jcst/XuZ13Tue, 01 Jan 2013 00:00:00 +0100Towards secure and communication-efficient broadcast encryption systems.https://doi.org/10.1016/j.jnca.2012.09.007Wen Tao Zhu: Towards secure and communication-efficient broadcast encryption systems.J. Netw. Comput. Appl.36(1): 178-186 (2013)]]>https://dblp.org/rec/journals/jnca/Zhu13Tue, 01 Jan 2013 00:00:00 +0100Security Concerns in Popular Cloud Storage Services.https://doi.org/10.1109/MPRV.2013.72Cheng-Kang Chu, Wen Tao Zhu, Jin Han, Joseph K. Liu, Jia Xu, Jianying Zhou: Security Concerns in Popular Cloud Storage Services.IEEE Pervasive Comput.12(4): 50-57 (2013)]]>https://dblp.org/rec/journals/pervasive/ChuZHLXZ13Tue, 01 Jan 2013 00:00:00 +0100Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.https://doi.org/10.1007/978-3-319-03584-0_6Baosheng Ge, Wen Tao Zhu: Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.CSS2013: 67-80]]>https://dblp.org/rec/conf/css/GeZ13Tue, 01 Jan 2013 00:00:00 +0100Detecting node replication attacks in wireless sensor networks: A survey.https://doi.org/10.1016/j.jnca.2012.01.002Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao: Detecting node replication attacks in wireless sensor networks: A survey.J. Netw. Comput. Appl.35(3): 1022-1034 (2012)]]>https://dblp.org/rec/journals/jnca/ZhuZDB12Sun, 01 Jan 2012 00:00:00 +0100Detecting node replication attacks in mobile sensor networks: theory and approaches.https://doi.org/10.1002/sec.338Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao: Detecting node replication attacks in mobile sensor networks: theory and approaches.Secur. Commun. Networks5(5): 496-507 (2012)]]>https://dblp.org/rec/journals/scn/ZhuZDB12Sun, 01 Jan 2012 00:00:00 +0100A Comment on "MABS: Multicast Authentication Based on Batch Signature".https://doi.org/10.1109/TMC.2012.119Wen Tao Zhu: A Comment on "MABS: Multicast Authentication Based on Batch Signature".IEEE Trans. Mob. Comput.11(11): 1775-1776 (2012)]]>https://dblp.org/rec/journals/tmc/Zhu12Sun, 01 Jan 2012 00:00:00 +0100F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.https://doi.org/10.1007/978-3-642-34129-8_40Huimin Shuai, Wen Tao Zhu: F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.ICICS2012: 416-426]]>https://dblp.org/rec/conf/icics/ShuaiZ12Sun, 01 Jan 2012 00:00:00 +0100Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks.https://doi.org/10.1007/978-3-642-34601-9_38Huimin Shuai, Wen Tao Zhu: Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks.NSS2012: 503-515]]>https://dblp.org/rec/conf/nss/ShuaiZ12Sun, 01 Jan 2012 00:00:00 +0100An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.https://doi.org/10.1016/j.comcom.2010.04.041Jing Xu, Wen Tao Zhu, Dengguo Feng: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.Comput. Commun.34(3): 319-325 (2011)]]>https://dblp.org/rec/journals/comcom/XuZF11Sat, 01 Jan 2011 00:00:00 +0100A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card.https://doi.org/10.1002/cpe.1616Jing Xu, Wen Tao Zhu, Wenting Jin: A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card.Concurr. Comput. Pract. Exp.23(12): 1386-1398 (2011)]]>https://dblp.org/rec/journals/concurrency/XuZJ11Sat, 01 Jan 2011 00:00:00 +0100A secure and efficient data aggregation scheme for wireless sensor networks.https://doi.org/10.1002/cpe.1615Wen Tao Zhu, Fei Gao, Yang Xiang: A secure and efficient data aggregation scheme for wireless sensor networks.Concurr. Comput. Pract. Exp.23(12): 1414-1430 (2011)]]>https://dblp.org/rec/journals/concurrency/ZhuGX11Sat, 01 Jan 2011 00:00:00 +0100Secure localization with attack detection in wireless sensor networks.https://doi.org/10.1007/s10207-011-0127-4Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao: Secure localization with attack detection in wireless sensor networks.Int. J. Inf. Sec.10(3): 155-171 (2011)]]>https://dblp.org/rec/journals/ijisec/ZhuXZDB11Sat, 01 Jan 2011 00:00:00 +0100Secure mobile subscription of sensor-encrypted data.https://doi.org/10.1145/1966913.1966943Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng: Secure mobile subscription of sensor-encrypted data.AsiaCCS2011: 228-237]]>https://dblp.org/rec/conf/ccs/ChuZCZD11Sat, 01 Jan 2011 00:00:00 +0100Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.https://doi.org/10.1007/978-3-642-25243-3_25Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao: Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.ICICS2011: 306-318]]>https://dblp.org/rec/conf/icics/ZhuDZB11Sat, 01 Jan 2011 00:00:00 +0100A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.https://dblp.org/pid/52/2707.htmlJing Xu, Wen Tao Zhu, Dengguo Feng: A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.SECRYPT2011: 269-274]]>https://dblp.org/rec/conf/secrypt/XuZF11Sat, 01 Jan 2011 00:00:00 +0100Time-Bound Hierarchical Key Assignment: An Overview.https://doi.org/10.1587/transinf.E93.D.1044Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao: Time-Bound Hierarchical Key Assignment: An Overview.IEICE Trans. Inf. Syst.93-D(5): 1044-1052 (2010)]]>https://dblp.org/rec/journals/ieicet/ZhuDZB10Fri, 01 Jan 2010 00:00:00 +0100New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.https://doi.org/10.1007/s11390-010-9366-5Junzuo Lai, Wen Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou: New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.J. Comput. Sci. Technol.25(4): 793-806 (2010)]]>https://dblp.org/rec/journals/jcst/LaiZDLK10Fri, 01 Jan 2010 00:00:00 +0100Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation.https://doi.org/10.1007/978-3-642-16355-5_22Wenbo Yang, Wen Tao Zhu: Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation.UIC2010: 252-266]]>https://dblp.org/rec/conf/uic/YangZ10Fri, 01 Jan 2010 00:00:00 +0100An improved smart card based password authentication scheme with provable security.https://doi.org/10.1016/j.csi.2008.09.006Jing Xu, Wen Tao Zhu, Dengguo Feng: An improved smart card based password authentication scheme with provable security.Comput. Stand. Interfaces31(4): 723-728 (2009)]]>https://dblp.org/rec/journals/csi/XuZF09Thu, 01 Jan 2009 00:00:00 +0100Propagation of active worms: A survey.https://dblp.org/pid/52/2707.htmlYang Xiang, Xiang Fan, Wen Tao Zhu: Propagation of active worms: A survey.Comput. Syst. Sci. Eng.24(3) (2009)]]>https://dblp.org/rec/journals/csse/XiangFZ09Thu, 01 Jan 2009 00:00:00 +0100Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast.https://doi.org/10.1109/TMM.2009.2012920Wen Tao Zhu: Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast.IEEE Trans. Multim.11(3): 556-561 (2009)]]>https://dblp.org/rec/journals/tmm/Zhu09Thu, 01 Jan 2009 00:00:00 +0100Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks.https://doi.org/10.1007/978-3-642-02704-8_13Wen Tao Zhu, Yang Xiang: Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks.ATC2009: 164-178]]>https://dblp.org/rec/conf/atc/ZhuX09Thu, 01 Jan 2009 00:00:00 +0100Security of the redefined Liaw's broadcasting cryptosystem.https://doi.org/10.1016/j.camwa.2008.03.025Wen Tao Zhu, Chuan-Kun Wu: Security of the redefined Liaw's broadcasting cryptosystem.Comput. Math. Appl.56(7): 1665-1667 (2008)]]>https://dblp.org/rec/journals/cma/ZhuW08Tue, 01 Jan 2008 00:00:00 +0100A Cost-Efficient Secure Multimedia Proxy System.https://doi.org/10.1109/TMM.2008.2001376Wen Tao Zhu: A Cost-Efficient Secure Multimedia Proxy System.IEEE Trans. Multim.10(6): 1214-1220 (2008)]]>https://dblp.org/rec/journals/tmm/Zhu08Tue, 01 Jan 2008 00:00:00 +0100General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach.https://doi.org/10.1109/ICC.2008.313Wen Tao Zhu: General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach.ICC2008: 1620-1624]]>https://dblp.org/rec/conf/icc/Zhu08Tue, 01 Jan 2008 00:00:00 +0100Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem.https://doi.org/10.1109/NPC.2008.29Wen Tao Zhu: Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem.NPC Workshops2008: 11-17]]>https://dblp.org/rec/conf/npc/Zhu08Tue, 01 Jan 2008 00:00:00 +0100A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks.https://doi.org/10.1109/NPC.2008.31Fei Gao, Wen Tao Zhu: A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks.NPC Workshops2008: 103-110]]>https://dblp.org/rec/conf/npc/GaoZ08Tue, 01 Jan 2008 00:00:00 +0100Remarks on a Hypersphere Oriented Multiparty Key Agreement Protocol.https://doi.org/10.1109/WCNC.2007.503Wen Tao Zhu: Remarks on a Hypersphere Oriented Multiparty Key Agreement Protocol.WCNC2007: 2709-2713]]>https://dblp.org/rec/conf/wcnc/Zhu07Mon, 01 Jan 2007 00:00:00 +0100Optimizing the tree structure in secure multicast key management.https://doi.org/10.1109/LCOMM.2005.1431177Wen Tao Zhu: Optimizing the tree structure in secure multicast key management.IEEE Commun. Lett.9(5): 477-479 (2005)]]>https://dblp.org/rec/journals/icl/Zhu05Sat, 01 Jan 2005 00:00:00 +0100Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.https://doi.org/10.1007/11599371_4Wen Tao Zhu: Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.CANS2005: 35-48]]>https://dblp.org/rec/conf/cans/Zhu05Sat, 01 Jan 2005 00:00:00 +0100Rethinking of Iolus: Constructing the Secure Multicast Infrastructure.https://doi.org/10.1007/978-3-540-25978-7_90Wen Tao Zhu, Jinsheng Li, Peilin Hong: Rethinking of Iolus: Constructing the Secure Multicast Infrastructure.ICOIN2004: 895-904]]>https://dblp.org/rec/conf/icoin/ZhuLH04Thu, 01 Jan 2004 00:00:00 +0100