Login / Signup
Qiong Pu
Publication Activity (10 Years)
Years Active: 2006-2013
Publications (10 Years): 0
Top Topics
Tampering Detection
Authentication Scheme
Key Exchange
Online Marketplaces
Top Venues
Secur. Commun. Networks
Peer-to-Peer Netw. Appl.
Int. J. Ad Hoc Ubiquitous Comput.
Int. J. Electron. Secur. Digit. Forensics
</>
Publications
</>
Qiong Pu
,
Jian Wang
,
Shuhua Wu
Scalable and efficient mobile authentication scheme preserving user privacy.
Int. J. Ad Hoc Ubiquitous Comput.
12 (2) (2013)
Qiong Pu
,
Jian Wang
,
Shuhua Wu
,
Ji Fu
Secure verifier-based three-party password-authenticated key exchange.
Peer-to-Peer Netw. Appl.
6 (1) (2013)
Shuhua Wu
,
Kefei Chen
,
Qiong Pu
,
Yuefei Zhu
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst.
26 (5) (2013)
Qiong Pu
,
Jian Wang
,
Shuhua Wu
Secure SIP authentication scheme supporting lawful interception.
Secur. Commun. Networks
6 (3) (2013)
Li Wei
,
Yongtao Yao
,
Zhijun Ding
,
Qiong Pu
Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks.
Ad Hoc Sens. Wirel. Networks
17 (3-4) (2013)
Shuhua Wu
,
Qiong Pu
,
Fei Kang
Practical authentication scheme for SIP.
Peer-to-Peer Netw. Appl.
6 (1) (2013)
Qiong Pu
,
Shuhua Wu
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks.
Int. Arab J. Inf. Technol.
9 (6) (2012)
Yichen Wang
,
Qiong Pu
,
Shuhua Wu
Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service.
Int. J. Electron. Secur. Digit. Forensics
4 (4) (2012)
Qiong Pu
,
Jian Wang
,
Rongyong Zhao
Strong Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst.
36 (4) (2012)
Shuhua Wu
,
Qiong Pu
,
Shengbao Wang
,
Debiao He
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci.
215 (2012)
Shuhua Wu
,
Yuefei Zhu
,
Qiong Pu
Robust smart-cards-based user authentication scheme with user anonymity.
Secur. Commun. Networks
5 (2) (2012)
Shuhua Wu
,
Qiong Pu
Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks.
Int. J. Netw. Secur.
14 (1) (2012)
Shuhua Wu
,
Yuefei Zhu
,
Qiong Pu
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
J. Inf. Sci. Eng.
27 (4) (2011)
Shuhua Wu
,
Yuefei Zhu
,
Qiong Pu
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
Int. J. Netw. Manag.
21 (5) (2011)
Shuhua Wu
,
Yuefei Zhu
,
Qiong Pu
Comments on an Efficient Secret Broadcast in the Broadcasting Networks.
IEEE Commun. Lett.
14 (7) (2010)
Shuhua Wu
,
Yuefei Zhu
,
Qiong Pu
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS.
IEEE Commun. Lett.
14 (4) (2010)
Qiong Pu
,
Xiuying Zhao
Montgomery Exponentiation with No Final Comparisons: Improved Results.
PACCS
(2009)
Qiong Pu
,
Jianmin Ding
Paradox Stems from the Security Model or the Security Proof?.
ISCSCT (1)
(2008)
Shuhua Wu
,
Yuefei Zhu
,
Qiong Pu
Resource Efficient Hardware Design for RSA.
IMSCCS (2)
(2006)