Follow
Bo Meng
Bo Meng
Professor of Computer Science,South-Central Minzu University
Verified email at mail.scuec.edu.cn - Homepage
Title
Cited by
Cited by
Year
A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext.
B Meng
J. Networks 4 (5), 370-377, 2009
462009
A fair non-repudiation protocol
B Meng, S Wang, Q Xiong
The 7th International Conference on Computer Supported Cooperative Work in …, 2002
372002
A critical review of receipt-freeness and coercion-resistance
B Meng
Information Technology Journal 8 (7), 934-964, 2009
272009
A receiver deniable encryption scheme
B Meng, JQ Wang
Proceedings. The 2009 International Symposium on Information Processing …, 2009
262009
An internet voting protocol with receipt-free and coercion-resistant
B Meng
7th IEEE International Conference on Computer and Information Technology …, 2007
242007
Research on electronic payment model
B Meng, Q Xiong
8th International Conference on Computer Supported Cooperative Work in …, 2004
242004
An efficient receiver deniable encryption scheme and its applications
B Meng, JQ Wang
Journal of Networks 5 (6), 683, 2010
232010
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme.
B Meng, Z Li, J Qin
J. Softw. 5 (9), 942-949, 2010
132010
A secure and efficient distributed storage scheme SAONT-RS based on an improved AONT and erasure coding
L Yao, J Lu, J Liu, D Wang, B Meng
IEEE Access 6, 55126-55138, 2018
122018
A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol
B Meng
Information Technology Journal 8 (3), 302-309, 2009
122009
Automatic verification of security properties of OAuth 2.0 protocol with cryptoverif in computational model
X Xu, L Niu, B Meng
Information Technology Journal 12 (12), 2273, 2013
92013
A survey on analysis of selected cryptographic primitives and security protocols in symbolic model and computational model
B Meng
Information Technology Journal 10 (6), 1068-1091, 2011
92011
A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol.
B Meng
J. Comput. 4 (3), 184-192, 2009
92009
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
BM Xudong HE, Jiabing LIU, Chin-Tser HUANG, Dejun WANG
IEEE access 7, 131050-131067, 2019
82019
Formal analysis of key properties in the Internet voting protocol using applied PI calculus
B Meng
Information Technology Journal 7 (8), 1130-1140, 2008
82008
A Security Analysis Method for Security Protocol Implementations Based on Message Construction
Jintian Lu , Lili Yao , Xudong He , Chintser Huang , Dejun Wang, Bo Meng
Applied Sciences 8 (12), 2018
72018
Automatic verification of security of openid connect protocol with proverif
J Lu, J Zhang, J Li, Z Wan, B Meng
Advances on P2P, Parallel, Grid, Cloud and Internet Computing: Proceedings …, 2017
72017
Analyzing and improving internet voting protocol
B Meng
IEEE International Conference on e-Business Engineering (ICEBE'07), 351-354, 2007
72007
Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover.
B Meng, W Huang, Z Li
J. Comput. 8 (7), 1728-1741, 2013
62013
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model.
B Meng, W Huang, D Wang
J. Networks 6 (9), 1262-1271, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20