7、Resourch on Algorithms and Applications of Public Key Cryptography Used in Ubiquitous Computing Systems;
4、Research on Kerberos Authentication Protocol Integrating Public Key Cryptography;
2、Status and Trend of Public Key Cryptography
1、Public Key Cryptography
3、Research on Key Problems in Identity Based Public Key Cryptography
6、Analysis of the Differentials between Private And Public Key Cryptography;
5、Ergodic Matrices and Its Applications in Public Key Cryptography;