BibTeX records: Dongyao Ji

download as .bib file

@inproceedings{DBLP:conf/iwsec/XiaJY17,
  author    = {Bingqing Xia and
               Dongyao Ji and
               Gang Yao},
  editor    = {Satoshi Obana and
               Koji Chida},
  title     = {Enhanced {TLS} Handshake Authentication with Blockchain and Smart
               Contract (Short Paper)},
  booktitle = {Advances in Information and Computer Security - 12th International
               Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
               September 1, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10418},
  pages     = {56--66},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-64200-0\_4},
  doi       = {10.1007/978-3-319-64200-0\_4},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/iwsec/XiaJY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangJ15,
  author    = {Ting Wang and
               Dongyao Ji},
  title     = {Comment on "Design and formal security evaluation of NeMHIP"},
  journal   = {Comput. Secur.},
  volume    = {52},
  pages     = {159--161},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.cose.2013.02.005},
  doi       = {10.1016/j.cose.2013.02.005},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/WangJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HuJWY14,
  author    = {Wei Hu and
               Dongyao Ji and
               Ting Wang and
               Gang Yao},
  editor    = {Jing Tian and
               Jiwu Jing and
               Mudhakar Srivatsa},
  title     = {A New Trust Chain Security Evaluation Model and Tool},
  booktitle = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {II}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {153},
  pages     = {382--391},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-23802-9\_30},
  doi       = {10.1007/978-3-319-23802-9\_30},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/conf/securecomm/HuJWY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewdc/HuJ13,
  author    = {Wei Hu and
               Dongyao Ji},
  editor    = {Marco Vieira and
               Jo{\~{a}}o Carlos Cunha},
  title     = {Formal Analysis of Dynamic Domain Establishment Protocol in Cloud
               Logging Service},
  booktitle = {Dependable Computing - 14th European Workshop, {EWDC} 2013, Coimbra,
               Portugal, May 15-16, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7869},
  pages     = {24--38},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38789-0\_3},
  doi       = {10.1007/978-3-642-38789-0\_3},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/ewdc/HuJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/WangJ12,
  author    = {Ting Wang and
               Dongyao Ji},
  editor    = {John Derrick and
               John S. Fitzgerald and
               Stefania Gnesi and
               Sarfraz Khurshid and
               Michael Leuschel and
               Steve Reeves and
               Elvinia Riccobene},
  title     = {Active Attacking Multicast Key Management Protocol Using Alloy},
  booktitle = {Abstract State Machines, Alloy, B, VDM, and {Z} - Third International
               Conference, {ABZ} 2012, Pisa, Italy, June 18-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7316},
  pages     = {164--177},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30885-7\_12},
  doi       = {10.1007/978-3-642-30885-7\_12},
  timestamp = {Sun, 02 Jun 2019 21:23:59 +0200},
  biburl    = {https://dblp.org/rec/conf/asm/WangJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TangJ10,
  author    = {Qiang Tang and
               Dongyao Ji},
  title     = {Verifiable Attribute Based Encryption},
  journal   = {Int. J. Netw. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {114--120},
  year      = {2010},
  url       = {http://ijns.femto.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p114-120.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/TangJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HuangXLPZJ10,
  author    = {Danqing Huang and
               Rui Xue and
               Feng Liu and
               Jianhua Peng and
               Zhenju Zhao and
               Dongyao Ji},
  editor    = {Isao Echizen and
               Jeng{-}Shyang Pan and
               Dieter W. Fellner and
               Alexander Nouak and
               Arjan Kuijper and
               Lakhmi C. Jain},
  title     = {Formal Verification of {HMQV} Using {ASM-SPV}},
  booktitle = {Sixth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
               15-17 October, 2010, Proceedings},
  pages     = {486--489},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://doi.org/10.1109/IIHMSP.2010.124},
  doi       = {10.1109/IIHMSP.2010.124},
  timestamp = {Mon, 06 Apr 2020 19:01:12 +0200},
  biburl    = {https://dblp.org/rec/conf/iih-msp/HuangXLPZJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/WangJ08,
  author    = {Wei Wang and
               Dongyao Ji},
  editor    = {Kenji Suzuki and
               Teruo Higashino and
               Keiichi Yasumoto and
               Khaled El{-}Fakih},
  title     = {Using {SPIN} to Detect Vulnerabilities in the {AACS} Drive-Host Authentication
               Protocol},
  booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE}
               2008, 28th {IFIP} {WG} 6.1 International Conference, Tokyo, Japan,
               June 10-13, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5048},
  pages     = {305--323},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68855-6\_20},
  doi       = {10.1007/978-3-540-68855-6\_20},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/conf/forte/WangJ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangJ07,
  author    = {Qiang Tang and
               Dongyao Ji},
  title     = {Verifiable Attribute-based Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2007},
  pages     = {461},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/461},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/TangJ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amt/JiF06,
  author    = {Dongyao Ji and
               Dengguo Feng},
  editor    = {Yuefeng Li and
               Mark Looi and
               Ning Zhong},
  title     = {Fault-tolerate Multiparty Electronic Contract Signing Protocol},
  booktitle = {Advances in Intelligent {IT} - Active Media Technology 2006, Proceedings
               of the 4th International Conference on Active Media Technology, {AMT}
               2006, June 7-9, 2006, Brisbane, Australia},
  series    = {Frontiers in Artificial Intelligence and Applications},
  volume    = {138},
  pages     = {79--85},
  publisher = {{IOS} Press},
  year      = {2006},
  url       = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1510},
  timestamp = {Tue, 21 Feb 2017 13:43:19 +0100},
  biburl    = {https://dblp.org/rec/conf/amt/JiF06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amt/JiF06a,
  author    = {Dongyao Ji and
               Dengguo Feng},
  editor    = {Yuefeng Li and
               Mark Looi and
               Ning Zhong},
  title     = {Efficient Anonymous Electronic Metering Scheme},
  booktitle = {Advances in Intelligent {IT} - Active Media Technology 2006, Proceedings
               of the 4th International Conference on Active Media Technology, {AMT}
               2006, June 7-9, 2006, Brisbane, Australia},
  series    = {Frontiers in Artificial Intelligence and Applications},
  volume    = {138},
  pages     = {327--330},
  publisher = {{IOS} Press},
  year      = {2006},
  url       = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1552},
  timestamp = {Tue, 21 Feb 2017 13:43:19 +0100},
  biburl    = {https://dblp.org/rec/conf/amt/JiF06a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiJFL04,
  author    = {Hong{-}Da Li and
               Dongyao Ji and
               Dengguo Feng and
               Bao Li},
  title     = {Oblivious Polynomial Evaluation},
  journal   = {J. Comput. Sci. Technol.},
  volume    = {19},
  number    = {4},
  pages     = {550--554},
  year      = {2004},
  url       = {https://doi.org/10.1007/BF02944757},
  doi       = {10.1007/BF02944757},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcst/LiJFL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/JiW01,
  author    = {Dongyao Ji and
               Yuming Wang},
  title     = {Comments on "An approach to the formal verification of the two-party
               cryptographic protocols" by Zhang, Li and Xiao},
  journal   = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume    = {35},
  number    = {1},
  pages     = {6--7},
  year      = {2001},
  url       = {https://doi.org/10.1145/371455.371456},
  doi       = {10.1145/371455.371456},
  timestamp = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/sigops/JiW01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics