Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Changshe Ma
@article{DBLP:journals/corr/abs-2210-10244, author = {Shaoying Cai and Yingjiu Li and Changshe Ma and Sherman S. M. Chow and Robert H. Deng}, title = {Prove You Owned Me: One Step beyond {RFID} Tag/Mutual Authentication}, journal = {CoRR}, volume = {abs/2210.10244}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.10244}, doi = {10.48550/ARXIV.2210.10244}, eprinttype = {arXiv}, eprint = {2210.10244}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-10244.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiM21, author = {Xiaocong Li and Changshe Ma}, title = {Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1202--1207}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00163}, doi = {10.1109/TRUSTCOM53373.2021.00163}, timestamp = {Sun, 13 Mar 2022 10:52:35 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaGL20, author = {Changshe Ma and Yiping Gu and Hongfei Li}, title = {Practical Searchable Symmetric Encryption Supporting Conjunctive Queries Without Keyword Pair Result Pattern Leakage}, journal = {{IEEE} Access}, volume = {8}, pages = {107510--107526}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3001014}, doi = {10.1109/ACCESS.2020.3001014}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaGL20, author = {Changshe Ma and Yiping Gu and Hongfei Li}, title = {Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2020}, url = {https://eprint.iacr.org/2020/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaJ19, author = {Changshe Ma and Mei Jiang}, title = {Practical Lattice-Based Multisignature Schemes for Blockchains}, journal = {{IEEE} Access}, volume = {7}, pages = {179765--179778}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2958816}, doi = {10.1109/ACCESS.2019.2958816}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiDMSW16, author = {Junzuo Lai and Robert H. Deng and Changshe Ma and Kouichi Sakurai and Jian Weng}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {CCA-Secure Keyed-Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {70--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_4}, doi = {10.1007/978-3-662-49384-7\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2013a, editor = {Changshe Ma and Jian Weng}, title = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013}, series = {Cryptology and Information Security Series}, volume = {11}, publisher = {{IOS} Press}, year = {2013}, isbn = {978-1-61499-327-8}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2013a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/ChowMW12, author = {Sherman S. M. Chow and Changshe Ma and Jian Weng}, title = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms}, journal = {Algorithmica}, volume = {64}, number = {2}, pages = {246--266}, year = {2012}, url = {https://doi.org/10.1007/s00453-011-9593-3}, doi = {10.1007/S00453-011-9593-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/ChowMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiDLM11, author = {Yingjiu Li and Robert H. Deng and Junzuo Lai and Changshe Ma}, title = {On two {RFID} privacy notions and their relations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {30:1--30:23}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043631}, doi = {10.1145/2043628.2043631}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiDLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PanWM11, author = {Jiaxin Pan and Libin Wang and Changshe Ma}, editor = {Feng Bao and Jian Weng}, title = {Analysis and Improvement of an Authenticated Key Exchange Protocol}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {417--431}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_31}, doi = {10.1007/978-3-642-21031-0\_31}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PanWM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaWLD10, author = {Changshe Ma and Jian Weng and Yingjiu Li and Robert H. Deng}, title = {Efficient discrete logarithm based multi-signature scheme in the plain public key model}, journal = {Des. Codes Cryptogr.}, volume = {54}, number = {2}, pages = {121--133}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9313-z}, doi = {10.1007/S10623-009-9313-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MaWLD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/ChowMW10, author = {Sherman S. M. Chow and Changshe Ma and Jian Weng}, editor = {My T. Thai and Sartaj Sahni}, title = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms}, booktitle = {Computing and Combinatorics, 16th Annual International Conference, {COCOON} 2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6196}, pages = {520--529}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14031-0\_55}, doi = {10.1007/978-3-642-14031-0\_55}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/ChowMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PanWM10, author = {Jiaxin Pan and Libin Wang and Changshe Ma}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Security Enhancement and Modular Treatment towards Authenticated Key Exchange}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {203--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_15}, doi = {10.1007/978-3-642-17650-0\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PanWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaLDL09, author = {Changshe Ma and Yingjiu Li and Robert H. Deng and Tieyan Li}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {{RFID} privacy: relation between two notions, minimal condition, and efficient construction}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {54--65}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653670}, doi = {10.1145/1653662.1653670}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaLDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CaiLMLD09, author = {Shaoying Cai and Tieyan Li and Changshe Ma and Yingjiu Li and Robert H. Deng}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {150--164}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_13}, doi = {10.1007/978-3-642-11145-7\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CaiLMLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiangLMLD09, author = {Bing Liang and Yingjiu Li and Changshe Ma and Tieyan Li and Robert H. Deng}, editor = {Atul Prakash and Indranil Gupta}, title = {On the Untraceability of Anonymous {RFID} Authentication Protocol with Constant Key-Lookup}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {71--85}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_7}, doi = {10.1007/978-3-642-10772-6\_7}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengLMCL08, author = {Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li}, title = {Democratic Group Signatures with Threshold Traceability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2008}, url = {http://eprint.iacr.org/2008/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaWZ07, author = {Changshe Ma and Jian Weng and Dong Zheng}, title = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2007}, url = {http://eprint.iacr.org/2007/019}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/MaLCL06, author = {Changshe Ma and Shiqun Li and Kefei Chen and Shengli Liu}, title = {Analysis and improvement of fair certified e-mail delivery protocol}, journal = {Comput. Stand. Interfaces}, volume = {28}, number = {4}, pages = {467--474}, year = {2006}, url = {https://doi.org/10.1016/j.csi.2005.03.002}, doi = {10.1016/J.CSI.2005.03.002}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/MaLCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WengLCM06, author = {Jian Weng and Shengli Liu and Kefei Chen and Changshe Ma}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Identity-Based Key-Insulated Signature Without Random Oracles}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {470--480}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_50}, doi = {10.1007/978-3-540-74377-4\_50}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WengLCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Ma06, author = {Changshe Ma}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Efficient Short Signcryption Scheme with Public Verifiability}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {118--129}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_10}, doi = {10.1007/11937807\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Ma06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WengLCM06, author = {Jian Weng and Shengli Liu and Kefei Chen and Changshe Ma}, editor = {Rana Barua and Tanja Lange}, title = {Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {409--423}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_29}, doi = {10.1007/11941378\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/WengLCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MaCZL05, author = {Changshe Ma and Kefei Chen and Dong Zheng and Shengli Liu}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Efficient and Proactive Threshold Signcryption}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {233--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_17}, doi = {10.1007/11556992\_17}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/MaCZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/MaCLZ05, author = {Changshe Ma and Kefei Chen and Shengli Liu and Dong Zheng}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Luis Javier Garc{\'{\i}}a Castro}, title = {Transitive Signatures Based on Bilinear Maps}, booktitle = {Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction with ICEIS2005, Miami, USA, May 2005}, pages = {48--56}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/MaCLZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0504019, author = {Guilin Wang and Feng Bao and Changshe Ma and Kefei Chen}, title = {Efficient Authenticated Encryption Schemes with Public Verifiability}, journal = {CoRR}, volume = {abs/cs/0504019}, year = {2005}, url = {http://arxiv.org/abs/cs/0504019}, eprinttype = {arXiv}, eprint = {cs/0504019}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0504019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.