BibTeX records: Xianping Mao

download as .bib file

@article{DBLP:journals/tcs/LaiHAM20,
  author       = {Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Xianping Mao},
  title        = {Constant-size CCA-secure multi-hop unidirectional proxy re-encryption
                  from indistinguishability obfuscation},
  journal      = {Theor. Comput. Sci.},
  volume       = {847},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.09.031},
  doi          = {10.1016/J.TCS.2020.09.031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LaiHAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiHAM18,
  author       = {Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Xianping Mao},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption
                  from Indistinguishability Obfuscation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {805--812},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_49},
  doi          = {10.1007/978-3-319-93638-3\_49},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MaoLWWL18,
  author       = {Xianping Mao and
                  Xuefeng Li and
                  Xiaochuan Wu and
                  Chuansheng Wang and
                  Junzuo Lai},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {Anonymous Attribute-Based Conditional Proxy Re-encryption},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_7},
  doi          = {10.1007/978-3-030-02744-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MaoLWWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangLMCL17,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Xianping Mao and
                  Kefei Chen and
                  Jin Li},
  title        = {Insight of the protection for data security under selective opening
                  attacks},
  journal      = {Inf. Sci.},
  volume       = {412},
  pages        = {223--241},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2017.05.031},
  doi          = {10.1016/J.INS.2017.05.031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangLMCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccip/MaoZLMWL17,
  author       = {Xianping Mao and
                  Jing Zhao and
                  Xuefeng Li and
                  Huanyu Ma and
                  Xiaochuan Wu and
                  Qiushan Liu},
  editor       = {Jalel Ben{-}Othman and
                  Feng Gang and
                  Jain{-}Shing Liu and
                  Masayuki Arai},
  title        = {On the security of a smartcard-based authentication system for multiserver
                  environments},
  booktitle    = {Proceedings of the 3rd International Conference on Communication and
                  Information Processing, {ICCIP} 2017, Tokyo, Japan, November 24-26,
                  2017},
  pages        = {345--349},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3162957.3163043},
  doi          = {10.1145/3162957.3163043},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccip/MaoZLMWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaoLMCW16,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Qixiang Mei and
                  Kefei Chen and
                  Jian Weng},
  title        = {Generic and Efficient Constructions of Attribute-Based Encryption
                  with Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {5},
  pages        = {533--546},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2423669},
  doi          = {10.1109/TDSC.2015.2423669},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaoLCWM15,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Kefei Chen and
                  Jian Weng and
                  Qixiang Mei},
  title        = {Efficient revocable identity-based encryption from multilinear maps},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3511--3522},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1274},
  doi          = {10.1002/SEC.1274},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuangLMC15,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Xianping Mao and
                  Kefei Chen},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Non-malleability Under Selective Opening Attacks: Implication and
                  Separation},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_5},
  doi          = {10.1007/978-3-319-28166-7\_5},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HuangLMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/WangCLMW15,
  author       = {Liangliang Wang and
                  Kefei Chen and
                  Yu Long and
                  Xianping Mao and
                  Huige Wang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli},
  title        = {A Modified Efficient Certificateless Signature Scheme without Bilinear
                  Pairings},
  booktitle    = {2015 International Conference on Intelligent Networking and Collaborative
                  Systems, INCoS 2015, Taipei, Taiwan, September 2-4, 2015},
  pages        = {82--85},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INCoS.2015.10},
  doi          = {10.1109/INCOS.2015.10},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/WangCLMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLMC15,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Xianping Mao and
                  Kefei Chen},
  title        = {Non-malleability under Selective Opening Attacks: Implication and
                  Separation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/316},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MaoCWL14,
  author       = {Xianping Mao and
                  Kefei Chen and
                  Liangliang Wang and
                  Yu Long},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Francesco Palmieri and
                  Mario Koeppen and
                  Vincenzo Loia},
  title        = {On the Security of a Lattice-Based Multi-party Concurrent Signature
                  Scheme},
  booktitle    = {2014 International Conference on Intelligent Networking and Collaborative
                  Systems, Salerno, Italy, September 10-12, 2014},
  pages        = {91--95},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INCoS.2014.41},
  doi          = {10.1109/INCOS.2014.41},
  timestamp    = {Wed, 06 Jan 2021 11:52:38 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/MaoCWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoM07,
  author       = {Tianjie Cao and
                  Xianping Mao},
  title        = {Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy
                  Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {355--360},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p355-360.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaoML06,
  author       = {Tianjie Cao and
                  Xianping Mao and
                  Dongdai Lin},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Security Analysis of a Server-Aided {RSA} Key Generation Protocol},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {314--320},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_29},
  doi          = {10.1007/11689522\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CaoML06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics