Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Da-Zhi Sun
@article{DBLP:journals/sensors/SunGT23, author = {Da{-}Zhi Sun and Yi{-}Na Gao and Yangguang Tian}, title = {On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices}, journal = {Sensors}, volume = {23}, number = {14}, pages = {6559}, year = {2023}, url = {https://doi.org/10.3390/s23146559}, doi = {10.3390/S23146559}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/SunGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunZ21, author = {Da{-}Zhi Sun and Ji{-}Dong Zhong}, title = {Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5598574:1--5598574:12}, year = {2021}, url = {https://doi.org/10.1155/2021/5598574}, doi = {10.1155/2021/5598574}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/Sun21a, author = {Da{-}Zhi Sun}, title = {Security and Privacy Analysis of Vinoth et al.'s Authenticated Key Agreement Scheme for Industrial IoT}, journal = {Symmetry}, volume = {13}, number = {10}, pages = {1952}, year = {2021}, url = {https://doi.org/10.3390/sym13101952}, doi = {10.3390/SYM13101952}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/Sun21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/TanSL21, author = {Mingxi Tan and Dazhi Sun and Xiaohong Li}, title = {A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021, Nanjing, China, March 29 - April 1, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WCNC49053.2021.9417304}, doi = {10.1109/WCNC49053.2021.9417304}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/TanSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoSY20, author = {Xiang{-}Yu Guo and Da{-}Zhi Sun and Ying Yang}, title = {An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map}, journal = {{IEEE} Access}, volume = {8}, pages = {111265--111277}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3002558}, doi = {10.1109/ACCESS.2020.3002558}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GuoSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunM20, author = {Da{-}Zhi Sun and Yi Mu}, title = {On the Security of Symmetric Encryption Against Mass Surveillance}, journal = {{IEEE} Access}, volume = {8}, pages = {175625--175636}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3025848}, doi = {10.1109/ACCESS.2020.3025848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SunM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SunZXG19, author = {Da{-}Zhi Sun and Ze{-}Guang Zhu and Guangquan Xu and Wei Guo}, title = {One-round provably secure yoking-proof for {RFID} applications}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {23}, year = {2019}, url = {https://doi.org/10.1002/cpe.4931}, doi = {10.1002/CPE.4931}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/SunZXG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SeghierLS19, author = {Athmane Seghier and Jianxin Li and Dazhi Sun}, title = {Advanced encryption standard based on key dependent S-Box cube}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {6}, pages = {552--558}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5043}, doi = {10.1049/IET-IFS.2018.5043}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SeghierLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/0005ST19, author = {Weiwei Liu and Da{-}Zhi Sun and Yangguang Tian}, title = {Efficient oblivious transfer with membership verification}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {9}, year = {2019}, url = {https://doi.org/10.1177/1550147719875645}, doi = {10.1177/1550147719875645}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/0005ST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SunS19, author = {Da{-}Zhi Sun and Li Sun}, title = {On Secure Simple Pairing in Bluetooth Standard v5.0-Part {I:} Authenticated Link Key Security and Its Home Automation and Entertainment Applications}, journal = {Sensors}, volume = {19}, number = {5}, pages = {1158}, year = {2019}, url = {https://doi.org/10.3390/s19051158}, doi = {10.3390/S19051158}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/SunS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SunSY19, author = {Da{-}Zhi Sun and Li Sun and Ying Yang}, title = {On Secure Simple Pairing in Bluetooth Standard v5.0-Part {II:} Privacy Analysis and Enhancement for Low Energy}, journal = {Sensors}, volume = {19}, number = {15}, pages = {3259}, year = {2019}, url = {https://doi.org/10.3390/s19153259}, doi = {10.3390/S19153259}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SunSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ShiWS019, author = {Fanyu Shi and Jizeng Wei and Dazhi Sun and Guo Wei}, title = {A Systematic Approach to Horizontal Clustering Analysis on Embedded {RSA} Implementation}, booktitle = {25th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2019, Tianjin, China, December 4-6, 2019}, pages = {901--906}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICPADS47876.2019.00132}, doi = {10.1109/ICPADS47876.2019.00132}, timestamp = {Tue, 04 Feb 2020 13:36:54 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ShiWS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/LiSJY18, author = {Tian Li and Dazhi Sun and Peng Jing and Kaixi Yang}, title = {Smart Card Data Mining of Public Transport Destination: {A} Literature Review}, journal = {Inf.}, volume = {9}, number = {1}, pages = {18}, year = {2018}, url = {https://doi.org/10.3390/info9010018}, doi = {10.3390/INFO9010018}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/LiSJY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/SunMS18, author = {Da{-}Zhi Sun and Yi Mu and Willy Susilo}, title = {Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard {V5.0} and its countermeasure}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {55--67}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1081-6}, doi = {10.1007/S00779-017-1081-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/SunMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/SunMS18a, author = {Da{-}Zhi Sun and Yi Mu and Willy Susilo}, title = {Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard {V5.0} and its countermeasure}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {69}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1085-2}, doi = {10.1007/S00779-017-1085-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/SunMS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/SunM18, author = {Da{-}Zhi Sun and Yi Mu}, title = {Security of Grouping-Proof Authentication Protocol for Distributed {RFID} Systems}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {7}, number = {2}, pages = {254--257}, year = {2018}, url = {https://doi.org/10.1109/LWC.2017.2770123}, doi = {10.1109/LWC.2017.2770123}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/SunM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nccet/WangGSW17, author = {Qingran Wang and Wei Guo and Dazhi Sun and Jizeng Wei}, editor = {Weixia Xu and Liquan Xiao and Jinwen Li and Chengyi Zhang and Zhenzhen Zhu}, title = {A High Efficient Control Flow Authentication Method Basing on Loop Isolation}, booktitle = {Computer Engineering and Technology - 21st {CCF} Conference, {NCCET} 2017, Xiamen, China, August 16-18, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {600}, pages = {96--103}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-7844-6\_10}, doi = {10.1007/978-981-10-7844-6\_10}, timestamp = {Fri, 06 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nccet/WangGSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunX17, author = {Da{-}Zhi Sun and Guangquan Xu}, title = {One-Round Provably Secure Yoking-Proof for {RFID} Applications}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {315--322}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.253}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.253}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/electronicmarkets/SunKS16, author = {Yu Sun and Xingxuan Kuang and Da{-}Zhi Sun}, title = {The geographic concentration of China's e-business enterprises: where they gather and why}, journal = {Electron. Mark.}, volume = {26}, number = {1}, pages = {31--42}, year = {2016}, url = {https://doi.org/10.1007/s12525-015-0201-2}, doi = {10.1007/S12525-015-0201-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/electronicmarkets/SunKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SunZ16, author = {Da{-}Zhi Sun and Ji{-}Dong Zhong}, title = {Cryptanalysis of a Hash Based Mutual {RFID} Tag Authentication Protocol}, journal = {Wirel. Pers. Commun.}, volume = {91}, number = {3}, pages = {1085--1093}, year = {2016}, url = {https://doi.org/10.1007/s11277-016-3513-4}, doi = {10.1007/S11277-016-3513-4}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SunZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SunL16, author = {Da{-}Zhi Sun and Xiao{-}Hong Li}, editor = {Kwok{-}Yan Lam and Chi{-}Hung Chi and Sihan Qing}, title = {Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3}, booktitle = {Information and Communications Security - 18th International Conference, {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9977}, pages = {403--417}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50011-9\_31}, doi = {10.1007/978-3-319-50011-9\_31}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/SunL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaoGWS16, author = {Zhongyuan Hao and Wei Guo and Jizeng Wei and Dazhi Sun}, title = {Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on {FPGA} Platform}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {584--589}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0113}, doi = {10.1109/TRUSTCOM.2016.0113}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaoGWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/GengLFS15, author = {Shaoguang Geng and Xiaohong Li and Zhiyong Feng and Da{-}Zhi Sun}, title = {Web Application Architecture Security Evaluation Method Based on {AADL}}, booktitle = {20th International Conference on Engineering of Complex Computer Systems, {ICECCS} 2015, Gold Coast, Australia, December 9-12, 2015}, pages = {186--189}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICECCS.2015.29}, doi = {10.1109/ICECCS.2015.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/GengLFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunAWSA15, author = {Da{-}Zhi Sun and Zahra Ahmadian and Yue{-}Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Analysis and Enhancement of Desynchronization Attack on an Ultralightweight {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2015}, url = {http://eprint.iacr.org/2015/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunAWSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SunC13, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao}, title = {On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {345--355}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797039}, doi = {10.1080/01611194.2013.797039}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SunC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SunHC13, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Zhen{-}Fu Cao}, title = {A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation"}, journal = {Inf. Sci.}, volume = {223}, pages = {331--334}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.09.052}, doi = {10.1016/J.INS.2012.09.052}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SunHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/SunLFCX13, author = {Da{-}Zhi Sun and Jian{-}Xin Li and Zhiyong Feng and Zhen{-}Fu Cao and Guangquan Xu}, title = {On the security and improvement of a two-factor user authentication scheme in wireless sensor networks}, journal = {Pers. Ubiquitous Comput.}, volume = {17}, number = {5}, pages = {895--905}, year = {2013}, url = {https://doi.org/10.1007/s00779-012-0540-3}, doi = {10.1007/S00779-012-0540-3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/SunLFCX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/LiLLSL13, author = {Jianxin Li and Xudong Liu and Lu Liu and Dazhi Sun and Bo Li}, title = {HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {1353--1365}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9648-4}, doi = {10.1007/S11235-011-9648-4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/LiLLSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwl/XuXSLF13, author = {Rui Xu and Guangquan Xu and Da{-}Zhi Sun and Xiaohong Li and Zhiyong Feng}, editor = {Dickson K. W. Chiu and Minhong Wang and Elvira Popescu and Qing Li and Rynson W. H. Lau and Timothy K. Shih and Chu{-}Sing Yang and Demetrios G. Sampson}, title = {Improving KeyNote Trust Management Model Based on User Behavior for Social Learning}, booktitle = {Advances in Web-Based Learning - {ICWL} 2013 Workshops - {USL} 2013, {IWSLL} 2013, {KMEL} 2013, {IWCWL} 2013, {WIL} 2013, and {IWEEC} 2013, Kenting, Taiwan, October 6-9, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8390}, pages = {96--103}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-46315-4\_10}, doi = {10.1007/978-3-662-46315-4\_10}, timestamp = {Wed, 24 Feb 2021 16:22:28 +0100}, biburl = {https://dblp.org/rec/conf/icwl/XuXSLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SunHL12, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Jian{-}Xin Li}, title = {A note on asynchronous multi-exponentiation algorithm using binary representation}, journal = {Inf. Process. Lett.}, volume = {112}, number = {22}, pages = {876--879}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.08.006}, doi = {10.1016/J.IPL.2012.08.006}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SunHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/SunZ12, author = {Da{-}Zhi Sun and Ji{-}Dong Zhong}, title = {A hash-based {RFID} security protocol for strong privacy protection}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {58}, number = {4}, pages = {1246--1252}, year = {2012}, url = {https://doi.org/10.1109/TCE.2012.6414992}, doi = {10.1109/TCE.2012.6414992}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/SunZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sun12, author = {Da{-}Zhi Sun}, title = {An error in "On a new formal proof model for {RFID} location privacy"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2012}, url = {http://eprint.iacr.org/2012/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sun12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paap/HuGWCS11, author = {Jingwei Hu and Wei Guo and Jizeng Wei and Yisong Chang and Dazhi Sun}, editor = {Jigang Wu and Guozhi Song and Hong Shen and Guoliang Chen}, title = {A Novel Architecture for Fast {RSA} Key Generation Based on {RNS}}, booktitle = {Fourth International Symposium on Parallel Architectures, Algorithms and Programming, {PAAP} 2011, Tianjin, China, December 9-11, 2011}, pages = {345--349}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PAAP.2011.75}, doi = {10.1109/PAAP.2011.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paap/HuGWCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/ZengCS10, author = {Peng Zeng and Kim{-}Kwang Raymond Choo and Da{-}Zhi Sun}, title = {On the security of an enhanced novel access control protocol for wireless sensor networks}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {56}, number = {2}, pages = {566--569}, year = {2010}, url = {https://doi.org/10.1109/TCE.2010.5505971}, doi = {10.1109/TCE.2010.5505971}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/ZengCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LiLMS10, author = {Jianxin Li and Bo Li and Linlin Meng and Dazhi Sun}, title = {HiTrust: {A} Hybrid Tree Based Trust Negotiation Service}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {854--859}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WAINA.2010.149}, doi = {10.1109/WAINA.2010.149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LiLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SunHSL09, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Jizhou Sun and Jian{-}Xin Li}, title = {Cryptanalysis of a mutual authentication scheme based on nonce and smart cards}, journal = {Comput. Commun.}, volume = {32}, number = {6}, pages = {1015--1017}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2008.12.023}, doi = {10.1016/J.COMCOM.2008.12.023}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SunHSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/SunHSLZF09, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Jizhou Sun and Jian{-}Xin Li and Jiawan Zhang and Zhiyong Feng}, title = {Improvements of Juang 's Password-Authenticated Key Agreement Scheme Using Smart Cards}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {56}, number = {6}, pages = {2284--2291}, year = {2009}, url = {https://doi.org/10.1109/TIE.2009.2016508}, doi = {10.1109/TIE.2009.2016508}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/SunHSLZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itsc/SunSRZ09, author = {Dazhi Sun and Lin Sun and Pranay K. Ravoola and Shuai Zhao}, title = {A microscopic simulation-based decision support system to develop changeable message sign alternatives}, booktitle = {12th International {IEEE} Conference on Intelligent Transportation Systems, {ITSC} 2009, St. Louis, MO, USA, October 5-7, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ITSC.2009.5309802}, doi = {10.1109/ITSC.2009.5309802}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itsc/SunSRZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SunC08, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao}, title = {New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {1}, pages = {116--120}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n1/ijns-2008-v6-n1-p116-120.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SunC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/SunHSZF08, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Jizhou Sun and Jiawan Zhang and Zhiyong Feng}, title = {A new design of wearable token system for mobile device security}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {54}, number = {4}, pages = {1784--1789}, year = {2008}, url = {https://doi.org/10.1109/TCE.2008.4711235}, doi = {10.1109/TCE.2008.4711235}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/SunHSZF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/Sun07a, author = {Da{-}Zhi Sun}, title = {A note on Chang-Lai's modular square algorithm based on the generalized Chinese remainder theorem}, journal = {Appl. Math. Comput.}, volume = {188}, number = {1}, pages = {411--416}, year = {2007}, url = {https://doi.org/10.1016/j.amc.2006.10.006}, doi = {10.1016/J.AMC.2006.10.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/Sun07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/SunHSZ07, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Jizhou Sun and Jiawan Zhang}, title = {Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm}, journal = {Appl. Math. Comput.}, volume = {190}, number = {2}, pages = {1848--1854}, year = {2007}, url = {https://doi.org/10.1016/j.amc.2007.02.066}, doi = {10.1016/J.AMC.2007.02.066}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/SunHSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/SunHSC07, author = {Da{-}Zhi Sun and Jin{-}Peng Huai and Jizhou Sun and Zhen{-}Fu Cao}, title = {An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {53}, number = {4}, pages = {1718--1723}, year = {2007}, url = {https://doi.org/10.1109/TCE.2007.4429275}, doi = {10.1109/TCE.2007.4429275}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/SunHSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/SunCS06, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao and Yu Sun}, title = {How to compute modular exponentiation with large operators based on the right-to-left binary algorithm}, journal = {Appl. Math. Comput.}, volume = {176}, number = {1}, pages = {280--292}, year = {2006}, url = {https://doi.org/10.1016/j.amc.2005.09.062}, doi = {10.1016/J.AMC.2005.09.062}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/SunCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacie/SunBW06, author = {Dazhi Sun and Rahim F. Benekohal and S. Travis Waller}, title = {Bi-level Programming Formulation and Heuristic Solution Approach for Dynamic Traffic Signal Optimization}, journal = {Comput. Aided Civ. Infrastructure Eng.}, volume = {21}, number = {5}, pages = {321--333}, year = {2006}, url = {https://doi.org/10.1111/j.1467-8667.2006.00439.x}, doi = {10.1111/J.1467-8667.2006.00439.X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacie/SunBW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/SunCS05, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao and Yu Sun}, title = {Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme}, journal = {Appl. Math. Comput.}, volume = {164}, number = {3}, pages = {675--678}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.04.098}, doi = {10.1016/J.AMC.2004.04.098}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/SunCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/SunCS05a, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao and Yu Sun}, title = {Remarks on a new key authentication scheme based on discrete logarithms}, journal = {Appl. Math. Comput.}, volume = {167}, number = {1}, pages = {572--575}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.07.021}, doi = {10.1016/J.AMC.2004.07.021}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/SunCS05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/SunC05, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao}, title = {Improved public key authentication scheme for non-repudiation}, journal = {Appl. Math. Comput.}, volume = {168}, number = {2}, pages = {927--932}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.09.021}, doi = {10.1016/J.AMC.2004.09.021}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/SunC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/SunZS05, author = {Da{-}Zhi Sun and Ji{-}Dong Zhong and Yu Sun}, title = {Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme}, journal = {Appl. Math. Comput.}, volume = {170}, number = {2}, pages = {1185--1193}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2005.01.013}, doi = {10.1016/J.AMC.2005.01.013}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/SunZS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/SunC05, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao}, editor = {Lipo Wang and Yaochu Jin}, title = {Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using Smart Cards}, booktitle = {Fuzzy Systems and Knowledge Discovery, Second International Conference, {FSKD} 2005, Changsha, China, August 27-29, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3614}, pages = {596--599}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11540007\_73}, doi = {10.1007/11540007\_73}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fskd/SunC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/SunBW03, author = {Dazhi Sun and Rahim F. Benekohal and S. Travis Waller}, editor = {Erick Cant{\'{u}}{-}Paz and James A. Foster and Kalyanmoy Deb and Lawrence Davis and Rajkumar Roy and Una{-}May O'Reilly and Hans{-}Georg Beyer and Russell K. Standish and Graham Kendall and Stewart W. Wilson and Mark Harman and Joachim Wegener and Dipankar Dasgupta and Mitchell A. Potter and Alan C. Schultz and Kathryn A. Dowsland and Natasa Jonoska and Julian F. Miller}, title = {Multi-objective Traffic Signal Timing Optimization Using Non-dominated Sorting Genetic Algorithm {II}}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2724}, pages = {2420--2421}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45110-2\_143}, doi = {10.1007/3-540-45110-2\_143}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/gecco/SunBW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.