BibTeX records: Da-Zhi Sun

download as .bib file

@article{DBLP:journals/sensors/SunGT23,
  author       = {Da{-}Zhi Sun and
                  Yi{-}Na Gao and
                  Yangguang Tian},
  title        = {On the Security of a PUF-Based Authentication and Key Exchange Protocol
                  for IoT Devices},
  journal      = {Sensors},
  volume       = {23},
  number       = {14},
  pages        = {6559},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23146559},
  doi          = {10.3390/S23146559},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/SunGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunZ21,
  author       = {Da{-}Zhi Sun and
                  Ji{-}Dong Zhong},
  title        = {Privacy Enhancement on Unilateral Bluetooth Authentication Protocol
                  for Mobile Crowdsensing},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5598574:1--5598574:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5598574},
  doi          = {10.1155/2021/5598574},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/Sun21a,
  author       = {Da{-}Zhi Sun},
  title        = {Security and Privacy Analysis of Vinoth et al.'s Authenticated Key
                  Agreement Scheme for Industrial IoT},
  journal      = {Symmetry},
  volume       = {13},
  number       = {10},
  pages        = {1952},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13101952},
  doi          = {10.3390/SYM13101952},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/Sun21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/TanSL21,
  author       = {Mingxi Tan and
                  Dazhi Sun and
                  Xiaohong Li},
  title        = {A Secure and Efficient Blockchain-based Key Management Scheme for
                  LoRaWAN},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021,
                  Nanjing, China, March 29 - April 1, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCNC49053.2021.9417304},
  doi          = {10.1109/WCNC49053.2021.9417304},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/TanSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoSY20,
  author       = {Xiang{-}Yu Guo and
                  Da{-}Zhi Sun and
                  Ying Yang},
  title        = {An Improved Three-Factor Session Initiation Protocol Using Chebyshev
                  Chaotic Map},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {111265--111277},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3002558},
  doi          = {10.1109/ACCESS.2020.3002558},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GuoSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunM20,
  author       = {Da{-}Zhi Sun and
                  Yi Mu},
  title        = {On the Security of Symmetric Encryption Against Mass Surveillance},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {175625--175636},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3025848},
  doi          = {10.1109/ACCESS.2020.3025848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SunM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SunZXG19,
  author       = {Da{-}Zhi Sun and
                  Ze{-}Guang Zhu and
                  Guangquan Xu and
                  Wei Guo},
  title        = {One-round provably secure yoking-proof for {RFID} applications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {23},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4931},
  doi          = {10.1002/CPE.4931},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/SunZXG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SeghierLS19,
  author       = {Athmane Seghier and
                  Jianxin Li and
                  Dazhi Sun},
  title        = {Advanced encryption standard based on key dependent S-Box cube},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {6},
  pages        = {552--558},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5043},
  doi          = {10.1049/IET-IFS.2018.5043},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SeghierLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/0005ST19,
  author       = {Weiwei Liu and
                  Da{-}Zhi Sun and
                  Yangguang Tian},
  title        = {Efficient oblivious transfer with membership verification},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {9},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719875645},
  doi          = {10.1177/1550147719875645},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/0005ST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SunS19,
  author       = {Da{-}Zhi Sun and
                  Li Sun},
  title        = {On Secure Simple Pairing in Bluetooth Standard v5.0-Part {I:} Authenticated
                  Link Key Security and Its Home Automation and Entertainment Applications},
  journal      = {Sensors},
  volume       = {19},
  number       = {5},
  pages        = {1158},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19051158},
  doi          = {10.3390/S19051158},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/SunS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SunSY19,
  author       = {Da{-}Zhi Sun and
                  Li Sun and
                  Ying Yang},
  title        = {On Secure Simple Pairing in Bluetooth Standard v5.0-Part {II:} Privacy
                  Analysis and Enhancement for Low Energy},
  journal      = {Sensors},
  volume       = {19},
  number       = {15},
  pages        = {3259},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19153259},
  doi          = {10.3390/S19153259},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SunSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ShiWS019,
  author       = {Fanyu Shi and
                  Jizeng Wei and
                  Dazhi Sun and
                  Guo Wei},
  title        = {A Systematic Approach to Horizontal Clustering Analysis on Embedded
                  {RSA} Implementation},
  booktitle    = {25th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2019, Tianjin, China, December 4-6, 2019},
  pages        = {901--906},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICPADS47876.2019.00132},
  doi          = {10.1109/ICPADS47876.2019.00132},
  timestamp    = {Tue, 04 Feb 2020 13:36:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ShiWS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/LiSJY18,
  author       = {Tian Li and
                  Dazhi Sun and
                  Peng Jing and
                  Kaixi Yang},
  title        = {Smart Card Data Mining of Public Transport Destination: {A} Literature
                  Review},
  journal      = {Inf.},
  volume       = {9},
  number       = {1},
  pages        = {18},
  year         = {2018},
  url          = {https://doi.org/10.3390/info9010018},
  doi          = {10.3390/INFO9010018},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/LiSJY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/SunMS18,
  author       = {Da{-}Zhi Sun and
                  Yi Mu and
                  Willy Susilo},
  title        = {Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard
                  {V5.0} and its countermeasure},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {55--67},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1081-6},
  doi          = {10.1007/S00779-017-1081-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/SunMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/SunMS18a,
  author       = {Da{-}Zhi Sun and
                  Yi Mu and
                  Willy Susilo},
  title        = {Correction to: Man-in-the-middle attacks on Secure Simple Pairing
                  in Bluetooth standard {V5.0} and its countermeasure},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {69},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1085-2},
  doi          = {10.1007/S00779-017-1085-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/SunMS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/SunM18,
  author       = {Da{-}Zhi Sun and
                  Yi Mu},
  title        = {Security of Grouping-Proof Authentication Protocol for Distributed
                  {RFID} Systems},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {7},
  number       = {2},
  pages        = {254--257},
  year         = {2018},
  url          = {https://doi.org/10.1109/LWC.2017.2770123},
  doi          = {10.1109/LWC.2017.2770123},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/SunM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nccet/WangGSW17,
  author       = {Qingran Wang and
                  Wei Guo and
                  Dazhi Sun and
                  Jizeng Wei},
  editor       = {Weixia Xu and
                  Liquan Xiao and
                  Jinwen Li and
                  Chengyi Zhang and
                  Zhenzhen Zhu},
  title        = {A High Efficient Control Flow Authentication Method Basing on Loop
                  Isolation},
  booktitle    = {Computer Engineering and Technology - 21st {CCF} Conference, {NCCET}
                  2017, Xiamen, China, August 16-18, 2017, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {600},
  pages        = {96--103},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-7844-6\_10},
  doi          = {10.1007/978-981-10-7844-6\_10},
  timestamp    = {Fri, 06 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nccet/WangGSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunX17,
  author       = {Da{-}Zhi Sun and
                  Guangquan Xu},
  title        = {One-Round Provably Secure Yoking-Proof for {RFID} Applications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {315--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.253},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/electronicmarkets/SunKS16,
  author       = {Yu Sun and
                  Xingxuan Kuang and
                  Da{-}Zhi Sun},
  title        = {The geographic concentration of China's e-business enterprises: where
                  they gather and why},
  journal      = {Electron. Mark.},
  volume       = {26},
  number       = {1},
  pages        = {31--42},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12525-015-0201-2},
  doi          = {10.1007/S12525-015-0201-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/electronicmarkets/SunKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/SunZ16,
  author       = {Da{-}Zhi Sun and
                  Ji{-}Dong Zhong},
  title        = {Cryptanalysis of a Hash Based Mutual {RFID} Tag Authentication Protocol},
  journal      = {Wirel. Pers. Commun.},
  volume       = {91},
  number       = {3},
  pages        = {1085--1093},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-016-3513-4},
  doi          = {10.1007/S11277-016-3513-4},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SunZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SunL16,
  author       = {Da{-}Zhi Sun and
                  Xiao{-}Hong Li},
  editor       = {Kwok{-}Yan Lam and
                  Chi{-}Hung Chi and
                  Sihan Qing},
  title        = {Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation
                  Scheme for Security Modes 2 and 3},
  booktitle    = {Information and Communications Security - 18th International Conference,
                  {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9977},
  pages        = {403--417},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50011-9\_31},
  doi          = {10.1007/978-3-319-50011-9\_31},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/SunL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoGWS16,
  author       = {Zhongyuan Hao and
                  Wei Guo and
                  Jizeng Wei and
                  Dazhi Sun},
  title        = {Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing
                  on {FPGA} Platform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {584--589},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0113},
  doi          = {10.1109/TRUSTCOM.2016.0113},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoGWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/GengLFS15,
  author       = {Shaoguang Geng and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Da{-}Zhi Sun},
  title        = {Web Application Architecture Security Evaluation Method Based on {AADL}},
  booktitle    = {20th International Conference on Engineering of Complex Computer Systems,
                  {ICECCS} 2015, Gold Coast, Australia, December 9-12, 2015},
  pages        = {186--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICECCS.2015.29},
  doi          = {10.1109/ICECCS.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/GengLFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunAWSA15,
  author       = {Da{-}Zhi Sun and
                  Zahra Ahmadian and
                  Yue{-}Jiao Wang and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Analysis and Enhancement of Desynchronization Attack on an Ultralightweight
                  {RFID} Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunAWSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SunC13,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao},
  title        = {On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication
                  Scheme with User Anonymity},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {345--355},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797039},
  doi          = {10.1080/01611194.2013.797039},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SunC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SunHC13,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Zhen{-}Fu Cao},
  title        = {A comment on "An efficient common-multiplicand-multiplication
                  method to the Montgomery algorithm for speeding up exponentiation"},
  journal      = {Inf. Sci.},
  volume       = {223},
  pages        = {331--334},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.09.052},
  doi          = {10.1016/J.INS.2012.09.052},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SunHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/SunLFCX13,
  author       = {Da{-}Zhi Sun and
                  Jian{-}Xin Li and
                  Zhiyong Feng and
                  Zhen{-}Fu Cao and
                  Guangquan Xu},
  title        = {On the security and improvement of a two-factor user authentication
                  scheme in wireless sensor networks},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {17},
  number       = {5},
  pages        = {895--905},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00779-012-0540-3},
  doi          = {10.1007/S00779-012-0540-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/SunLFCX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LiLLSL13,
  author       = {Jianxin Li and
                  Xudong Liu and
                  Lu Liu and
                  Dazhi Sun and
                  Bo Li},
  title        = {HiTrust: building cross-organizational trust relationship based on
                  a hybrid negotiation tree},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {1353--1365},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9648-4},
  doi          = {10.1007/S11235-011-9648-4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LiLLSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwl/XuXSLF13,
  author       = {Rui Xu and
                  Guangquan Xu and
                  Da{-}Zhi Sun and
                  Xiaohong Li and
                  Zhiyong Feng},
  editor       = {Dickson K. W. Chiu and
                  Minhong Wang and
                  Elvira Popescu and
                  Qing Li and
                  Rynson W. H. Lau and
                  Timothy K. Shih and
                  Chu{-}Sing Yang and
                  Demetrios G. Sampson},
  title        = {Improving KeyNote Trust Management Model Based on User Behavior for
                  Social Learning},
  booktitle    = {Advances in Web-Based Learning - {ICWL} 2013 Workshops - {USL} 2013,
                  {IWSLL} 2013, {KMEL} 2013, {IWCWL} 2013, {WIL} 2013, and {IWEEC} 2013,
                  Kenting, Taiwan, October 6-9, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8390},
  pages        = {96--103},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-46315-4\_10},
  doi          = {10.1007/978-3-662-46315-4\_10},
  timestamp    = {Wed, 24 Feb 2021 16:22:28 +0100},
  biburl       = {https://dblp.org/rec/conf/icwl/XuXSLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/SunHL12,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Jian{-}Xin Li},
  title        = {A note on asynchronous multi-exponentiation algorithm using binary
                  representation},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {22},
  pages        = {876--879},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.08.006},
  doi          = {10.1016/J.IPL.2012.08.006},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/SunHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SunZ12,
  author       = {Da{-}Zhi Sun and
                  Ji{-}Dong Zhong},
  title        = {A hash-based {RFID} security protocol for strong privacy protection},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {58},
  number       = {4},
  pages        = {1246--1252},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCE.2012.6414992},
  doi          = {10.1109/TCE.2012.6414992},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/SunZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sun12,
  author       = {Da{-}Zhi Sun},
  title        = {An error in "On a new formal proof model for {RFID} location
                  privacy"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sun12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paap/HuGWCS11,
  author       = {Jingwei Hu and
                  Wei Guo and
                  Jizeng Wei and
                  Yisong Chang and
                  Dazhi Sun},
  editor       = {Jigang Wu and
                  Guozhi Song and
                  Hong Shen and
                  Guoliang Chen},
  title        = {A Novel Architecture for Fast {RSA} Key Generation Based on {RNS}},
  booktitle    = {Fourth International Symposium on Parallel Architectures, Algorithms
                  and Programming, {PAAP} 2011, Tianjin, China, December 9-11, 2011},
  pages        = {345--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PAAP.2011.75},
  doi          = {10.1109/PAAP.2011.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paap/HuGWCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ZengCS10,
  author       = {Peng Zeng and
                  Kim{-}Kwang Raymond Choo and
                  Da{-}Zhi Sun},
  title        = {On the security of an enhanced novel access control protocol for wireless
                  sensor networks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {56},
  number       = {2},
  pages        = {566--569},
  year         = {2010},
  url          = {https://doi.org/10.1109/TCE.2010.5505971},
  doi          = {10.1109/TCE.2010.5505971},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/ZengCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/LiLMS10,
  author       = {Jianxin Li and
                  Bo Li and
                  Linlin Meng and
                  Dazhi Sun},
  title        = {HiTrust: {A} Hybrid Tree Based Trust Negotiation Service},
  booktitle    = {24th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13
                  April 2010},
  pages        = {854--859},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WAINA.2010.149},
  doi          = {10.1109/WAINA.2010.149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/LiLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SunHSL09,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Jizhou Sun and
                  Jian{-}Xin Li},
  title        = {Cryptanalysis of a mutual authentication scheme based on nonce and
                  smart cards},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {6},
  pages        = {1015--1017},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2008.12.023},
  doi          = {10.1016/J.COMCOM.2008.12.023},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SunHSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/SunHSLZF09,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Jizhou Sun and
                  Jian{-}Xin Li and
                  Jiawan Zhang and
                  Zhiyong Feng},
  title        = {Improvements of Juang 's Password-Authenticated Key Agreement Scheme
                  Using Smart Cards},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {56},
  number       = {6},
  pages        = {2284--2291},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIE.2009.2016508},
  doi          = {10.1109/TIE.2009.2016508},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/SunHSLZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itsc/SunSRZ09,
  author       = {Dazhi Sun and
                  Lin Sun and
                  Pranay K. Ravoola and
                  Shuai Zhao},
  title        = {A microscopic simulation-based decision support system to develop
                  changeable message sign alternatives},
  booktitle    = {12th International {IEEE} Conference on Intelligent Transportation
                  Systems, {ITSC} 2009, St. Louis, MO, USA, October 5-7, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITSC.2009.5309802},
  doi          = {10.1109/ITSC.2009.5309802},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itsc/SunSRZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunC08,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao},
  title        = {New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication
                  Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {116--120},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n1/ijns-2008-v6-n1-p116-120.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SunC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SunHSZF08,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Jizhou Sun and
                  Jiawan Zhang and
                  Zhiyong Feng},
  title        = {A new design of wearable token system for mobile device security},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {54},
  number       = {4},
  pages        = {1784--1789},
  year         = {2008},
  url          = {https://doi.org/10.1109/TCE.2008.4711235},
  doi          = {10.1109/TCE.2008.4711235},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/SunHSZF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/Sun07a,
  author       = {Da{-}Zhi Sun},
  title        = {A note on Chang-Lai's modular square algorithm based on the generalized
                  Chinese remainder theorem},
  journal      = {Appl. Math. Comput.},
  volume       = {188},
  number       = {1},
  pages        = {411--416},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.amc.2006.10.006},
  doi          = {10.1016/J.AMC.2006.10.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/Sun07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/SunHSZ07,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Jizhou Sun and
                  Jiawan Zhang},
  title        = {Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation
                  algorithm},
  journal      = {Appl. Math. Comput.},
  volume       = {190},
  number       = {2},
  pages        = {1848--1854},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.amc.2007.02.066},
  doi          = {10.1016/J.AMC.2007.02.066},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/SunHSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SunHSC07,
  author       = {Da{-}Zhi Sun and
                  Jin{-}Peng Huai and
                  Jizhou Sun and
                  Zhen{-}Fu Cao},
  title        = {An Efficient Modular Exponentiation Algorithm against Simple Power
                  Analysis Attacks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {53},
  number       = {4},
  pages        = {1718--1723},
  year         = {2007},
  url          = {https://doi.org/10.1109/TCE.2007.4429275},
  doi          = {10.1109/TCE.2007.4429275},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/SunHSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/SunCS06,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao and
                  Yu Sun},
  title        = {How to compute modular exponentiation with large operators based on
                  the right-to-left binary algorithm},
  journal      = {Appl. Math. Comput.},
  volume       = {176},
  number       = {1},
  pages        = {280--292},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.amc.2005.09.062},
  doi          = {10.1016/J.AMC.2005.09.062},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/SunCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacie/SunBW06,
  author       = {Dazhi Sun and
                  Rahim F. Benekohal and
                  S. Travis Waller},
  title        = {Bi-level Programming Formulation and Heuristic Solution Approach for
                  Dynamic Traffic Signal Optimization},
  journal      = {Comput. Aided Civ. Infrastructure Eng.},
  volume       = {21},
  number       = {5},
  pages        = {321--333},
  year         = {2006},
  url          = {https://doi.org/10.1111/j.1467-8667.2006.00439.x},
  doi          = {10.1111/J.1467-8667.2006.00439.X},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacie/SunBW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/SunCS05,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao and
                  Yu Sun},
  title        = {Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme},
  journal      = {Appl. Math. Comput.},
  volume       = {164},
  number       = {3},
  pages        = {675--678},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.04.098},
  doi          = {10.1016/J.AMC.2004.04.098},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/SunCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/SunCS05a,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao and
                  Yu Sun},
  title        = {Remarks on a new key authentication scheme based on discrete logarithms},
  journal      = {Appl. Math. Comput.},
  volume       = {167},
  number       = {1},
  pages        = {572--575},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.07.021},
  doi          = {10.1016/J.AMC.2004.07.021},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/SunCS05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/SunC05,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao},
  title        = {Improved public key authentication scheme for non-repudiation},
  journal      = {Appl. Math. Comput.},
  volume       = {168},
  number       = {2},
  pages        = {927--932},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.09.021},
  doi          = {10.1016/J.AMC.2004.09.021},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/SunC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/SunZS05,
  author       = {Da{-}Zhi Sun and
                  Ji{-}Dong Zhong and
                  Yu Sun},
  title        = {Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication
                  scheme},
  journal      = {Appl. Math. Comput.},
  volume       = {170},
  number       = {2},
  pages        = {1185--1193},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2005.01.013},
  doi          = {10.1016/J.AMC.2005.01.013},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/SunZS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/SunC05,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao},
  editor       = {Lipo Wang and
                  Yaochu Jin},
  title        = {Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using
                  Smart Cards},
  booktitle    = {Fuzzy Systems and Knowledge Discovery, Second International Conference,
                  {FSKD} 2005, Changsha, China, August 27-29, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3614},
  pages        = {596--599},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11540007\_73},
  doi          = {10.1007/11540007\_73},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/SunC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SunBW03,
  author       = {Dazhi Sun and
                  Rahim F. Benekohal and
                  S. Travis Waller},
  editor       = {Erick Cant{\'{u}}{-}Paz and
                  James A. Foster and
                  Kalyanmoy Deb and
                  Lawrence Davis and
                  Rajkumar Roy and
                  Una{-}May O'Reilly and
                  Hans{-}Georg Beyer and
                  Russell K. Standish and
                  Graham Kendall and
                  Stewart W. Wilson and
                  Mark Harman and
                  Joachim Wegener and
                  Dipankar Dasgupta and
                  Mitchell A. Potter and
                  Alan C. Schultz and
                  Kathryn A. Dowsland and
                  Natasa Jonoska and
                  Julian F. Miller},
  title        = {Multi-objective Traffic Signal Timing Optimization Using Non-dominated
                  Sorting Genetic Algorithm {II}},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary
                  Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2724},
  pages        = {2420--2421},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45110-2\_143},
  doi          = {10.1007/3-540-45110-2\_143},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/SunBW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics