BibTeX records: Fushan Wei

download as .bib file

@article{DBLP:journals/access/WangZYWW20,
  author    = {Ding Wang and
               Peichang Zhang and
               Zeyu Yang and
               Fushan Wei and
               Cheng Wang},
  title     = {A Novel Estimator for {TDOA} and {FDOA} Positioning of Multiple Disjoint
               Sources in the Presence of Calibration Emitters},
  journal   = {{IEEE} Access},
  volume    = {8},
  pages     = {1613--1643},
  year      = {2020},
  url       = {https://doi.org/10.1109/ACCESS.2019.2959235},
  doi       = {10.1109/ACCESS.2019.2959235},
  timestamp = {Mon, 20 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/WangZYWW20},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoGCW19,
  author    = {Jiaxing Guo and
               Chunxiang Gu and
               Xi Chen and
               Fushan Wei},
  title     = {Model Learning and Model Checking of IPSec Implementations for Internet
               of Things},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {171322--171332},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2956062},
  doi       = {10.1109/ACCESS.2019.2956062},
  timestamp = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/GuoGCW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WangYZJW19,
  author    = {Ding Wang and
               Jiexin Yin and
               Tao Zhang and
               Changgui Jia and
               Fushan Wei},
  title     = {Iterative constrained weighted least squares estimator for {TDOA}
               and {FDOA} positioning of multiple disjoint sources in the presence
               of sensor position and velocity uncertainties},
  journal   = {Digital Signal Processing},
  volume    = {92},
  pages     = {179--205},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.dsp.2019.06.001},
  doi       = {10.1016/j.dsp.2019.06.001},
  timestamp = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dsp/WangYZJW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/WangYCJW19,
  author    = {Ding Wang and
               Jiexin Yin and
               Xin Chen and
               Changgui Jia and
               Fushan Wei},
  title     = {On the use of calibration emitters for {TDOA} source localization
               in the presence of synchronization clock bias and sensor location
               errors},
  journal   = {{EURASIP} J. Adv. Sig. Proc.},
  volume    = {2019},
  pages     = {37},
  year      = {2019},
  url       = {https://doi.org/10.1186/s13634-019-0629-1},
  doi       = {10.1186/s13634-019-0629-1},
  timestamp = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ejasp/WangYCJW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/0001QMMCW19,
  author    = {Qi Jiang and
               Yuanyuan Qian and
               Jianfeng Ma and
               XinDi Ma and
               Qingfeng Cheng and
               Fushan Wei},
  title     = {User centric three-factor authentication protocol for cloud-assisted
               wearable devices},
  journal   = {Int. J. Communication Systems},
  volume    = {32},
  number    = {6},
  year      = {2019},
  url       = {https://doi.org/10.1002/dac.3900},
  doi       = {10.1002/dac.3900},
  timestamp = {Mon, 15 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcomsys/0001QMMCW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WeiVSZL18,
  author    = {Fushan Wei and
               Pandi Vijayakumar and
               Jian Shen and
               Ruijie Zhang and
               Li Li},
  title     = {A provably secure password-based anonymous authentication scheme for
               wireless body area networks},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {65},
  pages     = {322--331},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.compeleceng.2017.04.017},
  doi       = {10.1016/j.compeleceng.2017.04.017},
  timestamp = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cee/WeiVSZL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/WeiKHY18,
  author    = {Fushan Wei and
               Neeraj Kumar and
               Debiao He and
               Sang{-}Soo Yeo},
  title     = {A general compiler for password-authenticated group key exchange protocol
               in the standard model},
  journal   = {Discrete Applied Mathematics},
  volume    = {241},
  pages     = {78--86},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.dam.2016.04.007},
  doi       = {10.1016/j.dam.2016.04.007},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dam/WeiKHY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WeiZM18,
  author    = {Fushan Wei and
               Ruijie Zhang and
               Chuangui Ma},
  title     = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange
               Protocol for Cloud Computing},
  journal   = {Fundam. Inform.},
  volume    = {157},
  number    = {1-2},
  pages     = {201--220},
  year      = {2018},
  url       = {https://doi.org/10.3233/FI-2018-1626},
  doi       = {10.3233/FI-2018-1626},
  timestamp = {Wed, 31 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fuin/WeiZM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/MiaoMWZL18,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Fushan Wei and
               Kai Zhang and
               Zhiquan Liu},
  title     = {{VKSE-DO:} verifiable keyword search over encrypted data for dynamic
               data-owner},
  journal   = {{IJHPCN}},
  volume    = {12},
  number    = {1},
  pages     = {39--48},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJHPCN.2018.10015026},
  doi       = {10.1504/IJHPCN.2018.10015026},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijhpcn/MiaoMWZL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenZWSX18,
  author    = {Jian Shen and
               Tianqi Zhou and
               Fushan Wei and
               Xingming Sun and
               Yang Xiang},
  title     = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G}
               in the Social Internet of Things},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {5},
  number    = {4},
  pages     = {2526--2536},
  year      = {2018},
  url       = {https://doi.org/10.1109/JIOT.2017.2775248},
  doi       = {10.1109/JIOT.2017.2775248},
  timestamp = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iotj/ShenZWSX18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/DouWMW18,
  author    = {Yunqi Dou and
               Jiang Weng and
               Chuangui Ma and
               Fushan Wei},
  title     = {Revisiting the Expansion Length of Triple-base Number System for Elliptic
               Curve Scalar Multiplication},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {34},
  number    = {3},
  pages     = {721--732},
  year      = {2018},
  url       = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=162\_2144},
  timestamp = {Tue, 29 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jise/DouWMW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMLLSW18,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Zhiquan Liu and
               Limin Shen and
               Fushan Wei},
  title     = {{VMKDO:} Verifiable multi-keyword search over encrypted cloud data
               for dynamic data-owner},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {11},
  number    = {2},
  pages     = {287--297},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12083-016-0487-7},
  doi       = {10.1007/s12083-016-0487-7},
  timestamp = {Fri, 16 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ppna/MiaoMLLSW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMLLZW18,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Zhiquan Liu and
               Junwei Zhang and
               Fushan Wei},
  title     = {{DOAS:} Efficient data owner authorized search over encrypted cloud
               data},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {11},
  number    = {3},
  pages     = {349--360},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12083-016-0523-7},
  doi       = {10.1007/s12083-016-0523-7},
  timestamp = {Thu, 15 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ppna/MiaoMLLZW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/0001MW18,
  author    = {Qi Jiang and
               Jianfeng Ma and
               Fushan Wei},
  title     = {On the Security of a Privacy-Aware Authentication Scheme for Distributed
               Mobile Cloud Computing Services},
  journal   = {{IEEE} Systems Journal},
  volume    = {12},
  number    = {2},
  pages     = {2039--2042},
  year      = {2018},
  url       = {https://doi.org/10.1109/JSYST.2016.2574719},
  doi       = {10.1109/JSYST.2016.2574719},
  timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sj/0001MW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangXW18,
  author    = {Ke Zhang and
               Kai Xu and
               Fushan Wei},
  title     = {A Provably Secure Anonymous Authenticated Key Exchange Protocol Based
               on {ECC} for Wireless Sensor Networks},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {2018},
  pages     = {2484268:1--2484268:9},
  year      = {2018},
  url       = {https://doi.org/10.1155/2018/2484268},
  doi       = {10.1155/2018/2484268},
  timestamp = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wicomm/ZhangXW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiLZWW18,
  author    = {Wenting Li and
               Bin Li and
               Yiming Zhao and
               Ping Wang and
               Fushan Wei},
  title     = {Cryptanalysis and Security Enhancement of Three Authentication Schemes
               in Wireless Sensor Networks},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {2018},
  pages     = {8539674:1--8539674:11},
  year      = {2018},
  url       = {https://doi.org/10.1155/2018/8539674},
  doi       = {10.1155/2018/8539674},
  timestamp = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wicomm/LiLZWW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/ZhangSWLS17,
  author    = {Ruijie Zhang and
               Jian Shen and
               Fushan Wei and
               Xiong Li and
               Arun Kumar Sangaiah},
  title     = {Medical image classification based on multi-scale non-negative sparse
               coding},
  journal   = {Artificial Intelligence in Medicine},
  volume    = {83},
  pages     = {44--51},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.artmed.2017.05.006},
  doi       = {10.1016/j.artmed.2017.05.006},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/artmed/ZhangSWLS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WeiMZMW17,
  author    = {Fushan Wei and
               Jianfeng Ma and
               Ruijie Zhang and
               Chuangui Ma and
               Xu An Wang},
  title     = {An efficient and practical threshold gateway-oriented password-authenticated
               key exchange protocol in the standard model},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {60},
  number    = {7},
  pages     = {72103},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11432-016-5535-7},
  doi       = {10.1007/s11432-016-5535-7},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/WeiMZMW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ShenSLWL17,
  author    = {Jian Shen and
               Jun Shen and
               Xiong Li and
               Fushan Wei and
               Jiguo Li},
  title     = {Outsourced data modification algorithm with assistance of multi-assistants
               in cloud computing},
  journal   = {IJSNet},
  volume    = {24},
  number    = {1},
  pages     = {62--73},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJSNET.2017.10005205},
  doi       = {10.1504/IJSNET.2017.10005205},
  timestamp = {Sun, 22 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijsnet/ShenSLWL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenMLWM17,
  author    = {Limin Shen and
               Jianfeng Ma and
               Ximeng Liu and
               Fushan Wei and
               Meixia Miao},
  title     = {A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless
               Sensor Networks},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {4},
  number    = {2},
  pages     = {546--554},
  year      = {2017},
  url       = {https://doi.org/10.1109/JIOT.2016.2557487},
  doi       = {10.1109/JIOT.2016.2557487},
  timestamp = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iotj/ShenMLWM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WeiJZM17,
  author    = {Fushan Wei and
               Qi Jiang and
               Ruijie Zhang and
               Chuangui Ma},
  title     = {A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol
               with Provable Security for Cloud Computing},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {33},
  number    = {4},
  pages     = {907--921},
  year      = {2017},
  url       = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2049},
  timestamp = {Mon, 07 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jise/WeiJZM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMWLWL17,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Fushan Wei and
               Zhiquan Liu and
               Xu An Wang and
               Cunbo Lu},
  title     = {{VCSE:} Verifiable conjunctive keywords search over encrypted data
               without secure-channel},
  journal   = {Peer-to-Peer Networking and Applications},
  volume    = {10},
  number    = {4},
  pages     = {995--1007},
  year      = {2017},
  url       = {https://doi.org/10.1007/s12083-016-0458-z},
  doi       = {10.1007/s12083-016-0458-z},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ppna/MiaoMWLWL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/DouWMW17,
  author    = {Yunqi Dou and
               Jiang Weng and
               Chuangui Ma and
               Fushan Wei},
  title     = {Secure and efficient {ECC} speeding up algorithms for wireless sensor
               networks},
  journal   = {Soft Comput.},
  volume    = {21},
  number    = {19},
  pages     = {5665--5673},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00500-016-2142-x},
  doi       = {10.1007/s00500-016-2142-x},
  timestamp = {Mon, 02 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/soco/DouWMW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YinMLSZMW17,
  author    = {Jun Yin and
               Chuyan Ma and
               Lijun Lyu and
               Jian Song and
               Guang Zeng and
               Chuangui Ma and
               Fushan Wei},
  title     = {Improved Cryptanalysis of an {ISO} Standard Lightweight Block Cipher
               with Refined {MILP} Modelling},
  booktitle = {Information Security and Cryptology - 13th International Conference,
               Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
               Papers},
  pages     = {404--426},
  year      = {2017},
  crossref  = {DBLP:conf/cisc/2017},
  url       = {https://doi.org/10.1007/978-3-319-75160-3\_24},
  doi       = {10.1007/978-3-319-75160-3\_24},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/YinMLSZMW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/DouMLW17,
  author    = {Yunqi Dou and
               Chuangui Ma and
               Yanbin Li and
               Fushan Wei},
  title     = {An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication
               on Koblitz Curves for Cloud Computing},
  booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS}
               2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
               {I}},
  pages     = {542--551},
  year      = {2017},
  crossref  = {DBLP:conf/icccsec/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-68505-2\_47},
  doi       = {10.1007/978-3-319-68505-2\_47},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/DouMLW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ZhangCWZ17,
  author    = {Junqi Zhang and
               Qingfeng Cheng and
               Fushan Wei and
               Xinglong Zhang},
  title     = {A Compact Construction for Non-monotonic Online/Offline {CP-ABE} Scheme},
  booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and
               Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
               12-15, 2017, Proceedings},
  pages     = {507--523},
  year      = {2017},
  crossref  = {DBLP:conf/spaccs/2017w},
  url       = {https://doi.org/10.1007/978-3-319-72395-2\_47},
  doi       = {10.1007/978-3-319-72395-2\_47},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spaccs/ZhangCWZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WangXCMW16,
  author    = {Xu An Wang and
               Fatos Xhafa and
               Weiyi Cai and
               Jianfeng Ma and
               Fushan Wei},
  title     = {Efficient privacy preserving predicate encryption with fine-grained
               searchable capability for Cloud storage},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {56},
  pages     = {871--883},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.compeleceng.2016.05.012},
  doi       = {10.1016/j.compeleceng.2016.05.012},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cee/WangXCMW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiJSW16,
  author    = {Guangsong Li and
               Qi Jiang and
               Yanan Shi and
               Fushan Wei},
  title     = {Anonymous Network Information Acquirement Protocol for Mobile Users
               in Heterogeneous Wireless Networks},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {1},
  pages     = {193--200},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p193-200.pdf},
  timestamp = {Thu, 22 Sep 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LiJSW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiWM16,
  author    = {Fushan Wei and
               Yun Wei and
               Chuangui Ma},
  title     = {Attack on An ID-based Authenticated Group Key Exchange Protocol with
               Identifying Malicious Participants},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {2},
  pages     = {393--396},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p393-396.pdf},
  timestamp = {Mon, 12 Oct 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/WeiWM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/WeiMJSM16,
  author    = {Fushan Wei and
               Jianfeng Ma and
               Qi Jiang and
               Jian Shen and
               Chuangui Ma},
  title     = {Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication
               Scheme in Wireless Sensor Networks},
  journal   = {{ITC}},
  volume    = {45},
  number    = {1},
  pages     = {62--70},
  year      = {2016},
  url       = {https://doi.org/10.5755/j01.itc.45.1.11949},
  doi       = {10.5755/j01.itc.45.1.11949},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itc/WeiMJSM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MiaoMLWLW16,
  author    = {Yinbin Miao and
               Jianfeng Ma and
               Ximeng Liu and
               Fushan Wei and
               Zhiquan Liu and
               Xu An Wang},
  title     = {m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal
               Health Records in Multi-Owner Setting},
  journal   = {J. Medical Systems},
  volume    = {40},
  number    = {11},
  pages     = {246:1--246:12},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10916-016-0617-z},
  doi       = {10.1007/s10916-016-0617-z},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jms/MiaoMLWLW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiangMWTSY16,
  author    = {Qi Jiang and
               Jianfeng Ma and
               Fushan Wei and
               Youliang Tian and
               Jian Shen and
               Yuanyuan Yang},
  title     = {An untraceable temporal-credential-based two-factor authentication
               scheme using {ECC} for wireless sensor networks},
  journal   = {J. Network and Computer Applications},
  volume    = {76},
  pages     = {37--48},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.jnca.2016.10.001},
  doi       = {10.1016/j.jnca.2016.10.001},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/JiangMWTSY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/XiaoGWM16,
  author    = {Siyu Xiao and
               Aijun Ge and
               Fushan Wei and
               Chuangui Ma},
  title     = {Ciphertext-Policy Attribute Based Encryption with Large Attribute
               Universe},
  booktitle = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings
               of the 11th International Conference on P2P, Parallel, Grid, Cloud
               and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan,
               South Korea, November 5-7, 2016},
  pages     = {115--122},
  year      = {2016},
  crossref  = {DBLP:conf/3pgcic/2016},
  url       = {https://doi.org/10.1007/978-3-319-49109-7\_11},
  doi       = {10.1007/978-3-319-49109-7\_11},
  timestamp = {Mon, 18 Jun 2018 21:16:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/3pgcic/XiaoGWM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/WeiZS16,
  author    = {Fushan Wei and
               Ruijie Zhang and
               Jian Shen},
  title     = {A Provably Secure Two-Factor Authenticated Key Exchange Protocol for
               Wireless Sensor Networks Based on Authenticated Encryption},
  booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications,
               Proceedings of the 11th International Conference On Broad-Band Wireless
               Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
               University, Asan, Korea, November 5-7, 2016},
  pages     = {849--855},
  year      = {2016},
  crossref  = {DBLP:conf/bwcca/2016},
  url       = {https://doi.org/10.1007/978-3-319-49106-6\_87},
  doi       = {10.1007/978-3-319-49106-6\_87},
  timestamp = {Mon, 10 Jul 2017 17:07:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bwcca/WeiZS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WeiZM16,
  author    = {Fushan Wei and
               Ruijie Zhang and
               Chuangui Ma},
  title     = {Two Factor Authenticated Key Exchange Protocol for Wireless Sensor
               Networks: Formal Model and Secure Construction},
  booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  pages     = {377--388},
  year      = {2016},
  crossref  = {DBLP:conf/icccsec/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-48671-0\_34},
  doi       = {10.1007/978-3-319-48671-0\_34},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/WeiZM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShenSLWL16,
  author    = {Jian Shen and
               Jun Shen and
               Xiong Li and
               Fushan Wei and
               Jiguo Li},
  title     = {Outsourced Data Modification Algorithm with Assistance of Multi-assistants
               in Cloud Computing},
  booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  pages     = {389--408},
  year      = {2016},
  crossref  = {DBLP:conf/icccsec/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-48671-0\_35},
  doi       = {10.1007/978-3-319-48671-0\_35},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/ShenSLWL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ChenWM15,
  author    = {Lei Chen and
               Fushan Wei and
               Chuangui Ma},
  title     = {A Secure User Authentication Scheme against Smart-Card Loss Attack
               for Wireless Sensor Networks Using Symmetric Key Techniques},
  journal   = {{IJDSN}},
  volume    = {11},
  pages     = {704502:1--704502:10},
  year      = {2015},
  url       = {https://doi.org/10.1155/2015/704502},
  doi       = {10.1155/2015/704502},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijdsn/ChenWM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WeiMML15,
  author    = {Fushan Wei and
               Jianfeng Ma and
               Chuangui Ma and
               Xinghua Li},
  title     = {A two-factor authenticated key exchange protocol based on {RSA} with
               dynamic passwords},
  journal   = {{IJES}},
  volume    = {7},
  number    = {3/4},
  pages     = {257--265},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJES.2015.072366},
  doi       = {10.1504/IJES.2015.072366},
  timestamp = {Sat, 06 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijes/WeiMML15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/WeiMGLM15,
  author    = {Fushan Wei and
               Jianfeng Ma and
               Aijun Ge and
               Guangsong Li and
               Chuangui Ma},
  title     = {A Provably Secure Three-Party Password Authenticated Key Exchange
               Protocol without Using Server's Public-Keys and Symmetric Cryptosystems},
  journal   = {{ITC}},
  volume    = {44},
  number    = {2},
  pages     = {195--206},
  year      = {2015},
  url       = {https://doi.org/10.5755/j01.itc.44.2.8197},
  doi       = {10.5755/j01.itc.44.2.8197},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itc/WeiMGLM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiJWM15,
  author    = {Guangsong Li and
               Qi Jiang and
               Fushan Wei and
               Chuangui Ma},
  title     = {A New Privacy-Aware Handover Authentication Scheme for Wireless Networks},
  journal   = {Wireless Personal Communications},
  volume    = {80},
  number    = {2},
  pages     = {581--589},
  year      = {2015},
  url       = {https://doi.org/10.1007/s11277-014-2029-z},
  doi       = {10.1007/s11277-014-2029-z},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wpc/LiJWM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/DouWMW15,
  author    = {Yunqi Dou and
               Jiang Weng and
               Chuangui Ma and
               Fushan Wei},
  title     = {Fast Scalar Multiplication Algorithm Using Constrained Triple-Base
               Number System and Its Applications},
  booktitle = {10th International Conference on Broadband and Wireless Computing,
               Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
               4-6, 2015},
  pages     = {426--431},
  year      = {2015},
  crossref  = {DBLP:conf/bwcca/2015},
  url       = {https://doi.org/10.1109/BWCCA.2015.24},
  doi       = {10.1109/BWCCA.2015.24},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bwcca/DouWMW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiLWMY15,
  author    = {Xinghua Li and
               Hai Liu and
               Fushan Wei and
               Jianfeng Ma and
               Weidong Yang},
  title     = {A Lightweight Anonymous Authentication Protocol Using k-Pseudonym
               Set in Wireless Networks},
  booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
               Diego, CA, USA, December 6-10, 2015},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/globecom/2015},
  url       = {https://doi.org/10.1109/GLOCOM.2014.7417584},
  doi       = {10.1109/GLOCOM.2014.7417584},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/LiLWMY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TianWM15,
  author    = {Baoping Tian and
               Fushan Wei and
               Chuangui Ma},
  title     = {Strongly Secure Key Exchange Protocol with Minimal {KEM}},
  booktitle = {Information Security Practice and Experience - 11th International
               Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  pages     = {139--153},
  year      = {2015},
  crossref  = {DBLP:conf/ispec/2015},
  url       = {https://doi.org/10.1007/978-3-319-17533-1\_10},
  doi       = {10.1007/978-3-319-17533-1\_10},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/TianWM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhangWL14a,
  author    = {Ruijie Zhang and
               Fushan Wei and
               Bicheng Li},
  title     = {{E2LSH} based multiple kernel approach for object detection},
  journal   = {Neurocomputing},
  volume    = {124},
  pages     = {105--110},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.neucom.2013.07.027},
  doi       = {10.1016/j.neucom.2013.07.027},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijon/ZhangWL14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TianWM14,
  author    = {Baoping Tian and
               Fushan Wei and
               Chuangui Ma},
  title     = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol
               over {RSA} Group},
  booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
               China, December 16-17, 2014, Revised Selected Papers},
  pages     = {407--421},
  year      = {2014},
  crossref  = {DBLP:conf/intrust/2014},
  url       = {https://doi.org/10.1007/978-3-319-27998-5\_26},
  doi       = {10.1007/978-3-319-27998-5\_26},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/TianWM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WeiWM14,
  author    = {Yun Wei and
               Fushan Wei and
               Chuangui Ma},
  title     = {Certificateless Non-Interactive Key Exchange Protocol without Pairings},
  booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
               on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages     = {31--42},
  year      = {2014},
  crossref  = {DBLP:conf/secrypt/2014},
  url       = {http://ieeexplore.ieee.org/document/7509472/},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/WeiWM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WeiZM13,
  author    = {Fushan Wei and
               Zhenfeng Zhang and
               Chuangui Ma},
  title     = {Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based
               Authenticated Key Exchange Protocol},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {9},
  pages     = {1864--1871},
  year      = {2013},
  url       = {https://doi.org/10.1587/transfun.E96.A.1864},
  doi       = {10.1587/transfun.E96.A.1864},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/WeiZM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MaWG13,
  author    = {Chuangui Ma and
               Fushan Wei and
               Fengxiu Gao},
  title     = {Efficient Client-to-Client Password Authenticated Key Exchange Based
               on {RSA}},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {233--238},
  year      = {2013},
  crossref  = {DBLP:conf/incos/2013},
  url       = {https://doi.org/10.1109/INCoS.2013.41},
  doi       = {10.1109/INCoS.2013.41},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/incos/MaWG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WeiZM12,
  author    = {Fushan Wei and
               Zhenfeng Zhang and
               Chuangui Ma},
  title     = {Gateway-oriented password-authenticated key exchange protocol in the
               standard model},
  journal   = {Journal of Systems and Software},
  volume    = {85},
  number    = {3},
  pages     = {760--768},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jss.2011.09.061},
  doi       = {10.1016/j.jss.2011.09.061},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/WeiZM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WeiZM12a,
  author    = {Fushan Wei and
               Zhenfeng Zhang and
               Chuangui Ma},
  title     = {Corrigendum to "Gateway-oriented password-authenticated key exchange
               protocol in the standard model" {[J.} Syst. Softw. 85 (March
               {(3))} {(2012)} 760-768]},
  journal   = {Journal of Systems and Software},
  volume    = {85},
  number    = {9},
  pages     = {2192},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jss.2012.05.070},
  doi       = {10.1016/j.jss.2012.05.070},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/WeiZM12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ChengMW11,
  author    = {Qingfeng Cheng and
               Chuangui Ma and
               Fushan Wei},
  title     = {Analysis and improvement of a new authenticated group key agreement
               in a mobile environment},
  journal   = {Annales des T{\'{e}}l{\'{e}}communications},
  volume    = {66},
  number    = {5-6},
  pages     = {331--337},
  year      = {2011},
  url       = {https://doi.org/10.1007/s12243-010-0213-z},
  doi       = {10.1007/s12243-010-0213-z},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/adt/ChengMW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/WeiMC11,
  author    = {Fushan Wei and
               Chuangui Ma and
               Qingfeng Cheng},
  title     = {Anonymous gateway-oriented password-based authenticated key exchange
               based on {RSA}},
  journal   = {{EURASIP} J. Wireless Comm. and Networking},
  volume    = {2011},
  pages     = {162},
  year      = {2011},
  url       = {https://doi.org/10.1186/1687-1499-2011-162},
  doi       = {10.1186/1687-1499-2011-162},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejwcn/WeiMC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WeiMZ11,
  author    = {Fushan Wei and
               Chuangui Ma and
               Zhenfeng Zhang},
  title     = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with
               Stronger Security},
  booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
               China, October 16-18, 2011. Proceedings},
  pages     = {366--379},
  year      = {2011},
  crossref  = {DBLP:conf/provsec/2011},
  url       = {https://doi.org/10.1007/978-3-642-24316-5\_26},
  doi       = {10.1007/978-3-642-24316-5\_26},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/WeiMZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuWM10,
  author    = {Ying Liu and
               Fushan Wei and
               Chuangui Ma},
  title     = {Multi-Factor Authenticated Key Exchange Protocol in the Three-Party
               Setting},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  pages     = {255--267},
  year      = {2010},
  crossref  = {DBLP:conf/cisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-21518-6\_18},
  doi       = {10.1007/978-3-642-21518-6\_18},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/LiuWM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icica/WeiMC10,
  author    = {Fushan Wei and
               Chuangui Ma and
               Qingfeng Cheng},
  title     = {Three-Party Password-Based Authenticated Key Exchange Protocol Based
               on Bilinear Pairings},
  booktitle = {Information Computing and Applications - First International Conference,
               {ICICA} 2010, Tangshan, China, October 15-18, 2010. Proceedings},
  pages     = {135--142},
  year      = {2010},
  crossref  = {DBLP:conf/icica/2010},
  url       = {https://doi.org/10.1007/978-3-642-16167-4\_18},
  doi       = {10.1007/978-3-642-16167-4\_18},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icica/WeiMC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengMW10,
  author    = {Qingfeng Cheng and
               Chuangui Ma and
               Fushan Wei},
  title     = {A modified eCK model with stronger security for tripartite authenticated
               key exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {42},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/042},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChengMW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2017,
  editor    = {Xiaofeng Chen and
               Dongdai Lin and
               Moti Yung},
  title     = {Information Security and Cryptology - 13th International Conference,
               Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10726},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-75160-3},
  doi       = {10.1007/978-3-319-75160-3},
  isbn      = {978-3-319-75159-7},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2017-1,
  editor    = {Xingming Sun and
               Han{-}Chieh Chao and
               Xingang You and
               Elisa Bertino},
  title     = {Cloud Computing and Security - Third International Conference, {ICCCS}
               2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10602},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68505-2},
  doi       = {10.1007/978-3-319-68505-2},
  isbn      = {978-3-319-68504-5},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spaccs/2017w,
  editor    = {Guojun Wang and
               Mohammed Atiquzzaman and
               Zheng Yan and
               Kim{-}Kwang Raymond Choo},
  title     = {Security, Privacy, and Anonymity in Computation, Communication, and
               Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
               12-15, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10658},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72395-2},
  doi       = {10.1007/978-3-319-72395-2},
  isbn      = {978-3-319-72394-5},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spaccs/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/3pgcic/2016,
  editor    = {Fatos Xhafa and
               Leonard Barolli and
               Flora Amato},
  title     = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings
               of the 11th International Conference on P2P, Parallel, Grid, Cloud
               and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan,
               South Korea, November 5-7, 2016},
  series    = {Lecture Notes on Data Engineering and Communications Technologies},
  volume    = {1},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-49109-7},
  doi       = {10.1007/978-3-319-49109-7},
  isbn      = {978-3-319-49108-0},
  timestamp = {Mon, 18 Jun 2018 21:16:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/3pgcic/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bwcca/2016,
  editor    = {Leonard Barolli and
               Fatos Xhafa and
               Kangbin Yim},
  title     = {Advances on Broad-Band Wireless Computing, Communication and Applications,
               Proceedings of the 11th International Conference On Broad-Band Wireless
               Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
               University, Asan, Korea, November 5-7, 2016},
  series    = {Lecture Notes on Data Engineering and Communications Technologies},
  volume    = {2},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-49106-6},
  doi       = {10.1007/978-3-319-49106-6},
  isbn      = {978-3-319-49105-9},
  timestamp = {Mon, 10 Jul 2017 17:07:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bwcca/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2016-1,
  editor    = {Xingming Sun and
               Alex X. Liu and
               Han{-}Chieh Chao and
               Elisa Bertino},
  title     = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10039},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-48671-0},
  doi       = {10.1007/978-3-319-48671-0},
  isbn      = {978-3-319-48670-3},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bwcca/2015,
  editor    = {Leonard Barolli and
               Fatos Xhafa and
               Marek R. Ogiela and
               Lidia Ogiela},
  title     = {10th International Conference on Broadband and Wireless Computing,
               Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
               4-6, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7422215/proceeding},
  isbn      = {978-1-4673-8315-8},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bwcca/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2015,
  title     = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
               Diego, CA, USA, December 6-10, 2015},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7414714/proceeding},
  isbn      = {978-1-4799-5952-5},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2015,
  editor    = {Javier L{\'{o}}pez and
               Yongdong Wu},
  title     = {Information Security Practice and Experience - 11th International
               Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9065},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17533-1},
  doi       = {10.1007/978-3-319-17533-1},
  isbn      = {978-3-319-17532-4},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2014,
  editor    = {Moti Yung and
               Liehuang Zhu and
               Yanjiang Yang},
  title     = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
               China, December 16-17, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9473},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27998-5},
  doi       = {10.1007/978-3-319-27998-5},
  isbn      = {978-3-319-27997-8},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2014,
  editor    = {Mohammad S. Obaidat and
               Andreas Holzinger and
               Pierangela Samarati},
  title     = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
               on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  publisher = {SciTePress},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7504670/proceeding},
  isbn      = {978-989-758-045-1},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/incos/2013,
  title     = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6630246/proceeding},
  isbn      = {978-0-7695-4988-0},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/incos/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2011,
  editor    = {Xavier Boyen and
               Xiaofeng Chen},
  title     = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
               China, October 16-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6980},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24316-5},
  doi       = {10.1007/978-3-642-24316-5},
  isbn      = {978-3-642-24315-8},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21518-6},
  doi       = {10.1007/978-3-642-21518-6},
  isbn      = {978-3-642-21517-9},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icica/2010,
  editor    = {Rongbo Zhu and
               Yanchun Zhang and
               Baoxiang Liu and
               Chunfeng Liu},
  title     = {Information Computing and Applications - First International Conference,
               {ICICA} 2010, Tangshan, China, October 15-18, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6377},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16167-4},
  doi       = {10.1007/978-3-642-16167-4},
  isbn      = {978-3-642-16166-7},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icica/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics