BibTeX records: Wei Wu 0001

download as .bib file

@article{DBLP:journals/csi/YangYZWW24,
  author       = {Niao Yang and
                  Shaojun Yang and
                  Yong Zhao and
                  Wei Wu and
                  Xuewei Wang},
  title        = {Inner product encryption from Middle-Product Learning With Errors},
  journal      = {Comput. Stand. Interfaces},
  volume       = {87},
  pages        = {103755},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103755},
  doi          = {10.1016/J.CSI.2023.103755},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/YangYZWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/FengLWH24,
  author       = {Mengqi Feng and
                  Chao Lin and
                  Wei Wu and
                  Debiao He},
  title        = {SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic
                  size},
  journal      = {Comput. Stand. Interfaces},
  volume       = {87},
  pages        = {103763},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103763},
  doi          = {10.1016/J.CSI.2023.103763},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/FengLWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/YangYLYKLWZ24,
  author       = {Xu Yang and
                  Xuechao Yang and
                  Junwei Luo and
                  Xun Yi and
                  Ibrahim Khalil and
                  Shangqi Lai and
                  Wei Wu and
                  Albert Y. Zomaya},
  title        = {Towards Sustainable Trust: {A} Practical {SGX} Aided Anonymous Reputation
                  System},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {88--99},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSUSC.2023.3308081},
  doi          = {10.1109/TSUSC.2023.3308081},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsusc/YangYLYKLWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhouZWH24,
  author       = {Mengjie Zhou and
                  Xiaotong Zhou and
                  Wei Wu and
                  Debiao He},
  title        = {{LPDB:} Lightweight Policy-Driven Blockchain With Batch Verification
                  for Rail Transit Systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {4},
  pages        = {5100--5112},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2023.3330889},
  doi          = {10.1109/TVT.2023.3330889},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhouZWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhaoYWH23,
  author       = {Yong Zhao and
                  Shao{-}Jun Yang and
                  Wei Wu and
                  Xinyi Huang},
  title        = {A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators
                  for Trees},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {12},
  pages        = {2961--2973},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac140},
  doi          = {10.1093/COMJNL/BXAC140},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhaoYWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChenLWNLH23,
  author       = {Xiuyuan Chen and
                  Chao Lin and
                  Wei Wu and
                  Jianting Ning and
                  Junzuo Lai and
                  Debiao He},
  title        = {Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains:
                  Architecture, Challenges, and Solutions},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {8},
  pages        = {130--136},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.006.2200835},
  doi          = {10.1109/MCOM.006.2200835},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ChenLWNLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiuYWHX23,
  author       = {Jianghua Liu and
                  Jian Yang and
                  Wei Wu and
                  Xinyi Huang and
                  Yang Xiang},
  title        = {Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted
                  Healthcare IoT},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {5},
  pages        = {1384--1395},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3207138},
  doi          = {10.1109/TC.2022.3207138},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LiuYWHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SongZHWY23,
  author       = {Yongcheng Song and
                  Jiang Zhang and
                  Xinyi Huang and
                  Wei Wu and
                  Haining Yang},
  title        = {Statistical zero-knowledge and analysis of rank-metric zero-knowledge
                  proofs of knowledge},
  journal      = {Theor. Comput. Sci.},
  volume       = {952},
  pages        = {113731},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2023.113731},
  doi          = {10.1016/J.TCS.2023.113731},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SongZHWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/NiAWLLS23,
  author       = {Jianbing Ni and
                  Man Ho Au and
                  Wei Wu and
                  Xiapu Luo and
                  Xiaodong Lin and
                  Xuemin Sherman Shen},
  title        = {Dual-Anonymous Off-Line Electronic Cash for Mobile Payment},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {6},
  pages        = {3303--3317},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2021.3135301},
  doi          = {10.1109/TMC.2021.3135301},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/NiAWLLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhouHKWC23,
  author       = {Xiaotong Zhou and
                  Debiao He and
                  Muhammad Khurram Khan and
                  Wei Wu and
                  Kim{-}Kwang Raymond Choo},
  title        = {An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication
                  Protocol for VANETs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {1},
  pages        = {81--92},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3204582},
  doi          = {10.1109/TVT.2022.3204582},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhouHKWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SongZHW23,
  author       = {Yongcheng Song and
                  Jiang Zhang and
                  Xinyi Huang and
                  Wei Wu},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Blockwise Rank Decoding Problem and {LRPC} Codes: Cryptosystems with
                  Smaller Sizes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14444},
  pages        = {284--316},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8739-9\_10},
  doi          = {10.1007/978-981-99-8739-9\_10},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SongZHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongZHW23,
  author       = {Yongcheng Song and
                  Jiang Zhang and
                  Xinyi Huang and
                  Wei Wu},
  title        = {Blockwise Rank Decoding Problem and {LRPC} Codes: Cryptosystems with
                  Smaller Sizes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1387},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1387},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongZHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LaiHHW22,
  author       = {Jianchang Lai and
                  Xinyi Huang and
                  Debiao He and
                  Wei Wu},
  title        = {Provably Secure Online/Offline Identity-Based Signature Scheme Based
                  on {SM9}},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {7},
  pages        = {1692--1701},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab009},
  doi          = {10.1093/COMJNL/BXAB009},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LaiHHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuLNHW22,
  author       = {Pengfei Wu and
                  Qi Li and
                  Jianting Ning and
                  Xinyi Huang and
                  Wei Wu},
  title        = {Differentially Oblivious Data Analysis With Intel {SGX:} Design, Optimization,
                  and Evaluation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3741--3758},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3106317},
  doi          = {10.1109/TDSC.2021.3106317},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuLNHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YangYWZ22,
  author       = {Wei Yang and
                  Shao{-}Jun Yang and
                  Wei Wu and
                  Yong Zhao},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {A Combination Reduction Algorithm and Its Application},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {667--683},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_38},
  doi          = {10.1007/978-3-031-23020-2\_38},
  timestamp    = {Wed, 01 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/YangYWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/Yang0ZW22,
  author       = {Niao Yang and
                  Shaojun Yang and
                  Yong Zhao and
                  Wei Wu},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {Inner Product Encryption from Middle-Product Learning with Errors},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  pages        = {94--113},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3\_7},
  doi          = {10.1007/978-981-19-7242-3\_7},
  timestamp    = {Wed, 01 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/Yang0ZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenHWM21,
  author       = {Haixia Chen and
                  Xinyi Huang and
                  Wei Wu and
                  Yi Mu},
  title        = {Privacy-Aware Image Authentication from Cryptographic Primitives},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {8},
  pages        = {1178--1192},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa127},
  doi          = {10.1093/COMJNL/BXAA127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChenHWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/XuCYWS21,
  author       = {Junpeng Xu and
                  Haixia Chen and
                  Xu Yang and
                  Wei Wu and
                  Yongcheng Song},
  title        = {Verifiable image revision from chameleon hashes},
  journal      = {Cybersecur.},
  volume       = {4},
  number       = {1},
  pages        = {34},
  year         = {2021},
  url          = {https://doi.org/10.1186/s42400-021-00097-3},
  doi          = {10.1186/S42400-021-00097-3},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/XuCYWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiuHYXZWH21,
  author       = {Jianghua Liu and
                  Jingyu Hou and
                  Wenjie Yang and
                  Yang Xiang and
                  Wanlei Zhou and
                  Wei Wu and
                  Xinyi Huang},
  title        = {Leakage-Free Dissemination of Authenticated Tree-Structured Data With
                  Multi-Party Control},
  journal      = {{IEEE} Trans. Computers},
  volume       = {70},
  number       = {7},
  pages        = {1120--1131},
  year         = {2021},
  url          = {https://doi.org/10.1109/TC.2020.3006835},
  doi          = {10.1109/TC.2020.3006835},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LiuHYXZWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/SongHMW20,
  author       = {Yongcheng Song and
                  Xinyi Huang and
                  Yi Mu and
                  Wei Wu},
  title        = {An improved Durandal signature scheme},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-2670-7},
  doi          = {10.1007/S11432-019-2670-7},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/SongHMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChenHWM20,
  author       = {Haixia Chen and
                  Xinyi Huang and
                  Wei Wu and
                  Yi Mu},
  title        = {Efficient and secure image authentication with robustness and versatility},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-020-3007-5},
  doi          = {10.1007/S11432-020-3007-5},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChenHWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/WangZMW20,
  author       = {Min Wang and
                  Yuexin Zhang and
                  Jinhua Ma and
                  Wei Wu},
  title        = {A universal designated multi verifiers content extraction signature
                  scheme},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {21},
  number       = {1},
  pages        = {49--59},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCSE.2020.105212},
  doi          = {10.1504/IJCSE.2020.105212},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/WangZMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SongHMWW20,
  author       = {Yongcheng Song and
                  Xinyi Huang and
                  Yi Mu and
                  Wei Wu and
                  Huaxiong Wang},
  title        = {A code-based signature scheme from the Lyubashevsky framework},
  journal      = {Theor. Comput. Sci.},
  volume       = {835},
  pages        = {15--30},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.05.011},
  doi          = {10.1016/J.TCS.2020.05.011},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SongHMWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/MaLHXW20,
  author       = {Jinhua Ma and
                  Jianghua Liu and
                  Xinyi Huang and
                  Yang Xiang and
                  Wei Wu},
  title        = {Authenticated Data Redaction with Fine-Grained Control},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {291--302},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETC.2017.2754646},
  doi          = {10.1109/TETC.2017.2754646},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/MaLHXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangWWM19,
  author       = {Wenjie Yang and
                  Shangpeng Wang and
                  Wei Wu and
                  Yi Mu},
  title        = {Top-Level Secure Certificateless Signature Against Malicious-But-Passive
                  {KGC}},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {112870--112878},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2935252},
  doi          = {10.1109/ACCESS.2019.2935252},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangWWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhuWZC19,
  author       = {Fei Zhu and
                  Wei Wu and
                  Yuexin Zhang and
                  Xiaofeng Chen},
  title        = {Privacy-preserving authentication for general directed graphs in industrial
                  IoT},
  journal      = {Inf. Sci.},
  volume       = {502},
  pages        = {218--228},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.06.032},
  doi          = {10.1016/J.INS.2019.06.032},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhuWZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhangXWA18,
  author       = {Yuexin Zhang and
                  Yang Xiang and
                  Wei Wu and
                  Abdulhameed Alelaiwi},
  title        = {A variant of password authenticated key exchange protocol},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {699--711},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.02.016},
  doi          = {10.1016/J.FUTURE.2017.02.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhangXWA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhangXWWS18,
  author       = {Yuexin Zhang and
                  Yang Xiang and
                  Tao Wang and
                  Wei Wu and
                  Jian Shen},
  title        = {An over-the-air key establishment protocol using keyless cryptography},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {79},
  pages        = {284--294},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.12.013},
  doi          = {10.1016/J.FUTURE.2016.12.013},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhangXWWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiTWL18,
  author       = {Yang Li and
                  Xiaoling Tao and
                  Wei Wu and
                  Joseph K. Liu},
  title        = {{GO-CP-ABE:} group-oriented ciphertext-policy attribute-based encryption},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {1},
  pages        = {62--70},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10010502},
  doi          = {10.1504/IJES.2018.10010502},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiTWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenWZW18,
  author       = {Haixia Chen and
                  Shangpeng Wang and
                  Hongyan Zhang and
                  Wei Wu},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Image Authentication for Permissible Cropping},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {308--325},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_17},
  doi          = {10.1007/978-3-030-14234-6\_17},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenWZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhengYWSH18,
  author       = {Mingmei Zheng and
                  Shao{-}Jun Yang and
                  Wei Wu and
                  Jun Shao and
                  Xinyi Huang},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A New Design of Online/Offline Signatures Based on Lattice},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {198--212},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_12},
  doi          = {10.1007/978-3-319-99807-7\_12},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhengYWSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/ZhangXXWY17,
  author       = {Jing Zhang and
                  Li Xu and
                  Xingsi Xue and
                  Wei Wu and
                  Hong Yang},
  title        = {Virtual Backbone Scheduling with Connected Domatic Partition in Wireless
                  Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {38},
  number       = {1-4},
  pages        = {169--198},
  year         = {2017},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-38-number-1-4-2017/ahswn-38-1-4-p-169-198/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/ZhangXXWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/LinWHX17,
  author       = {Chao Lin and
                  Wei Wu and
                  Xinyi Huang and
                  Li Xu},
  title        = {A new universal designated verifier transitive signature scheme for
                  big graph data},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {83},
  number       = {1},
  pages        = {73--83},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.06.003},
  doi          = {10.1016/J.JCSS.2016.06.003},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/LinWHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/XuZTWW17,
  author       = {Li Xu and
                  Jing Zhang and
                  Pei{-}Wei Tsai and
                  Wei Wu and
                  Dajin Wang},
  title        = {Uncertain random spectra: a new metric for assessing the survivability
                  of mobile wireless sensor networks},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {10},
  pages        = {2619--2629},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1962-4},
  doi          = {10.1007/S00500-015-1962-4},
  timestamp    = {Wed, 05 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/XuZTWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WuHYLA17,
  author       = {Wei Wu and
                  Shun Hu and
                  Xu Yang and
                  Joseph K. Liu and
                  Man Ho Au},
  title        = {Towards secure and cost-effective fuzzy access control in mobile cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {10},
  pages        = {2643--2649},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1964-2},
  doi          = {10.1007/S00500-015-1964-2},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/WuHYLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/WangXZW17,
  author       = {Xiaoding Wang and
                  Li Xu and
                  Shuming Zhou and
                  Wei Wu},
  title        = {Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor
                  Networks},
  journal      = {Sci. Program.},
  volume       = {2017},
  pages        = {5807289:1--5807289:19},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/5807289},
  doi          = {10.1155/2017/5807289},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sp/WangXZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/LiuMWCHX17,
  author       = {Jianghua Liu and
                  Jinhua Ma and
                  Wei Wu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Li Xu},
  title        = {Protecting Mobile Health Records in Cloud Computing: {A} Secure, Efficient,
                  and Anonymous Design},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {57:1--57:20},
  year         = {2017},
  url          = {https://doi.org/10.1145/2983625},
  doi          = {10.1145/2983625},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/LiuMWCHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeKCW17,
  author       = {Debiao He and
                  Neeraj Kumar and
                  Kim{-}Kwang Raymond Choo and
                  Wei Wu},
  title        = {Efficient Hierarchical Identity-Based Signature With Batch Verification
                  for Automatic Dependent Surveillance-Broadcast System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {454--464},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622682},
  doi          = {10.1109/TIFS.2016.2622682},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeKCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhuZLWM17,
  author       = {Fei Zhu and
                  Yuexin Zhang and
                  Chao Lin and
                  Wei Wu and
                  Ru Meng},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {A Universal Designated Multi-Verifier Transitive Signature Scheme},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {180--195},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_12},
  doi          = {10.1007/978-3-319-75160-3\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhuZLWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/MaLWW17,
  author       = {Jinhua Ma and
                  Jianghua Liu and
                  Min Wang and
                  Wei Wu},
  editor       = {Man Ho Allen Au and
                  Arcangelo Castiglione and
                  Kim{-}Kwang Raymond Choo and
                  Francesco Palmieri and
                  Kuan{-}Ching Li},
  title        = {An Efficient and Secure Design of Redactable Signature Scheme with
                  Redaction Condition Control},
  booktitle    = {Green, Pervasive, and Cloud Computing - 12th International Conference,
                  {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10232},
  pages        = {38--52},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57186-7\_4},
  doi          = {10.1007/978-3-319-57186-7\_4},
  timestamp    = {Wed, 06 Jan 2021 11:52:38 +0100},
  biburl       = {https://dblp.org/rec/conf/gpc/MaLWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/LiLSW17,
  author       = {Ye Li and
                  Kaitai Liang and
                  Chunhua Su and
                  Wei Wu},
  editor       = {Man Ho Allen Au and
                  Arcangelo Castiglione and
                  Kim{-}Kwang Raymond Choo and
                  Francesco Palmieri and
                  Kuan{-}Ching Li},
  title        = {{DABEHR:} Decentralized Attribute-Based Electronic Health Record System
                  with Constant-Size Storage Complexity},
  booktitle    = {Green, Pervasive, and Cloud Computing - 12th International Conference,
                  {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10232},
  pages        = {611--626},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57186-7\_44},
  doi          = {10.1007/978-3-319-57186-7\_44},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/LiLSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LinHLWY17,
  author       = {Cheng{-}Jun Lin and
                  Xinyi Huang and
                  Shitang Li and
                  Wei Wu and
                  Shao{-}Jun Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Linearly Homomorphic Signatures with Designated Entities},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {375--390},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_22},
  doi          = {10.1007/978-3-319-72359-4\_22},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LinHLWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/css/2017,
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9},
  doi          = {10.1007/978-3-319-69471-9},
  isbn         = {978-3-319-69470-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-09145,
  author       = {Lei Zhang and
                  Futai Zhang and
                  Wei Wu},
  title        = {A Provably Secure Ring Signature Scheme in Certificateless Cryptography},
  journal      = {CoRR},
  volume       = {abs/1712.09145},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.09145},
  eprinttype    = {arXiv},
  eprint       = {1712.09145},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-09145.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenWXW16,
  author       = {Zhide Chen and
                  Meng Wang and
                  Li Xu and
                  Wei Wu},
  title        = {Worm propagation model in mobile network},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {4},
  pages        = {1134--1144},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3566},
  doi          = {10.1002/CPE.3566},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenWXW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/YuLZWHX16,
  author       = {Qihong Yu and
                  Jiguo Li and
                  Yichen Zhang and
                  Wei Wu and
                  Xinyi Huang and
                  Yang Xiang},
  title        = {Certificate-based encryption resilient to key leakage},
  journal      = {J. Syst. Softw.},
  volume       = {116},
  pages        = {101--112},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jss.2015.05.066},
  doi          = {10.1016/J.JSS.2015.05.066},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/YuLZWHX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeZKW16,
  author       = {Debiao He and
                  Sherali Zeadally and
                  Neeraj Kumar and
                  Wei Wu},
  title        = {Efficient and Anonymous Mobile User Authentication Protocol Using
                  Self-Certified Public Key Cryptography for Multi-Server Architectures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {9},
  pages        = {2052--2064},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2573746},
  doi          = {10.1109/TIFS.2016.2573746},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeZKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LinZWLC16,
  author       = {Chao Lin and
                  Fei Zhu and
                  Wei Wu and
                  Kaitai Liang and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {A New Transitive Signature Scheme},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_11},
  doi          = {10.1007/978-3-319-46298-1\_11},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LinZWLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangAW16,
  author       = {Tingting Wang and
                  Man Ho Au and
                  Wei Wu},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {An Efficient Secure Channel Free Searchable Encryption Scheme with
                  Multiple Keywords},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_17},
  doi          = {10.1007/978-3-319-46298-1\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/WangAW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/LinXHWH15,
  author       = {Hui Lin and
                  Li Xu and
                  Xinyi Huang and
                  Wei Wu and
                  Yijie Huang},
  title        = {A trustworthy access control model for mobile cloud computing based
                  on reputation and mechanism design},
  journal      = {Ad Hoc Networks},
  volume       = {35},
  pages        = {51--64},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.07.007},
  doi          = {10.1016/J.ADHOC.2015.07.007},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/LinXHWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amcs/ZhangZXWY15,
  author       = {Jing Zhang and
                  Shuming Zhou and
                  Li Xu and
                  Wei Wu and
                  Xiucai Ye},
  title        = {An Efficient Connected Dominating Set Algorithm in {WSNS} Based on
                  the Induced Tree of the Crossed Cube},
  journal      = {Int. J. Appl. Math. Comput. Sci.},
  volume       = {25},
  number       = {2},
  pages        = {295--309},
  year         = {2015},
  url          = {https://doi.org/10.1515/amcs-2015-0023},
  doi          = {10.1515/AMCS-2015-0023},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amcs/ZhangZXWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LinXMW15,
  author       = {Hui Lin and
                  Li Xu and
                  Yi Mu and
                  Wei Wu},
  title        = {A reliable recommendation and privacy-preserving based cross-layer
                  reputation mechanism for mobile cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {52},
  pages        = {125--136},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.future.2014.10.032},
  doi          = {10.1016/J.FUTURE.2014.10.032},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LinXMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/LiHLXW15,
  author       = {Mengting Li and
                  Xinyi Huang and
                  Joseph K. Liu and
                  Li Xu and
                  Wei Wu},
  title        = {Cooperative attribute-based access control for enterprise computing
                  system},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {191--202},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072364},
  doi          = {10.1504/IJES.2015.072364},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/LiHLXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/MaCWZL15,
  author       = {Jinhua Ma and
                  Zhide Chen and
                  Wei Wu and
                  Rongjun Zheng and
                  Jianghua Liu},
  title        = {Influences of Removable Devices on the Anti-Threat Model: Dynamic
                  Analysis and Control Strategies},
  journal      = {Inf.},
  volume       = {6},
  number       = {3},
  pages        = {536--549},
  year         = {2015},
  url          = {https://doi.org/10.3390/info6030536},
  doi          = {10.3390/INFO6030536},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/MaCWZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/YangLWAS15,
  author       = {Xu Yang and
                  Joseph K. Liu and
                  Wei Wu and
                  Man Ho Au and
                  Willy Susilo},
  title        = {{PEVTS:} Privacy-Preserving Electric Vehicles Test-Bedding Scheme},
  booktitle    = {21st {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2015, Melbourne, Australia, December 14-17, 2015},
  pages        = {282--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICPADS.2015.43},
  doi          = {10.1109/ICPADS.2015.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/YangLWAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangWLC15,
  author       = {Xu Yang and
                  Wei Wu and
                  Joseph K. Liu and
                  Xiaofeng Chen},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Lightweight Anonymous Authentication for Ad Hoc Group: {A} Ring Signature
                  Approach},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_12},
  doi          = {10.1007/978-3-319-26059-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YangWLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuLZWHX15,
  author       = {Qihong Yu and
                  Jiguo Li and
                  Yichen Zhang and
                  Wei Wu and
                  Xinyi Huang and
                  Yang Xiang},
  title        = {Certificate-Based Encryption Resilient to Key Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/314},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YuLZWHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenQXW14,
  author       = {Zhide Chen and
                  Cheng Qiao and
                  Li Xu and
                  Wei Wu},
  title        = {Optimizing wireless unicast and multicast sensor networks on the basis
                  of evolutionary game theory},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {5},
  pages        = {1130--1141},
  year         = {2014},
  url          = {https://doi.org/10.1002/cpe.3060},
  doi          = {10.1002/CPE.3060},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenQXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChenQQXW14,
  author       = {Zhide Chen and
                  Cheng Qiao and
                  Yihui Qiu and
                  Li Xu and
                  Wei Wu},
  title        = {Dynamics stability in wireless sensor networks active defense model},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {80},
  number       = {8},
  pages        = {1534--1548},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jcss.2014.04.020},
  doi          = {10.1016/J.JCSS.2014.04.020},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ChenQQXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeXW14,
  author       = {Yuan He and
                  Li Xu and
                  Wei Wu},
  title        = {A local joint fast handoff scheme in cognitive wireless mesh networks},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {2},
  pages        = {455--465},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.832},
  doi          = {10.1002/SEC.832},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HeXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/LinXZW14,
  author       = {Limei Lin and
                  Li Xu and
                  Shuming Zhou and
                  Wei Wu},
  editor       = {Xingang Liu and
                  Didier El Baz and
                  Ching{-}Hsien Hsu and
                  Kai Kang and
                  Weifeng Chen},
  title        = {The Social Feature-Based Priority Relation Graph of Mobile Social
                  Networks},
  booktitle    = {17th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014},
  pages        = {1921--1926},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSE.2014.352},
  doi          = {10.1109/CSE.2014.352},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/LinXZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/XuCZW13,
  author       = {Li Xu and
                  Xi Cao and
                  Yuexin Zhang and
                  Wei Wu},
  title        = {Software Service Signature {(S3)} for authentication in cloud computing},
  journal      = {Clust. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {905--914},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10586-013-0262-y},
  doi          = {10.1007/S10586-013-0262-Y},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/XuCZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/WuZXX13,
  author       = {Wei Wu and
                  Jianying Zhou and
                  Yang Xiang and
                  Li Xu},
  title        = {How to achieve non-repudiation of origin with privacy protection in
                  cloud computing},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {79},
  number       = {8},
  pages        = {1200--1213},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jcss.2013.03.001},
  doi          = {10.1016/J.JCSS.2013.03.001},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/WuZXX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangXZW13,
  author       = {Jing Zhang and
                  Li Xu and
                  Shuming Zhou and
                  Wei Wu},
  title        = {Constructing Connected Dominating Set Based on Crossed Cube in {WSN}},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {443--447},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.83},
  doi          = {10.1109/INCOS.2013.83},
  timestamp    = {Wed, 05 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangXZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuangMSWW12,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Wei Wu},
  title        = {Certificateless Signatures: New Schemes and Security Models},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {4},
  pages        = {457--474},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr097},
  doi          = {10.1093/COMJNL/BXR097},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuangMSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WuMSHX12,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang and
                  Li Xu},
  title        = {A Provably Secure Construction of Certificate-Based Encryption from
                  Certificateless Encryption},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {10},
  pages        = {1157--1168},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr130},
  doi          = {10.1093/COMJNL/BXR130},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WuMSHX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/XuPWW12,
  author       = {Li Xu and
                  Penggui Pan and
                  Xiaoding Wang and
                  Wei Wu},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Physical-Layer Network Coding and Connected Dominating Set Based Routing
                  Protocol in Wireless Multi-hop Network},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {259--263},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.38},
  doi          = {10.1109/INCOS.2012.38},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/XuPWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/CaoXZW12,
  author       = {Xi Cao and
                  Li Xu and
                  Yuexin Zhang and
                  Wei Wu},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Identity-Based Proxy Signature for Cloud Service in SaaS},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {594--599},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.37},
  doi          = {10.1109/INCOS.2012.37},
  timestamp    = {Tue, 12 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/CaoXZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/WuMSH11,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  title        = {Provably secure server-aided verification signatures},
  journal      = {Comput. Math. Appl.},
  volume       = {61},
  number       = {7},
  pages        = {1705--1723},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.camwa.2011.01.036},
  doi          = {10.1016/J.CAMWA.2011.01.036},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/WuMSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HuangMSWX11,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Wei Wu and
                  Yang Xiang},
  title        = {Optimistic Fair Exchange with Strong Resolution-Ambiguity},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {29},
  number       = {7},
  pages        = {1491--1502},
  year         = {2011},
  url          = {https://doi.org/10.1109/JSAC.2011.110814},
  doi          = {10.1109/JSAC.2011.110814},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/HuangMSWX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangMSWZD11,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Wei Wu and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Preserving Transparency and Accountability in Optimistic Fair Exchange
                  of Digital Signatures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {2},
  pages        = {498--512},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2109952},
  doi          = {10.1109/TIFS.2011.2109952},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangMSWZD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangMSWX10,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Wei Wu and
                  Yang Xiang},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Further Observations on Optimistic Fair Exchange Protocols in the
                  Multi-user Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {124--141},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_8},
  doi          = {10.1007/978-3-642-13013-7\_8},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangMSWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WuMSH09,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  title        = {Certificate-based Signatures Revisited},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {15},
  number       = {8},
  pages        = {1659--1684},
  year         = {2009},
  url          = {https://doi.org/10.3217/jucs-015-08-1659},
  doi          = {10.3217/JUCS-015-08-1659},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/WuMSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HuangSMW08,
  author       = {Xinyi Huang and
                  Willy Susilo and
                  Yi Mu and
                  Wei Wu},
  title        = {Secure universal designated verifier signature without random oracles},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {3},
  pages        = {171--183},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0021-2},
  doi          = {10.1007/S10207-007-0021-2},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HuangSMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/LiHMW08,
  author       = {Jiguo Li and
                  Xinyi Huang and
                  Yi Mu and
                  Wei Wu},
  title        = {Cryptanalysis and improvement of an efficient certificateless signature
                  scheme},
  journal      = {J. Commun. Networks},
  volume       = {10},
  number       = {1},
  pages        = {10--17},
  year         = {2008},
  url          = {https://doi.org/10.1109/JCN.2008.6388323},
  doi          = {10.1109/JCN.2008.6388323},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/LiHMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WuMSH08,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Server-Aided Verification Signatures: Definitions and New Constructions},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_10},
  doi          = {10.1007/978-3-540-88733-1\_10},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WuMSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WuMSH08,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Certificate-Based Signatures: New Definitions and a Generic Construction
                  from Certificateless Signatures},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_8},
  doi          = {10.1007/978-3-642-00306-6\_8},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WuMSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangMSWW07,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Wei Wu},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Certificateless Signature Revisited},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_23},
  doi          = {10.1007/978-3-540-73458-1\_23},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/WuMSSH07,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry and
                  Xinyi Huang},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {Identity-Based Proxy Signature from Pairings},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {22--31},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_5},
  doi          = {10.1007/978-3-540-73547-2\_5},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/WuMSSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HuangMSW07,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Wei Wu},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {A Generic Construction for Universally-Convertible Undeniable Signatures},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_2},
  doi          = {10.1007/978-3-540-76969-9\_2},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/HuangMSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuMSH08,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Provably Secure Identity-Based Undeniable Signatures with Selective
                  and Universal Convertibility},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_4},
  doi          = {10.1007/978-3-540-79499-8\_4},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WuMSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/HuangMSW07,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Wei Wu},
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Provably Secure Pairing-Based Convertible Undeniable Signature with
                  Short Signature Length},
  booktitle    = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {367--391},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5\_21},
  doi          = {10.1007/978-3-540-73489-5\_21},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/HuangMSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangZW07,
  author       = {Lei Zhang and
                  Futai Zhang and
                  Wei Wu},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {A Provably Secure Ring Signature Scheme in Certificateless Cryptography},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_7},
  doi          = {10.1007/978-3-540-75670-5\_7},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WuMSH07,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Convertible Undeniable Proxy Signatures: Security Models and Efficient
                  Construction},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_2},
  doi          = {10.1007/978-3-540-77535-5\_2},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WuMSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HuangSMW06,
  author       = {Xinyi Huang and
                  Willy Susilo and
                  Yi Mu and
                  Wei Wu},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Universal Designated Verifier Signature Without Delegatability},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {479--498},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_34},
  doi          = {10.1007/11935308\_34},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HuangSMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/HuangSMW06,
  author       = {Xinyi Huang and
                  Willy Susilo and
                  Yi Mu and
                  Wei Wu},
  editor       = {Jiannong Cao and
                  Ivan Stojmenovic and
                  Xiaohua Jia and
                  Sajal K. Das},
  title        = {Proxy Signature Without Random Oracles},
  booktitle    = {Mobile Ad-hoc and Sensor Networks, Second International Conference,
                  {MSN} 2006, Hong Kong, China, December 13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4325},
  pages        = {473--484},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11943952\_40},
  doi          = {10.1007/11943952\_40},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/HuangSMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics