Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wei Wu 0001
@article{DBLP:journals/csi/YangYZWW24, author = {Niao Yang and Shaojun Yang and Yong Zhao and Wei Wu and Xuewei Wang}, title = {Inner product encryption from Middle-Product Learning With Errors}, journal = {Comput. Stand. Interfaces}, volume = {87}, pages = {103755}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103755}, doi = {10.1016/J.CSI.2023.103755}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/YangYZWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/FengLWH24, author = {Mengqi Feng and Chao Lin and Wei Wu and Debiao He}, title = {SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size}, journal = {Comput. Stand. Interfaces}, volume = {87}, pages = {103763}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103763}, doi = {10.1016/J.CSI.2023.103763}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/FengLWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/YangYLYKLWZ24, author = {Xu Yang and Xuechao Yang and Junwei Luo and Xun Yi and Ibrahim Khalil and Shangqi Lai and Wei Wu and Albert Y. Zomaya}, title = {Towards Sustainable Trust: {A} Practical {SGX} Aided Anonymous Reputation System}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {9}, number = {1}, pages = {88--99}, year = {2024}, url = {https://doi.org/10.1109/TSUSC.2023.3308081}, doi = {10.1109/TSUSC.2023.3308081}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsusc/YangYLYKLWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhouZWH24, author = {Mengjie Zhou and Xiaotong Zhou and Wei Wu and Debiao He}, title = {{LPDB:} Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {4}, pages = {5100--5112}, year = {2024}, url = {https://doi.org/10.1109/TVT.2023.3330889}, doi = {10.1109/TVT.2023.3330889}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ZhouZWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhaoYWH23, author = {Yong Zhao and Shao{-}Jun Yang and Wei Wu and Xinyi Huang}, title = {A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees}, journal = {Comput. J.}, volume = {66}, number = {12}, pages = {2961--2973}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac140}, doi = {10.1093/COMJNL/BXAC140}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhaoYWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChenLWNLH23, author = {Xiuyuan Chen and Chao Lin and Wei Wu and Jianting Ning and Junzuo Lai and Debiao He}, title = {Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {8}, pages = {130--136}, year = {2023}, url = {https://doi.org/10.1109/MCOM.006.2200835}, doi = {10.1109/MCOM.006.2200835}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ChenLWNLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiuYWHX23, author = {Jianghua Liu and Jian Yang and Wei Wu and Xinyi Huang and Yang Xiang}, title = {Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {5}, pages = {1384--1395}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3207138}, doi = {10.1109/TC.2022.3207138}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiuYWHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SongZHWY23, author = {Yongcheng Song and Jiang Zhang and Xinyi Huang and Wei Wu and Haining Yang}, title = {Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge}, journal = {Theor. Comput. Sci.}, volume = {952}, pages = {113731}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.113731}, doi = {10.1016/J.TCS.2023.113731}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SongZHWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/NiAWLLS23, author = {Jianbing Ni and Man Ho Au and Wei Wu and Xiapu Luo and Xiaodong Lin and Xuemin Sherman Shen}, title = {Dual-Anonymous Off-Line Electronic Cash for Mobile Payment}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {6}, pages = {3303--3317}, year = {2023}, url = {https://doi.org/10.1109/TMC.2021.3135301}, doi = {10.1109/TMC.2021.3135301}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/NiAWLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhouHKWC23, author = {Xiaotong Zhou and Debiao He and Muhammad Khurram Khan and Wei Wu and Kim{-}Kwang Raymond Choo}, title = {An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {1}, pages = {81--92}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3204582}, doi = {10.1109/TVT.2022.3204582}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ZhouHKWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SongZHW23, author = {Yongcheng Song and Jiang Zhang and Xinyi Huang and Wei Wu}, editor = {Jian Guo and Ron Steinfeld}, title = {Blockwise Rank Decoding Problem and {LRPC} Codes: Cryptosystems with Smaller Sizes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VII}}, series = {Lecture Notes in Computer Science}, volume = {14444}, pages = {284--316}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8739-9\_10}, doi = {10.1007/978-981-99-8739-9\_10}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SongZHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongZHW23, author = {Yongcheng Song and Jiang Zhang and Xinyi Huang and Wei Wu}, title = {Blockwise Rank Decoding Problem and {LRPC} Codes: Cryptosystems with Smaller Sizes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1387}, year = {2023}, url = {https://eprint.iacr.org/2023/1387}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongZHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LaiHHW22, author = {Jianchang Lai and Xinyi Huang and Debiao He and Wei Wu}, title = {Provably Secure Online/Offline Identity-Based Signature Scheme Based on {SM9}}, journal = {Comput. J.}, volume = {65}, number = {7}, pages = {1692--1701}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab009}, doi = {10.1093/COMJNL/BXAB009}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LaiHHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuLNHW22, author = {Pengfei Wu and Qi Li and Jianting Ning and Xinyi Huang and Wei Wu}, title = {Differentially Oblivious Data Analysis With Intel {SGX:} Design, Optimization, and Evaluation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3741--3758}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3106317}, doi = {10.1109/TDSC.2021.3106317}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WuLNHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YangYWZ22, author = {Wei Yang and Shao{-}Jun Yang and Wei Wu and Yong Zhao}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {A Combination Reduction Algorithm and Its Application}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {667--683}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_38}, doi = {10.1007/978-3-031-23020-2\_38}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/YangYWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/Yang0ZW22, author = {Niao Yang and Shaojun Yang and Yong Zhao and Wei Wu}, editor = {Xiaofeng Chen and Xinyi Huang and Miroslaw Kutylowski}, title = {Inner Product Encryption from Middle-Product Learning with Errors}, booktitle = {Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1663}, pages = {94--113}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-7242-3\_7}, doi = {10.1007/978-981-19-7242-3\_7}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/Yang0ZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenHWM21, author = {Haixia Chen and Xinyi Huang and Wei Wu and Yi Mu}, title = {Privacy-Aware Image Authentication from Cryptographic Primitives}, journal = {Comput. J.}, volume = {64}, number = {8}, pages = {1178--1192}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa127}, doi = {10.1093/COMJNL/BXAA127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenHWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/XuCYWS21, author = {Junpeng Xu and Haixia Chen and Xu Yang and Wei Wu and Yongcheng Song}, title = {Verifiable image revision from chameleon hashes}, journal = {Cybersecur.}, volume = {4}, number = {1}, pages = {34}, year = {2021}, url = {https://doi.org/10.1186/s42400-021-00097-3}, doi = {10.1186/S42400-021-00097-3}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/XuCYWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiuHYXZWH21, author = {Jianghua Liu and Jingyu Hou and Wenjie Yang and Yang Xiang and Wanlei Zhou and Wei Wu and Xinyi Huang}, title = {Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control}, journal = {{IEEE} Trans. Computers}, volume = {70}, number = {7}, pages = {1120--1131}, year = {2021}, url = {https://doi.org/10.1109/TC.2020.3006835}, doi = {10.1109/TC.2020.3006835}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiuHYXZWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/SongHMW20, author = {Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu}, title = {An improved Durandal signature scheme}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {3}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-2670-7}, doi = {10.1007/S11432-019-2670-7}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/SongHMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ChenHWM20, author = {Haixia Chen and Xinyi Huang and Wei Wu and Yi Mu}, title = {Efficient and secure image authentication with robustness and versatility}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {12}, year = {2020}, url = {https://doi.org/10.1007/s11432-020-3007-5}, doi = {10.1007/S11432-020-3007-5}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ChenHWM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/WangZMW20, author = {Min Wang and Yuexin Zhang and Jinhua Ma and Wei Wu}, title = {A universal designated multi verifiers content extraction signature scheme}, journal = {Int. J. Comput. Sci. Eng.}, volume = {21}, number = {1}, pages = {49--59}, year = {2020}, url = {https://doi.org/10.1504/IJCSE.2020.105212}, doi = {10.1504/IJCSE.2020.105212}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/WangZMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SongHMWW20, author = {Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu and Huaxiong Wang}, title = {A code-based signature scheme from the Lyubashevsky framework}, journal = {Theor. Comput. Sci.}, volume = {835}, pages = {15--30}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.05.011}, doi = {10.1016/J.TCS.2020.05.011}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SongHMWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/MaLHXW20, author = {Jinhua Ma and Jianghua Liu and Xinyi Huang and Yang Xiang and Wei Wu}, title = {Authenticated Data Redaction with Fine-Grained Control}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {8}, number = {2}, pages = {291--302}, year = {2020}, url = {https://doi.org/10.1109/TETC.2017.2754646}, doi = {10.1109/TETC.2017.2754646}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/MaLHXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangWWM19, author = {Wenjie Yang and Shangpeng Wang and Wei Wu and Yi Mu}, title = {Top-Level Secure Certificateless Signature Against Malicious-But-Passive {KGC}}, journal = {{IEEE} Access}, volume = {7}, pages = {112870--112878}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2935252}, doi = {10.1109/ACCESS.2019.2935252}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangWWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhuWZC19, author = {Fei Zhu and Wei Wu and Yuexin Zhang and Xiaofeng Chen}, title = {Privacy-preserving authentication for general directed graphs in industrial IoT}, journal = {Inf. Sci.}, volume = {502}, pages = {218--228}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.06.032}, doi = {10.1016/J.INS.2019.06.032}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhuWZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhangXWA18, author = {Yuexin Zhang and Yang Xiang and Wei Wu and Abdulhameed Alelaiwi}, title = {A variant of password authenticated key exchange protocol}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {699--711}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.02.016}, doi = {10.1016/J.FUTURE.2017.02.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhangXWA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhangXWWS18, author = {Yuexin Zhang and Yang Xiang and Tao Wang and Wei Wu and Jian Shen}, title = {An over-the-air key establishment protocol using keyless cryptography}, journal = {Future Gener. Comput. Syst.}, volume = {79}, pages = {284--294}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.12.013}, doi = {10.1016/J.FUTURE.2016.12.013}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhangXWWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiTWL18, author = {Yang Li and Xiaoling Tao and Wei Wu and Joseph K. Liu}, title = {{GO-CP-ABE:} group-oriented ciphertext-policy attribute-based encryption}, journal = {Int. J. Embed. Syst.}, volume = {10}, number = {1}, pages = {62--70}, year = {2018}, url = {https://doi.org/10.1504/IJES.2018.10010502}, doi = {10.1504/IJES.2018.10010502}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiTWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenWZW18, author = {Haixia Chen and Shangpeng Wang and Hongyan Zhang and Wei Wu}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Image Authentication for Permissible Cropping}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {308--325}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_17}, doi = {10.1007/978-3-030-14234-6\_17}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenWZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhengYWSH18, author = {Mingmei Zheng and Shao{-}Jun Yang and Wei Wu and Jun Shao and Xinyi Huang}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A New Design of Online/Offline Signatures Based on Lattice}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {198--212}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_12}, doi = {10.1007/978-3-319-99807-7\_12}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhengYWSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/ZhangXXWY17, author = {Jing Zhang and Li Xu and Xingsi Xue and Wei Wu and Hong Yang}, title = {Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {38}, number = {1-4}, pages = {169--198}, year = {2017}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-38-number-1-4-2017/ahswn-38-1-4-p-169-198/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/ZhangXXWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/LinWHX17, author = {Chao Lin and Wei Wu and Xinyi Huang and Li Xu}, title = {A new universal designated verifier transitive signature scheme for big graph data}, journal = {J. Comput. Syst. Sci.}, volume = {83}, number = {1}, pages = {73--83}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.06.003}, doi = {10.1016/J.JCSS.2016.06.003}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/LinWHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/XuZTWW17, author = {Li Xu and Jing Zhang and Pei{-}Wei Tsai and Wei Wu and Dajin Wang}, title = {Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks}, journal = {Soft Comput.}, volume = {21}, number = {10}, pages = {2619--2629}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1962-4}, doi = {10.1007/S00500-015-1962-4}, timestamp = {Wed, 05 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/XuZTWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WuHYLA17, author = {Wei Wu and Shun Hu and Xu Yang and Joseph K. Liu and Man Ho Au}, title = {Towards secure and cost-effective fuzzy access control in mobile cloud computing}, journal = {Soft Comput.}, volume = {21}, number = {10}, pages = {2643--2649}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1964-2}, doi = {10.1007/S00500-015-1964-2}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/WuHYLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/WangXZW17, author = {Xiaoding Wang and Li Xu and Shuming Zhou and Wei Wu}, title = {Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks}, journal = {Sci. Program.}, volume = {2017}, pages = {5807289:1--5807289:19}, year = {2017}, url = {https://doi.org/10.1155/2017/5807289}, doi = {10.1155/2017/5807289}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sp/WangXZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/LiuMWCHX17, author = {Jianghua Liu and Jinhua Ma and Wei Wu and Xiaofeng Chen and Xinyi Huang and Li Xu}, title = {Protecting Mobile Health Records in Cloud Computing: {A} Secure, Efficient, and Anonymous Design}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {2}, pages = {57:1--57:20}, year = {2017}, url = {https://doi.org/10.1145/2983625}, doi = {10.1145/2983625}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/LiuMWCHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeKCW17, author = {Debiao He and Neeraj Kumar and Kim{-}Kwang Raymond Choo and Wei Wu}, title = {Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {454--464}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622682}, doi = {10.1109/TIFS.2016.2622682}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeKCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhuZLWM17, author = {Fei Zhu and Yuexin Zhang and Chao Lin and Wei Wu and Ru Meng}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {A Universal Designated Multi-Verifier Transitive Signature Scheme}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {180--195}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_12}, doi = {10.1007/978-3-319-75160-3\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhuZLWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/MaLWW17, author = {Jinhua Ma and Jianghua Liu and Min Wang and Wei Wu}, editor = {Man Ho Allen Au and Arcangelo Castiglione and Kim{-}Kwang Raymond Choo and Francesco Palmieri and Kuan{-}Ching Li}, title = {An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control}, booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference, {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10232}, pages = {38--52}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57186-7\_4}, doi = {10.1007/978-3-319-57186-7\_4}, timestamp = {Wed, 06 Jan 2021 11:52:38 +0100}, biburl = {https://dblp.org/rec/conf/gpc/MaLWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/LiLSW17, author = {Ye Li and Kaitai Liang and Chunhua Su and Wei Wu}, editor = {Man Ho Allen Au and Arcangelo Castiglione and Kim{-}Kwang Raymond Choo and Francesco Palmieri and Kuan{-}Ching Li}, title = {{DABEHR:} Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity}, booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference, {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10232}, pages = {611--626}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57186-7\_44}, doi = {10.1007/978-3-319-57186-7\_44}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/LiLSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LinHLWY17, author = {Cheng{-}Jun Lin and Xinyi Huang and Shitang Li and Wei Wu and Shao{-}Jun Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Linearly Homomorphic Signatures with Designated Entities}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {375--390}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_22}, doi = {10.1007/978-3-319-72359-4\_22}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LinHLWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/css/2017, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9}, doi = {10.1007/978-3-319-69471-9}, isbn = {978-3-319-69470-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-09145, author = {Lei Zhang and Futai Zhang and Wei Wu}, title = {A Provably Secure Ring Signature Scheme in Certificateless Cryptography}, journal = {CoRR}, volume = {abs/1712.09145}, year = {2017}, url = {http://arxiv.org/abs/1712.09145}, eprinttype = {arXiv}, eprint = {1712.09145}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-09145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChenWXW16, author = {Zhide Chen and Meng Wang and Li Xu and Wei Wu}, title = {Worm propagation model in mobile network}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {4}, pages = {1134--1144}, year = {2016}, url = {https://doi.org/10.1002/cpe.3566}, doi = {10.1002/CPE.3566}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChenWXW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/YuLZWHX16, author = {Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang}, title = {Certificate-based encryption resilient to key leakage}, journal = {J. Syst. Softw.}, volume = {116}, pages = {101--112}, year = {2016}, url = {https://doi.org/10.1016/j.jss.2015.05.066}, doi = {10.1016/J.JSS.2015.05.066}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/YuLZWHX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeZKW16, author = {Debiao He and Sherali Zeadally and Neeraj Kumar and Wei Wu}, title = {Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {9}, pages = {2052--2064}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2573746}, doi = {10.1109/TIFS.2016.2573746}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeZKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LinZWLC16, author = {Chao Lin and Fei Zhu and Wei Wu and Kaitai Liang and Kim{-}Kwang Raymond Choo}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {A New Transitive Signature Scheme}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {156--167}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_11}, doi = {10.1007/978-3-319-46298-1\_11}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LinZWLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangAW16, author = {Tingting Wang and Man Ho Au and Wei Wu}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {251--265}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_17}, doi = {10.1007/978-3-319-46298-1\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/WangAW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/LinXHWH15, author = {Hui Lin and Li Xu and Xinyi Huang and Wei Wu and Yijie Huang}, title = {A trustworthy access control model for mobile cloud computing based on reputation and mechanism design}, journal = {Ad Hoc Networks}, volume = {35}, pages = {51--64}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.07.007}, doi = {10.1016/J.ADHOC.2015.07.007}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/LinXHWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amcs/ZhangZXWY15, author = {Jing Zhang and Shuming Zhou and Li Xu and Wei Wu and Xiucai Ye}, title = {An Efficient Connected Dominating Set Algorithm in {WSNS} Based on the Induced Tree of the Crossed Cube}, journal = {Int. J. Appl. Math. Comput. Sci.}, volume = {25}, number = {2}, pages = {295--309}, year = {2015}, url = {https://doi.org/10.1515/amcs-2015-0023}, doi = {10.1515/AMCS-2015-0023}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amcs/ZhangZXWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LinXMW15, author = {Hui Lin and Li Xu and Yi Mu and Wei Wu}, title = {A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {52}, pages = {125--136}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.10.032}, doi = {10.1016/J.FUTURE.2014.10.032}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LinXMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/LiHLXW15, author = {Mengting Li and Xinyi Huang and Joseph K. Liu and Li Xu and Wei Wu}, title = {Cooperative attribute-based access control for enterprise computing system}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {191--202}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072364}, doi = {10.1504/IJES.2015.072364}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/LiHLXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/MaCWZL15, author = {Jinhua Ma and Zhide Chen and Wei Wu and Rongjun Zheng and Jianghua Liu}, title = {Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies}, journal = {Inf.}, volume = {6}, number = {3}, pages = {536--549}, year = {2015}, url = {https://doi.org/10.3390/info6030536}, doi = {10.3390/INFO6030536}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/MaCWZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/YangLWAS15, author = {Xu Yang and Joseph K. Liu and Wei Wu and Man Ho Au and Willy Susilo}, title = {{PEVTS:} Privacy-Preserving Electric Vehicles Test-Bedding Scheme}, booktitle = {21st {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2015, Melbourne, Australia, December 14-17, 2015}, pages = {282--289}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICPADS.2015.43}, doi = {10.1109/ICPADS.2015.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/YangLWAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangWLC15, author = {Xu Yang and Wei Wu and Joseph K. Liu and Xiaofeng Chen}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Lightweight Anonymous Authentication for Ad Hoc Group: {A} Ring Signature Approach}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {215--226}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_12}, doi = {10.1007/978-3-319-26059-4\_12}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YangWLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuLZWHX15, author = {Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang}, title = {Certificate-Based Encryption Resilient to Key Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2015}, url = {http://eprint.iacr.org/2015/314}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YuLZWHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChenQXW14, author = {Zhide Chen and Cheng Qiao and Li Xu and Wei Wu}, title = {Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory}, journal = {Concurr. Comput. Pract. Exp.}, volume = {26}, number = {5}, pages = {1130--1141}, year = {2014}, url = {https://doi.org/10.1002/cpe.3060}, doi = {10.1002/CPE.3060}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChenQXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChenQQXW14, author = {Zhide Chen and Cheng Qiao and Yihui Qiu and Li Xu and Wei Wu}, title = {Dynamics stability in wireless sensor networks active defense model}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {8}, pages = {1534--1548}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2014.04.020}, doi = {10.1016/J.JCSS.2014.04.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ChenQQXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeXW14, author = {Yuan He and Li Xu and Wei Wu}, title = {A local joint fast handoff scheme in cognitive wireless mesh networks}, journal = {Secur. Commun. Networks}, volume = {7}, number = {2}, pages = {455--465}, year = {2014}, url = {https://doi.org/10.1002/sec.832}, doi = {10.1002/SEC.832}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HeXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/LinXZW14, author = {Limei Lin and Li Xu and Shuming Zhou and Wei Wu}, editor = {Xingang Liu and Didier El Baz and Ching{-}Hsien Hsu and Kai Kang and Weifeng Chen}, title = {The Social Feature-Based Priority Relation Graph of Mobile Social Networks}, booktitle = {17th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014}, pages = {1921--1926}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSE.2014.352}, doi = {10.1109/CSE.2014.352}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/LinXZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/XuCZW13, author = {Li Xu and Xi Cao and Yuexin Zhang and Wei Wu}, title = {Software Service Signature {(S3)} for authentication in cloud computing}, journal = {Clust. Comput.}, volume = {16}, number = {4}, pages = {905--914}, year = {2013}, url = {https://doi.org/10.1007/s10586-013-0262-y}, doi = {10.1007/S10586-013-0262-Y}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/XuCZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/WuZXX13, author = {Wei Wu and Jianying Zhou and Yang Xiang and Li Xu}, title = {How to achieve non-repudiation of origin with privacy protection in cloud computing}, journal = {J. Comput. Syst. Sci.}, volume = {79}, number = {8}, pages = {1200--1213}, year = {2013}, url = {https://doi.org/10.1016/j.jcss.2013.03.001}, doi = {10.1016/J.JCSS.2013.03.001}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/WuZXX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangXZW13, author = {Jing Zhang and Li Xu and Shuming Zhou and Wei Wu}, title = {Constructing Connected Dominating Set Based on Crossed Cube in {WSN}}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {443--447}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.83}, doi = {10.1109/INCOS.2013.83}, timestamp = {Wed, 05 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhangXZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangMSWW12, author = {Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu}, title = {Certificateless Signatures: New Schemes and Security Models}, journal = {Comput. J.}, volume = {55}, number = {4}, pages = {457--474}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr097}, doi = {10.1093/COMJNL/BXR097}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangMSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WuMSHX12, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang and Li Xu}, title = {A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption}, journal = {Comput. J.}, volume = {55}, number = {10}, pages = {1157--1168}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr130}, doi = {10.1093/COMJNL/BXR130}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WuMSHX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/XuPWW12, author = {Li Xu and Penggui Pan and Xiaoding Wang and Wei Wu}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {259--263}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.38}, doi = {10.1109/INCOS.2012.38}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/XuPWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CaoXZW12, author = {Xi Cao and Li Xu and Yuexin Zhang and Wei Wu}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Identity-Based Proxy Signature for Cloud Service in SaaS}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {594--599}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.37}, doi = {10.1109/INCOS.2012.37}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/CaoXZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/WuMSH11, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, title = {Provably secure server-aided verification signatures}, journal = {Comput. Math. Appl.}, volume = {61}, number = {7}, pages = {1705--1723}, year = {2011}, url = {https://doi.org/10.1016/j.camwa.2011.01.036}, doi = {10.1016/J.CAMWA.2011.01.036}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/WuMSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HuangMSWX11, author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu and Yang Xiang}, title = {Optimistic Fair Exchange with Strong Resolution-Ambiguity}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {29}, number = {7}, pages = {1491--1502}, year = {2011}, url = {https://doi.org/10.1109/JSAC.2011.110814}, doi = {10.1109/JSAC.2011.110814}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/HuangMSWX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangMSWZD11, author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu and Jianying Zhou and Robert H. Deng}, title = {Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {2}, pages = {498--512}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2109952}, doi = {10.1109/TIFS.2011.2109952}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangMSWZD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangMSWX10, author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu and Yang Xiang}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {124--141}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_8}, doi = {10.1007/978-3-642-13013-7\_8}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HuangMSWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/WuMSH09, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, title = {Certificate-based Signatures Revisited}, journal = {J. Univers. Comput. Sci.}, volume = {15}, number = {8}, pages = {1659--1684}, year = {2009}, url = {https://doi.org/10.3217/jucs-015-08-1659}, doi = {10.3217/JUCS-015-08-1659}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/WuMSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HuangSMW08, author = {Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu}, title = {Secure universal designated verifier signature without random oracles}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {3}, pages = {171--183}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0021-2}, doi = {10.1007/S10207-007-0021-2}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HuangSMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/LiHMW08, author = {Jiguo Li and Xinyi Huang and Yi Mu and Wei Wu}, title = {Cryptanalysis and improvement of an efficient certificateless signature scheme}, journal = {J. Commun. Networks}, volume = {10}, number = {1}, pages = {10--17}, year = {2008}, url = {https://doi.org/10.1109/JCN.2008.6388323}, doi = {10.1109/JCN.2008.6388323}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/LiHMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WuMSH08, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Server-Aided Verification Signatures: Definitions and New Constructions}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {141--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_10}, doi = {10.1007/978-3-540-88733-1\_10}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WuMSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WuMSH08, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {99--114}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_8}, doi = {10.1007/978-3-642-00306-6\_8}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WuMSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangMSWW07, author = {Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Certificateless Signature Revisited}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {308--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_23}, doi = {10.1007/978-3-540-73458-1\_23}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/WuMSSH07, author = {Wei Wu and Yi Mu and Willy Susilo and Jennifer Seberry and Xinyi Huang}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {Identity-Based Proxy Signature from Pairings}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {22--31}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_5}, doi = {10.1007/978-3-540-73547-2\_5}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/WuMSSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HuangMSW07, author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {A Generic Construction for Universally-Convertible Undeniable Signatures}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {15--33}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_2}, doi = {10.1007/978-3-540-76969-9\_2}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/HuangMSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuMSH08, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {25--39}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_4}, doi = {10.1007/978-3-540-79499-8\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WuMSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/HuangMSW07, author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu}, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length}, booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {367--391}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5\_21}, doi = {10.1007/978-3-540-73489-5\_21}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/HuangMSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangZW07, author = {Lei Zhang and Futai Zhang and Wei Wu}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {A Provably Secure Ring Signature Scheme in Certificateless Cryptography}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {103--121}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_7}, doi = {10.1007/978-3-540-75670-5\_7}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WuMSH07, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {16--29}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_2}, doi = {10.1007/978-3-540-77535-5\_2}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WuMSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HuangSMW06, author = {Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Universal Designated Verifier Signature Without Delegatability}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {479--498}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_34}, doi = {10.1007/11935308\_34}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HuangSMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/HuangSMW06, author = {Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu}, editor = {Jiannong Cao and Ivan Stojmenovic and Xiaohua Jia and Sajal K. Das}, title = {Proxy Signature Without Random Oracles}, booktitle = {Mobile Ad-hoc and Sensor Networks, Second International Conference, {MSN} 2006, Hong Kong, China, December 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4325}, pages = {473--484}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11943952\_40}, doi = {10.1007/11943952\_40}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/msn/HuangSMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.