BibTeX records: Dong Zheng 0001

download as .bib file

@article{DBLP:journals/tcom/Gao000T24,
  author       = {Chan Gao and
                  Bin Yang and
                  Dong Zheng and
                  Xiaohong Jiang and
                  Tarik Taleb},
  title        = {Cooperative Jamming and Relay Selection for Covert Communications
                  in Wireless Relay Systems},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {72},
  number       = {2},
  pages        = {1020--1032},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCOMM.2023.3327272},
  doi          = {10.1109/TCOMM.2023.3327272},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/Gao000T24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-09475,
  author       = {Chan Gao and
                  Linying Tian and
                  Dong Zheng},
  title        = {Covert Communication for Untrusted UAV-Assisted Wireless Systems},
  journal      = {CoRR},
  volume       = {abs/2403.09475},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.09475},
  doi          = {10.48550/ARXIV.2403.09475},
  eprinttype    = {arXiv},
  eprint       = {2403.09475},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-09475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiZZQ23,
  author       = {Le Li and
                  Dong Zheng and
                  Haoyu Zhang and
                  Baodong Qin},
  title        = {Data Secure De-Duplication and Recovery Based on Public Key Encryption
                  With Keyword Search},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {28688--28698},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3251370},
  doi          = {10.1109/ACCESS.2023.3251370},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiZZQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/ZhaoLCQZ23,
  author       = {Qinglan Zhao and
                  Mengran Li and
                  Zhixiong Chen and
                  Baodong Qin and
                  Dong Zheng},
  title        = {A unified construction of weightwise perfectly balanced Boolean functions},
  journal      = {Discret. Appl. Math.},
  volume       = {337},
  pages        = {190--201},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dam.2023.04.021},
  doi          = {10.1016/J.DAM.2023.04.021},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/ZhaoLCQZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/Liu0HC0023,
  author       = {Wei Liu and
                  Yinghui Zhang and
                  Gang Han and
                  Jin Cao and
                  Hui Cui and
                  Dong Zheng},
  title        = {Secure and Efficient Smart Healthcare System Based on Federated Learning},
  journal      = {Int. J. Intell. Syst.},
  volume       = {2023},
  pages        = {1--12},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/8017489},
  doi          = {10.1155/2023/8017489},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/Liu0HC0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/FanQZ23,
  author       = {Yajun Fan and
                  Baodong Qin and
                  Dong Zheng},
  title        = {A lattice-based designated-server public-key authenticated encryption
                  with keyword search},
  journal      = {J. Syst. Archit.},
  volume       = {145},
  pages        = {103031},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103031},
  doi          = {10.1016/J.SYSARC.2023.103031},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/FanQZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WangLLZ23,
  author       = {Qian Wang and
                  Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng},
  title        = {Searchable Encryption With Autonomous Path Delegation Function and
                  Its Application in Healthcare Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {879--896},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3120110},
  doi          = {10.1109/TCC.2021.3120110},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/WangLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LaiMLZZ23,
  author       = {Chengzhe Lai and
                  Yixiao Ma and
                  Rongxing Lu and
                  Yinghui Zhang and
                  Dong Zheng},
  title        = {A Novel Authentication Scheme Supporting Multiple User Access for
                  5G and Beyond},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {2970--2987},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3198723},
  doi          = {10.1109/TDSC.2022.3198723},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LaiMLZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangLHZ23,
  author       = {Qian Wang and
                  Chengzhe Lai and
                  Gang Han and
                  Dong Zheng},
  title        = {pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching
                  Scheme},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {11},
  pages        = {12491--12505},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3286804},
  doi          = {10.1109/TITS.2023.3286804},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangLHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangDCHZ23,
  author       = {Yinghui Zhang and
                  Hao Du and
                  Jin Cao and
                  Gang Han and
                  Dong Zheng},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {DP-Loc: {A} Differential Privacy-Based Indoor Localization Scheme
                  with Bilateral Privacy Protection},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {293--304},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_16},
  doi          = {10.1007/978-981-97-0945-8\_16},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangDCHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LaiLLZ23,
  author       = {Chengzhe Lai and
                  Meng Li and
                  Guanjie Li and
                  Dong Zheng},
  title        = {Efficient Group Authentication and Key Agreement Scheme for Vehicular
                  Digital Twin},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233652},
  doi          = {10.1109/ICCC57788.2023.10233652},
  timestamp    = {Wed, 13 Sep 2023 08:43:35 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LaiLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LaiWMZ23,
  author       = {Chengzhe Lai and
                  Hao Wang and
                  Haoyan Ma and
                  Dong Zheng},
  title        = {Blockchain-based Multi-Factor Group Authentication in Metaverse},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233657},
  doi          = {10.1109/ICCC57788.2023.10233657},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LaiWMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoLCQZ23,
  author       = {Qinglan Zhao and
                  Mengran Li and
                  Zhixiong Chen and
                  Baodong Qin and
                  Dong Zheng},
  title        = {A unified construction of weightwise perfectly balanced Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/460},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoLCQZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ZhengZLCZ22,
  author       = {Xiaokun Zheng and
                  Yanqi Zhao and
                  Huilin Li and
                  Ruonan Chen and
                  Dong Zheng},
  title        = {Blockchain-based verifiable privacy-preserving data classification
                  protocol for medical data},
  journal      = {Comput. Stand. Interfaces},
  volume       = {82},
  pages        = {103605},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103605},
  doi          = {10.1016/J.CSI.2021.103605},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/ZhengZLCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/ZhouLGMZ22,
  author       = {Qian Zhou and
                  Chengzhe Lai and
                  Qili Guo and
                  Haoyan Ma and
                  Dong Zheng},
  title        = {A novel privacy protection scheme for internet of things based on
                  blockchain and privacy set intersection technique},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {93},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-022-00375-6},
  doi          = {10.1186/S13677-022-00375-6},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/ZhouLGMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/ZhangWCNYZ22,
  author       = {Yinghui Zhang and
                  Xuanni Wei and
                  Jin Cao and
                  Jianting Ning and
                  Zuobin Ying and
                  Dong Zheng},
  title        = {Blockchain-Enabled decentralized Attribute-Based access control with
                  policy hiding for smart healthcare},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {10 Part {A}},
  pages        = {8350--8361},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2022.08.015},
  doi          = {10.1016/J.JKSUCI.2022.08.015},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/ZhangWCNYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LaiMGZ22,
  author       = {Chengzhe Lai and
                  Zhe Ma and
                  Rui Guo and
                  Dong Zheng},
  title        = {Secure medical data sharing scheme based on traceable ring signature
                  and blockchain},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {15},
  number       = {3},
  pages        = {1562--1576},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12083-022-01303-w},
  doi          = {10.1007/S12083-022-01303-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LaiMGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiLLZ22,
  author       = {Guanjie Li and
                  Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng},
  title        = {SecCDV: {A} Security Reference Architecture for Cybertwin-Driven 6G
                  {V2X}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {5},
  pages        = {4535--4550},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2021.3133308},
  doi          = {10.1109/TVT.2021.3133308},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LiLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LiZLNZ22,
  author       = {Yifei Li and
                  Yinghui Zhang and
                  Wei Liu and
                  Jianting Ning and
                  Dong Zheng},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {A Collaborative Access Control Scheme Based on Incentive Mechanisms},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13547},
  pages        = {48--55},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_4},
  doi          = {10.1007/978-3-031-18067-5\_4},
  timestamp    = {Mon, 21 Nov 2022 12:53:24 +0100},
  biburl       = {https://dblp.org/rec/conf/css/LiZLNZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LaiWZ22,
  author       = {Chengzhe Lai and
                  Menghua Wang and
                  Dong Zheng},
  title        = {{SPDT:} Secure and Privacy-Preserving Scheme for Digital Twin-based
                  Traffic Control},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2022, Sanshui, Foshan, China, August 11-13, 2022},
  pages        = {144--149},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCC55456.2022.9880784},
  doi          = {10.1109/ICCC55456.2022.9880784},
  timestamp    = {Tue, 04 Oct 2022 22:39:13 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LaiWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhangWCZCJ21,
  author       = {Yinghui Zhang and
                  Axin Wu and
                  Zhenwei Chen and
                  Dong Zheng and
                  Jin Cao and
                  Xiaohong Jiang},
  title        = {Flexible and anonymous network slicing selection for {C-RAN} enabled
                  5G service authentication},
  journal      = {Comput. Commun.},
  volume       = {166},
  pages        = {165--173},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comcom.2020.12.014},
  doi          = {10.1016/J.COMCOM.2020.12.014},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhangWCZCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/0002DXSL020,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Shengmin Xu and
                  Jianfei Sun and
                  Qi Li and
                  Dong Zheng},
  title        = {Attribute-based Encryption for Cloud Computing Access Control: {A}
                  Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {53},
  number       = {4},
  pages        = {83:1--83:41},
  year         = {2021},
  url          = {https://doi.org/10.1145/3398036},
  doi          = {10.1145/3398036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/0002DXSL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/LaiLZ21,
  author       = {Chengzhe Lai and
                  Guanjie Li and
                  Dong Zheng},
  title        = {{SPSC:} {A} secure and privacy-preserving autonomous platoon setup
                  and communication scheme},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {9},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3982},
  doi          = {10.1002/ETT.3982},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/LaiLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GuoYSZZ21,
  author       = {Rui Guo and
                  Geng Yang and
                  Huixian Shi and
                  Yinghui Zhang and
                  Dong Zheng},
  title        = {O\({}^{\mbox{3}}\)-R-CP-ABE: An Efficient and Revocable Attribute-Based
                  Encryption Scheme in the Cloud-Assisted IoMT System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {11},
  pages        = {8949--8963},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3055541},
  doi          = {10.1109/JIOT.2021.3055541},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GuoYSZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LaiLZZ21,
  author       = {Chengzhe Lai and
                  Qian Li and
                  Haibo Zhou and
                  Dong Zheng},
  title        = {{SRSP:} {A} Secure and Reliable Smart Parking Scheme With Dual Privacy
                  Preservation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {13},
  pages        = {10619--10630},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3048177},
  doi          = {10.1109/JIOT.2020.3048177},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LaiLZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LaiDGZ21,
  author       = {Chengzhe Lai and
                  Yangyang Du and
                  Qili Guo and
                  Dong Zheng},
  title        = {A trust-based privacy-preserving friend matching scheme in social
                  Internet of Vehicles},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {4},
  pages        = {2011--2025},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-021-01140-3},
  doi          = {10.1007/S12083-021-01140-3},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LaiDGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZZ21,
  author       = {Huimin Wang and
                  Dong Zheng and
                  Qinglan Zhao},
  title        = {Publicly Verifiable Outsourcing Computation for {QR} Decomposition
                  Based on Blockchain},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6632518:1--6632518:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6632518},
  doi          = {10.1155/2021/6632518},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0002DB021,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Elisa Bertino and
                  Dong Zheng},
  title        = {Robust and Universal Seamless Handover Authentication in 5G HetNets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {858--874},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2927664},
  doi          = {10.1109/TDSC.2019.2927664},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/0002DB021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhangDLZ21,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Ximeng Liu and
                  Dong Zheng},
  title        = {Outsourcing Service Fair Payment Based on Blockchain and Its Applications
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {1152--1166},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSC.2018.2864191},
  doi          = {10.1109/TSC.2018.2864191},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhangDLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/QinBZCL21,
  author       = {Baodong Qin and
                  Xue Bai and
                  Dong Zheng and
                  Hui Cui and
                  Yiyuan Luo},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Forward-Secure Revocable Identity-Based Encryption},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {321--340},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_19},
  doi          = {10.1007/978-3-030-88052-1\_19},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/QinBZCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/QinCZZ21,
  author       = {Baodong Qin and
                  Hui Cui and
                  Xiaokun Zheng and
                  Dong Zheng},
  editor       = {Qiong Huang and
                  Yu Yu},
  title        = {Improved Security Model for Public-Key Authenticated Encryption with
                  Keyword Search},
  booktitle    = {Provable and Practical Security - 15th International Conference, ProvSec
                  2021, Guangzhou, China, November 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13059},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90402-9\_2},
  doi          = {10.1007/978-3-030-90402-9\_2},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/QinCZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/QinLWZ20,
  author       = {Baodong Qin and
                  Ximeng Liu and
                  Zhuo Wei and
                  Dong Zheng},
  title        = {Space efficient revocable {IBE} for mobile devices in cloud computing},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-018-9455-5},
  doi          = {10.1007/S11432-018-9455-5},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/QinLWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangZXXZ20,
  author       = {Yinghui Zhang and
                  Tiantian Zhang and
                  Shengmin Xu and
                  Guowen Xu and
                  Dong Zheng},
  title        = {Revocable and certificateless public auditing for cloud storage},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {10},
  pages        = {1--3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-2793-y},
  doi          = {10.1007/S11432-019-2793-Y},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangZXXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/GuoZSZZ20,
  author       = {Rui Guo and
                  Chaoyuan Zhuang and
                  Huixian Shi and
                  Yinghui Zhang and
                  Dong Zheng},
  title        = {A lightweight verifiable outsourced decryption of attribute-based
                  encryption scheme for blockchain-enabled wireless body area network
                  in fog computing},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720906796},
  doi          = {10.1177/1550147720906796},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/GuoZSZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangMWRZ20,
  author       = {Yinghui Zhang and
                  Xinwei Ma and
                  Axin Wu and
                  Fangyuan Ren and
                  Dong Zheng},
  title        = {An Efficient Mobile Location-based Service Framework for Resource-constrained
                  Devices},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {698--707},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n4/ijns-2020-v22-n4-p698-707.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangMWRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuZGWWG20,
  author       = {Chencheng Hu and
                  Dong Zheng and
                  Rui Guo and
                  Axin Wu and
                  Liang Wang and
                  Shiyao Gao},
  title        = {A Novel Blockchain-based Anonymous Handover Authentication Scheme
                  in Mobile Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {874--884},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n5/ijns-2020-v22-n5-p874-884.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuZGWWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LaiZCZ20,
  author       = {Chengzhe Lai and
                  Min Zhang and
                  Jie Cao and
                  Dong Zheng},
  title        = {{SPIR:} {A} Secure and Privacy-Preserving Incentive Scheme for Reliable
                  Real-Time Map Updates},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {1},
  pages        = {416--428},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2953188},
  doi          = {10.1109/JIOT.2019.2953188},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LaiZCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinCHLZ20,
  author       = {Baodong Qin and
                  Yu Chen and
                  Qiong Huang and
                  Ximeng Liu and
                  Dong Zheng},
  title        = {Public-key authenticated encryption with keyword search revisited:
                  Security model and constructions},
  journal      = {Inf. Sci.},
  volume       = {516},
  pages        = {515--528},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.12.063},
  doi          = {10.1016/J.INS.2019.12.063},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/QinCHLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LaiLZS20,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng and
                  Xuemin Sherman Shen},
  title        = {Security and Privacy Challenges in 5G-Enabled Vehicular Networks},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {2},
  pages        = {37--45},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900220},
  doi          = {10.1109/MNET.001.1900220},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/LaiLZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/GuoLZZ20,
  author       = {Rui Guo and
                  Xiong Li and
                  Dong Zheng and
                  Yinghui Zhang},
  title        = {An attribute-based encryption scheme with multiple authorities on
                  hierarchical personal health record in cloud},
  journal      = {J. Supercomput.},
  volume       = {76},
  number       = {7},
  pages        = {4884--4903},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11227-018-2644-7},
  doi          = {10.1007/S11227-018-2644-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/GuoLZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/ZhengQLT20,
  author       = {Dong Zheng and
                  Baodong Qin and
                  Yannan Li and
                  Aikui Tian},
  title        = {Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation
                  in the Internet of Things},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {27},
  number       = {3},
  pages        = {18--23},
  year         = {2020},
  url          = {https://doi.org/10.1109/MWC.001.1900433},
  doi          = {10.1109/MWC.001.1900433},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/ZhengQLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ChiQZ20,
  author       = {Tianyu Chi and
                  Baodong Qin and
                  Dong Zheng},
  title        = {An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted
                  Medical Internet of Things},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8816172:1--8816172:11},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8816172},
  doi          = {10.1155/2020/8816172},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ChiQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LaiW020,
  author       = {Chengzhe Lai and
                  Jinke Wan and
                  Dong Zheng},
  title        = {Dual Privacy-Preserving Health Data Aggregation Scheme Assisted by
                  Medical Edge Computing},
  booktitle    = {9th {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2020, Chongqing, China, August 9-11, 2020},
  pages        = {154--159},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCC49849.2020.9238932},
  doi          = {10.1109/ICCC49849.2020.9238932},
  timestamp    = {Thu, 19 Nov 2020 11:05:15 +0100},
  biburl       = {https://dblp.org/rec/conf/iccchina/LaiW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Chen0HHG020,
  author       = {Zhenwei Chen and
                  Yinghui Zhang and
                  Gang Han and
                  Jiangyong He and
                  Rui Guo and
                  Dong Zheng},
  editor       = {Xiaofeng Chen and
                  Hongyang Yan and
                  Qiben Yan and
                  Xiangliang Zhang},
  title        = {Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword
                  Guessing Attacks},
  booktitle    = {Machine Learning for Cyber Security - Third International Conference,
                  {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12486},
  pages        = {307--316},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62223-7\_26},
  doi          = {10.1007/978-3-030-62223-7\_26},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Chen0HHG020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QinZ19,
  author       = {Baodong Qin and
                  Dong Zheng},
  title        = {Generic Approach to Outsource the Decryption of Attribute-Based Encryption
                  in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {42331--42342},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2907364},
  doi          = {10.1109/ACCESS.2019.2907364},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QinZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoSZJZW19,
  author       = {Rui Guo and
                  Huixian Shi and
                  Dong Zheng and
                  Chunming Jing and
                  Chaoyuan Zhuang and
                  Zhengyang Wang},
  title        = {Flexible and Efficient Blockchain-Based {ABE} Scheme With Multi-Authority
                  for Medical on Demand in Telemedicine System},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88012--88025},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2925625},
  doi          = {10.1109/ACCESS.2019.2925625},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoSZJZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangCZGX19,
  author       = {Yinghui Zhang and
                  Chen Chen and
                  Dong Zheng and
                  Rui Guo and
                  Shengmin Xu},
  title        = {Shared Dynamic Data Audit Supporting Anonymous User Revocation in
                  Cloud Storage},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {113832--113843},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2935180},
  doi          = {10.1109/ACCESS.2019.2935180},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangCZGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangRWZCZ19,
  author       = {Yinghui Zhang and
                  Fangyuan Ren and
                  Axin Wu and
                  Tiantian Zhang and
                  Jin Cao and
                  Dong Zheng},
  title        = {Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals
                  in 5G Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {114721--114730},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2936123},
  doi          = {10.1109/ACCESS.2019.2936123},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangRWZCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GaoZGJH19,
  author       = {Shiyao Gao and
                  Dong Zheng and
                  Rui Guo and
                  Chunming Jing and
                  Chencheng Hu},
  title        = {An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {115304--115316},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2935895},
  doi          = {10.1109/ACCESS.2019.2935895},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GaoZGJH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengJGGW19,
  author       = {Dong Zheng and
                  Chunming Jing and
                  Rui Guo and
                  Shiyao Gao and
                  Liang Wang},
  title        = {A Traceable Blockchain-Based Access Authentication System With Privacy
                  Preservation in VANETs},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {117716--117726},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2936575},
  doi          = {10.1109/ACCESS.2019.2936575},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhengJGGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/WuZZGZZ19,
  author       = {Axin Wu and
                  Yinghui Zhang and
                  Xiaokun Zheng and
                  Rui Guo and
                  Qinglan Zhao and
                  Dong Zheng},
  title        = {Efficient and privacy-preserving traceable attribute-based encryption
                  in blockchain},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {74},
  number       = {7-8},
  pages        = {401--411},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12243-018-00699-y},
  doi          = {10.1007/S12243-018-00699-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/WuZZGZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ZhangWZZ19,
  author       = {Yinghui Zhang and
                  Axin Wu and
                  Tiantian Zhang and
                  Dong Zheng},
  title        = {Secure and flexible keyword search over encrypted data with outsourced
                  decryption in Internet of things},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {74},
  number       = {7-8},
  pages        = {413--421},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12243-018-0694-8},
  doi          = {10.1007/S12243-018-0694-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ZhangWZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiZZ19,
  author       = {Luyang Li and
                  Dong Zheng and
                  Qinglan Zhao},
  title        = {Construction of Resilient Boolean and Vectorial Boolean Functions
                  with High Nonlinearity},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {10},
  pages        = {1397--1401},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1397},
  doi          = {10.1587/TRANSFUN.E102.A.1397},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoZQG19,
  author       = {Qinglan Zhao and
                  Dong Zheng and
                  Baodong Qin and
                  Rui Guo},
  title        = {Constructions of 2-Rotation Symmetric Semi-Bent Functions with Degree
                  Bigger than 2},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {11},
  pages        = {1497--1503},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1497},
  doi          = {10.1587/TRANSFUN.E102.A.1497},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoZQG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/ZhangYZZGR19,
  author       = {Yinghui Zhang and
                  Menglei Yang and
                  Dong Zheng and
                  Tiantian Zhang and
                  Rui Guo and
                  Fang Ren},
  title        = {Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient
                  Anonymity},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {30},
  number       = {4},
  pages        = {665--681},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0129054119400197},
  doi          = {10.1142/S0129054119400197},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfcs/ZhangYZZGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangSLLZ19,
  author       = {Yinghui Zhang and
                  Jiangang Shu and
                  Ximeng Liu and
                  Jin Li and
                  Dong Zheng},
  title        = {Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification
                  Scheme for Mobile Healthcare Crowd Sensing"},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {1},
  pages        = {1287--1290},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2862381},
  doi          = {10.1109/JIOT.2018.2862381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangSLLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinZZC19,
  author       = {Baodong Qin and
                  Qinglan Zhao and
                  Dong Zheng and
                  Hui Cui},
  title        = {(Dual) server-aided revocable attribute-based encryption with decryption
                  key exposure resistance},
  journal      = {Inf. Sci.},
  volume       = {490},
  pages        = {74--92},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.03.053},
  doi          = {10.1016/J.INS.2019.03.053},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/QinZZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/0002Z0X019,
  author       = {Yinghui Zhang and
                  Tiantian Zhang and
                  Rui Guo and
                  Shengmin Xu and
                  Dong Zheng},
  title        = {Traceable Dynamic Public Auditing with Identity Privacy Preserving
                  for Cloud Storage},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {11},
  pages        = {5653--5672},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.11.021},
  doi          = {10.3837/TIIS.2019.11.021},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/0002Z0X019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/RenY019,
  author       = {Fang Ren and
                  Xuefei Yang and
                  Dong Zheng},
  title        = {A {QC-LDPC} Code Based Digital Signature Algorithm},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {35},
  number       = {5},
  pages        = {1061--1074},
  year         = {2019},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=170\_2266},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/RenY019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Yang0R19,
  author       = {Xuefei Yang and
                  Dong Zheng and
                  Fang Ren},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}QC-LDPC{\unicode{30721}}{\unicode{30340}}{\unicode{25968}}{\unicode{23383}}{\unicode{31614}}{\unicode{21517}}{\unicode{31639}}{\unicode{27861}}
                  (Digital Signature Algorithm Based on {QC-LDPC} Code)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {46},
  number       = {6},
  pages        = {162--167},
  year         = {2019},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2019.06.024},
  doi          = {10.11896/J.ISSN.1002-137X.2019.06.024},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Yang0R19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoYZQ19,
  author       = {Qinglan Zhao and
                  Shuntong Yang and
                  Dong Zheng and
                  Baodong Qin},
  title        = {A {QR} Code Secret Hiding Scheme against Contrast Analysis Attack
                  for the Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8105787:1--8105787:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8105787},
  doi          = {10.1155/2019/8105787},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoYZQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhangDZLWC19,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Dong Zheng and
                  Jin Li and
                  Pengfei Wu and
                  Jin Cao},
  title        = {Efficient and Robust Certificateless Signature for Data Crowdsensing
                  in Cloud-Assisted Industrial IoT},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {9},
  pages        = {5099--5108},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2019.2894108},
  doi          = {10.1109/TII.2019.2894108},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhangDZLWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LaiDM019,
  author       = {Chengzhe Lai and
                  Yangyang Du and
                  Jiawei Men and
                  Dong Zheng},
  title        = {A Trust-based Real-time Map Updating Scheme},
  booktitle    = {2019 {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2019, Changchun, China, August 11-13, 2019},
  pages        = {334--339},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCChina.2019.8855894},
  doi          = {10.1109/ICCCHINA.2019.8855894},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LaiDM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoSZZ18,
  author       = {Rui Guo and
                  Huixian Shi and
                  Qinglan Zhao and
                  Dong Zheng},
  title        = {Secure Attribute-Based Signature Scheme With Multiple Authorities
                  for Blockchain in Electronic Health Records Systems},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {11676--11686},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2801266},
  doi          = {10.1109/ACCESS.2018.2801266},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoSZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengWZZ18,
  author       = {Dong Zheng and
                  Axin Wu and
                  Yinghui Zhang and
                  Qinglan Zhao},
  title        = {Efficient and Privacy-Preserving Medical Data Sharing in Internet
                  of Things With Limited Computing Power},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {28019--28027},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2840504},
  doi          = {10.1109/ACCESS.2018.2840504},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhengWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangDSYZ18,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Jiangang Shu and
                  Kan Yang and
                  Dong Zheng},
  title        = {{TKSE:} Trustworthy Keyword Search Over Encrypted Data With Two-Side
                  Verifiability via Blockchain},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {31077--31087},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2844400},
  doi          = {10.1109/ACCESS.2018.2844400},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangDSYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/ZhangZGZ18,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Rui Guo and
                  Qinglan Zhao},
  title        = {Fine-Grained Access Control Systems Suitable for Resource-Constrained
                  Users in Cloud Computing},
  journal      = {Comput. Informatics},
  volume       = {37},
  number       = {2},
  pages        = {327--348},
  year         = {2018},
  url          = {https://doi.org/10.4149/cai\_2018\_2\_327},
  doi          = {10.4149/CAI\_2018\_2\_327},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cai/ZhangZGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HanLQZ18,
  author       = {Gang Han and
                  Hui Li and
                  Baodong Qin and
                  Dong Zheng},
  title        = {Chameleon all-but-one extractable hash proof and its applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {9},
  pages        = {099103:1--099103:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9369-9},
  doi          = {10.1007/S11432-017-9369-9},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HanLQZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/QinZZ18,
  author       = {Baodong Qin and
                  Qinglan Zhao and
                  Dong Zheng},
  title        = {Bounded Revocable and Outsourceable {ABE} for Secure Data Sharing},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {8},
  pages        = {1259--1268},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy063},
  doi          = {10.1093/COMJNL/BXY063},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/QinZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/ZhaoZZ18,
  author       = {Qinglan Zhao and
                  Dong Zheng and
                  Weiguo Zhang},
  title        = {Constructions of rotation symmetric bent functions with high algebraic
                  degree},
  journal      = {Discret. Appl. Math.},
  volume       = {251},
  pages        = {15--29},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.dam.2018.05.048},
  doi          = {10.1016/J.DAM.2018.05.048},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/ZhaoZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangZD18,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Robert H. Deng},
  title        = {Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based
                  Access Control},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {3},
  pages        = {2130--2145},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2825289},
  doi          = {10.1109/JIOT.2018.2825289},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangDLZ18,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Ximeng Liu and
                  Dong Zheng},
  title        = {Blockchain based efficient and robust fair payment for outsourcing
                  services in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {462},
  pages        = {262--277},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.06.018},
  doi          = {10.1016/J.INS.2018.06.018},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangDLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/ZhangWZ18,
  author       = {Yinghui Zhang and
                  Axin Wu and
                  Dong Zheng},
  title        = {Efficient and privacy-aware attribute-based data sharing in mobile
                  cloud computing},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {1039--1048},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12652-017-0509-1},
  doi          = {10.1007/S12652-017-0509-1},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/ZhangWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangLZLT18,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Dong Zheng and
                  Ping Li and
                  Yangguang Tian},
  title        = {Privacy-preserving communication and power injection over vehicle
                  networks and 5G smart grid slice},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {122},
  pages        = {50--60},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.07.017},
  doi          = {10.1016/J.JNCA.2018.07.017},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangLZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangDHZ18,
  author       = {Yinghui Zhang and
                  Robert H. Deng and
                  Gang Han and
                  Dong Zheng},
  title        = {Secure smart health with privacy-aware aggregate authentication and
                  access control in Internet of Things},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {123},
  pages        = {89--100},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.09.005},
  doi          = {10.1016/J.JNCA.2018.09.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangDHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Yan00LS18,
  author       = {Ming Yan and
                  Yinghui Zhang and
                  Dong Zheng and
                  Liudi Lv and
                  Haonan Su},
  title        = {{\unicode{28789}}{\unicode{27963}}{\unicode{35775}}{\unicode{38382}}{\unicode{19988}}{\unicode{27169}}{\unicode{31946}}{\unicode{21487}}{\unicode{25628}}{\unicode{32034}}{\unicode{30340}}EHR{\unicode{20113}}{\unicode{26381}}{\unicode{21153}}{\unicode{31995}}{\unicode{32479}}
                  (Flexibly Accessed and Vaguely Searchable {EHR} Cloud Service System)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {10},
  pages        = {172--177},
  year         = {2018},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2018.10.032},
  doi          = {10.11896/J.ISSN.1002-137X.2018.10.032},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Yan00LS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LaiGLZ18,
  author       = {Chengzhe Lai and
                  Wenlong Guo and
                  Yafei Li and
                  Dong Zheng},
  title        = {{SEIP:} Secure and seamless {IP} communications for group-oriented
                  machine to machine communications},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {5},
  pages        = {821--836},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0568-2},
  doi          = {10.1007/S12083-017-0568-2},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LaiGLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangLZYG18,
  author       = {Yinghui Zhang and
                  Pengzhen Lang and
                  Dong Zheng and
                  Menglei Yang and
                  Rui Guo},
  title        = {A Secure and Privacy-Aware Smart Health System with Secret Key Leakage
                  Resilience},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7202598:1--7202598:13},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7202598},
  doi          = {10.1155/2018/7202598},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangLZYG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangSY0RZ18,
  author       = {Yinghui Zhang and
                  Haonan Su and
                  Menglei Yang and
                  Dong Zheng and
                  Fang Ren and
                  Qinglan Zhao},
  title        = {Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing
                  Data in Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9081814:1--9081814:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9081814},
  doi          = {10.1155/2018/9081814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangSY0RZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WuZZY18,
  author       = {Axin Wu and
                  Dong Zheng and
                  Yinghui Zhang and
                  Menglei Yang},
  title        = {Hidden Policy Attribute-Based Data Sharing with Direct Revocation
                  and Keyword Search in Cloud Computing},
  journal      = {Sensors},
  volume       = {18},
  number       = {7},
  pages        = {2158},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18072158},
  doi          = {10.3390/S18072158},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/WuZZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangZ0DRZS18,
  author       = {Yinghui Zhang and
                  Jiangfan Zhao and
                  Dong Zheng and
                  Kaixin Deng and
                  Fangyuan Ren and
                  Xiaokun Zheng and
                  Jiangang Shu},
  title        = {Privacy-Preserving Data Aggregation against False Data Injection Attacks
                  in Fog Computing},
  journal      = {Sensors},
  volume       = {18},
  number       = {8},
  pages        = {2659},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18082659},
  doi          = {10.3390/S18082659},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangZ0DRZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangYZLWC18,
  author       = {Yinghui Zhang and
                  Menglei Yang and
                  Dong Zheng and
                  Pengzhen Lang and
                  Axin Wu and
                  Chen Chen},
  title        = {Efficient and secure big data storage system with leakage resilience
                  in cloud computing},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {23},
  pages        = {7763--7772},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-018-3435-z},
  doi          = {10.1007/S00500-018-3435-Z},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangYZLWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/LaiZZJ18,
  author       = {Chengzhe Lai and
                  Dong Zheng and
                  Qinglan Zhao and
                  Xiaohong Jiang},
  title        = {{SEGM:} {A} secure group management framework in integrated VANET-cellular
                  networks},
  journal      = {Veh. Commun.},
  volume       = {11},
  pages        = {33--45},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.vehcom.2018.01.004},
  doi          = {10.1016/J.VEHCOM.2018.01.004},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/LaiZZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/0001DZZZM18,
  author       = {Dong Zheng and
                  Kaixin Deng and
                  Yinghui Zhang and
                  Jiangfan Zhao and
                  Xiaokun Zheng and
                  Xinwei Ma},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Smart Grid Power Trading Based on Consortium Blockchain in Internet
                  of Things},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11336},
  pages        = {453--459},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05057-3\_34},
  doi          = {10.1007/978-3-030-05057-3\_34},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/0001DZZZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ZhangZ0DRZ18,
  author       = {Yinghui Zhang and
                  Jiangfan Zhao and
                  Dong Zheng and
                  Kaixin Deng and
                  Fangyuan Ren and
                  Xiaokun Zheng},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {581--590},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_44},
  doi          = {10.1007/978-3-030-05063-4\_44},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ZhangZ0DRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/RenY018,
  author       = {Fang Ren and
                  Xuefei Yang and
                  Dong Zheng},
  title        = {A {QC-LDPC} Code Based Digital Signature Algorithm},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2018, Xi'an, China, October 12-15, 2018},
  pages        = {257--262},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NANA.2018.8648750},
  doi          = {10.1109/NANA.2018.8648750},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nana/RenY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoZ17a,
  author       = {Qinglan Zhao and
                  Dong Zheng},
  title        = {Two classes of rotation symmetric semi-bent functions},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {6},
  pages        = {068103:1--068103:3},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-9036-y},
  doi          = {10.1007/S11432-016-9036-Y},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhaoZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoZLZD17,
  author       = {Qinglan Zhao and
                  Dong Zheng and
                  Xiangxue Li and
                  Yinghui Zhang and
                  Xiaoli Dong},
  title        = {Characterizing Linear Structures of Boolean Functions from Arithmetic
                  Walsh Transform},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1965--1972},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1965},
  doi          = {10.1587/TRANSFUN.E100.A.1965},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoZLZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenZW17,
  author       = {Fang Ren and
                  Dong Zheng and
                  WeiJing Wang},
  title        = {An Efficient Code Based Digital Signature Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1072--1079},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1072-1079.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RenZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Ye0R18,
  author       = {Junyao Ye and
                  Dong Zheng and
                  Fang Ren},
  title        = {{\unicode{25913}}{\unicode{36827}}{\unicode{30340}}{\unicode{20855}}{\unicode{26377}}{\unicode{36731}}{\unicode{37327}}{\unicode{32423}}{\unicode{32467}}{\unicode{26500}}{\unicode{30340}}Veron{\unicode{36523}}{\unicode{20221}}{\unicode{35748}}{\unicode{35777}}{\unicode{21450}}{\unicode{25968}}{\unicode{23383}}{\unicode{31614}}{\unicode{21517}}{\unicode{26041}}{\unicode{26696}}
                  (Improved Veron's Identification with Lightweight Structure and Digital
                  Signature Scheme)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {3},
  pages        = {168--174},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.03.037},
  doi          = {10.11896/J.ISSN.1002-137X.2017.03.037},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Ye0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/ZhangZZ17,
  author       = {Yinghui Zhang and
                  Jiangfan Zhao and
                  Dong Zheng},
  title        = {Efficient and Privacy-Aware Power Injection over {AMI} and Smart Grid
                  Slice in Future 5G Networks},
  journal      = {Mob. Inf. Syst.},
  volume       = {2017},
  pages        = {3680671:1--3680671:11},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/3680671},
  doi          = {10.1155/2017/3680671},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/ZhangZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/ZhangLZCL17,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Hui Li},
  title        = {Towards privacy protection and malicious behavior traceability in
                  smart health},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {21},
  number       = {5},
  pages        = {815--830},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00779-017-1047-8},
  doi          = {10.1007/S00779-017-1047-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/ZhangLZCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanYLZZL17,
  author       = {Gang Han and
                  Yu Yu and
                  Xiangxue Li and
                  Qifeng Zhou and
                  Dong Zheng and
                  Hui Li},
  title        = {1-Resilient Boolean Functions on Even Variables with Almost Perfect
                  Algebraic Immunity},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {6268230:1--6268230:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6268230},
  doi          = {10.1155/2017/6268230},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanYLZZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/QinZ0C17,
  author       = {Baodong Qin and
                  Qinglan Zhao and
                  Dong Zheng and
                  Hui Cui},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption
                  Key Exposure},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {504--514},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_25},
  doi          = {10.1007/978-3-030-02641-7\_25},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/QinZ0C17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/SuZZ17,
  author       = {Haonan Su and
                  Dong Zheng and
                  Yinghui Zhang},
  title        = {An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting
                  in Cloud Storage},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {833--836},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.166},
  doi          = {10.1109/CSE-EUC.2017.166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/SuZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/ZhangZ17a,
  author       = {Yinghui Zhang and
                  Dong Zheng},
  title        = {Anonymous Attribute-Based Encryption with Large Universe and Threshold
                  Access Structures},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 1},
  pages        = {870--874},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.175},
  doi          = {10.1109/CSE-EUC.2017.175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/ZhangZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiZZSYL17,
  author       = {Runhe Li and
                  Dong Zheng and
                  Yinghui Zhang and
                  Haonan Su and
                  Menglei Yang and
                  Pengzhen Lang},
  title        = {Attribute-Based Encryption with Multi-keyword Search},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {172--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.97},
  doi          = {10.1109/DSC.2017.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiZZSYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/GuoLZ17,
  author       = {Rui Guo and
                  Xiong Li and
                  Dong Zheng},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Privacy-Preserving Medical Information Systems Using Multi-authority
                  Content-Based Encryption in Cloud},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {268--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_22},
  doi          = {10.1007/978-3-319-68542-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/GuoLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/ZhangZZLR17,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Qinglan Zhao and
                  Chengzhe Lai and
                  Fang Ren},
  title        = {{PADA:} Privacy-Aware Data Aggregation with Efficient Communication
                  for Power Injection in 5G Smart Grid Slice},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2017, Kathmandu City, Nepal, October 16-19, 2017},
  pages        = {11--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NaNA.2017.26},
  doi          = {10.1109/NANA.2017.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nana/ZhangZZLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/LaiLZ17,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Achieving Secure and Seamless {IP} Communications for Group-Oriented
                  Software Defined Vehicular Networks},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {356--368},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_32},
  doi          = {10.1007/978-3-319-60033-8\_32},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/LaiLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LaiLZLS16,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng and
                  Hui Li and
                  Xuemin (Sherman) Shen},
  title        = {{GLARM:} Group-based lightweight authentication scheme for resource-constrained
                  machine to machine communications},
  journal      = {Comput. Networks},
  volume       = {99},
  pages        = {66--81},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.02.007},
  doi          = {10.1016/J.COMNET.2016.02.007},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LaiLZLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/ZhangZ0LL16,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li},
  title        = {Efficient attribute-based data sharing in mobile clouds},
  journal      = {Pervasive Mob. Comput.},
  volume       = {28},
  pages        = {135--149},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2015.06.009},
  doi          = {10.1016/J.PMCJ.2015.06.009},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/ZhangZ0LL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZLLL16,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Qi Li and
                  Jin Li and
                  Hui Li},
  title        = {Online/offline unbounded multi-authority attribute-based encryption
                  for data sharing in mobile cloud computing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3688--3702},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1574},
  doi          = {10.1002/SEC.1574},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaiLZ16,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng},
  title        = {{SPGS:} a secure and privacy-preserving group setup framework for
                  platoon-based vehicular cyber-physical systems},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3854--3867},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1523},
  doi          = {10.1002/SEC.1523},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaiLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LaiLLZS16,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Hui Li and
                  Dong Zheng and
                  Xuemin (Sherman) Shen},
  title        = {Secure machine-type communications in {LTE} networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {16},
  number       = {12},
  pages        = {1495--1509},
  year         = {2016},
  url          = {https://doi.org/10.1002/wcm.2612},
  doi          = {10.1002/WCM.2612},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/LaiLLZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLZ0016,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Hui Li},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Accountable Large-Universe Attribute-Based Encryption Supporting Any
                  Monotone Access Structures},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {509--524},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_31},
  doi          = {10.1007/978-3-319-40253-6\_31},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLZ0016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/LiuZZ16,
  author       = {Hang Liu and
                  Dong Zheng and
                  Qinglan Zhao},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Kangbin Yim},
  title        = {Construction of Boolean Functions with Optimal Algebraic Immunity},
  booktitle    = {Advances on Broad-Band Wireless Computing, Communication and Applications,
                  Proceedings of the 11th International Conference On Broad-Band Wireless
                  Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
                  University, Asan, Korea, November 5-7, 2016},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {2},
  pages        = {791--798},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49106-6\_80},
  doi          = {10.1007/978-3-319-49106-6\_80},
  timestamp    = {Fri, 17 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/LiuZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZhangZ16,
  author       = {Yinghui Zhang and
                  Dong Zheng},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Kangbin Yim},
  title        = {Efficient and Expressive Anonymous Attribute-Based Encryption for
                  Mobile Cloud Computing},
  booktitle    = {Advances on Broad-Band Wireless Computing, Communication and Applications,
                  Proceedings of the 11th International Conference On Broad-Band Wireless
                  Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
                  University, Asan, Korea, November 5-7, 2016},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {2},
  pages        = {807--814},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49106-6\_82},
  doi          = {10.1007/978-3-319-49106-6\_82},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/ZhangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/LaiLZ0S15,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng and
                  Hui Li and
                  Xuemin (Sherman) Shen},
  title        = {Toward secure large-scale machine-to-machine comm unications in 3GPP
                  networks: chall enges and solutions},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {12},
  pages        = {12--19},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7355579},
  doi          = {10.1109/MCOM.2015.7355579},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/LaiLZ0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Ren015,
  author       = {Fang Ren and
                  Dong Zheng},
  title        = {{\unicode{28145}}{\unicode{31354}}{\unicode{32593}}{\unicode{32476}}{\unicode{30340}}{\unicode{39640}}{\unicode{25928}}{\unicode{23433}}{\unicode{20840}}{\unicode{36890}}{\unicode{20449}}{\unicode{26426}}{\unicode{21046}}
                  (Efficient and Secure Communication Scheme for Deep Space Networks)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {12},
  pages        = {229--232},
  year         = {2015},
  url          = {http://www.jsjkx.com/CN/Y2015/V42/I12/229},
  doi          = {Y2015/V42/I12/229},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Ren015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/LaiLZ15,
  author       = {Chengzhe Lai and
                  Rongxing Lu and
                  Dong Zheng},
  editor       = {Kuai Xu and
                  Haojin Zhu},
  title        = {{SGSA:} Secure Group Setup and Anonymous Authentication in Platoon-Based
                  Vehicular Cyber-Physical Systems},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 10th International
                  Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9204},
  pages        = {274--283},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21837-3\_27},
  doi          = {10.1007/978-3-319-21837-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/LaiLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiZQZC14,
  author       = {Xiangxue Li and
                  Qingji Zheng and
                  Haifeng Qian and
                  Dong Zheng and
                  Kefei Chen},
  title        = {{PWG:} Progressive Weight-Growth Algorithm for {LDPC} Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {2},
  pages        = {685--689},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.685},
  doi          = {10.1587/TRANSFUN.E97.A.685},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiZQZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/WangH0L14,
  author       = {Jiantao Wang and
                  Zheng Huang and
                  Dong Zheng and
                  Qiang Li},
  title        = {An application of newton formula on the computation of finite field
                  trace},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2014, Hailar, Hulun Buir, China, July 28-30, 2014},
  pages        = {137--140},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICInfA.2014.6932641},
  doi          = {10.1109/ICINFA.2014.6932641},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinfa/WangH0L14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangZCLL14,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Computationally Efficient Ciphertext-Policy Attribute-Based Encryption
                  with Constant-Size Ciphertexts},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_18},
  doi          = {10.1007/978-3-319-12475-9\_18},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangZCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZC12,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Optimal Multiple Assignments with (m, m)-Scheme for General Access
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/007},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZHC12,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Dong Zheng and
                  Zheng Huang and
                  Kefei Chen},
  title        = {On the Equivalence between the Set Covering Problem and the Problem
                  of Finding Optimal Cumulative Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/245},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuGQZ11,
  author       = {Bozhong Liu and
                  Zheng Gong and
                  Weidong Qiu and
                  Dong Zheng},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {247--256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_19},
  doi          = {10.1007/978-3-642-21031-0\_19},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuGQZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/HuangLZCL11,
  author       = {Zheng Huang and
                  Qiang Li and
                  Dong Zheng and
                  Kefei Chen and
                  Xiangxue Li},
  editor       = {Jerry Zeyu Gao and
                  Xiaodong Lu and
                  Muhammad Younas and
                  Hong Zhu},
  title        = {{YI} Cloud: Improving user privacy with secret key recovery in cloud
                  storage},
  booktitle    = {{IEEE} 6th International Symposium on Service Oriented System Engineering,
                  {SOSE} 2011, Irvine, CA, USA, December 12-14, 2011},
  pages        = {268--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SOSE.2011.6139116},
  doi          = {10.1109/SOSE.2011.6139116},
  timestamp    = {Wed, 21 Jun 2023 16:54:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sose/HuangLZCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/LiQZCL10,
  author       = {Xiangxue Li and
                  Weidong Qiu and
                  Dong Zheng and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Anonymity Enhancement on Robust and Efficient Password-Authenticated
                  Key Agreement Using Smart Cards},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {57},
  number       = {2},
  pages        = {793--800},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIE.2009.2028351},
  doi          = {10.1109/TIE.2009.2028351},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/LiQZCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ZhengLZG10,
  author       = {Qingji Zheng and
                  Xiangxue Li and
                  Dong Zheng and
                  Baoan Guo},
  editor       = {Isao Echizen and
                  Jeng{-}Shyang Pan and
                  Dieter W. Fellner and
                  Alexander Nouak and
                  Arjan Kuijper and
                  Lakhmi C. Jain},
  title        = {Regular Quasi-cyclic {LDPC} Codes with Girth 6 from Prime Fields},
  booktitle    = {Sixth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
                  15-17 October, 2010, Proceedings},
  pages        = {470--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IIHMSP.2010.120},
  doi          = {10.1109/IIHMSP.2010.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ZhengLZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiZCL09,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Democratic group signatures with collective traceability},
  journal      = {Comput. Electr. Eng.},
  volume       = {35},
  number       = {5},
  pages        = {664--672},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.01.005},
  doi          = {10.1016/J.COMPELECENG.2009.01.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LiZCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiZQZL09,
  author       = {Xiangxue Li and
                  Qingji Zheng and
                  Haifeng Qian and
                  Dong Zheng and
                  Jianhua Li},
  title        = {Toward optimizing cauchy matrix for cauchy reed-solomon code},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {13},
  number       = {8},
  pages        = {603--605},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCOMM.2009.090988},
  doi          = {10.1109/LCOMM.2009.090988},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiZQZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HanCZ09,
  author       = {Wei Han and
                  Kefei Chen and
                  Dong Zheng},
  title        = {Receipt-Freeness for Groth e-Voting Schemes},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {25},
  number       = {2},
  pages        = {517--530},
  year         = {2009},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200903\_11.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/HanCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZhouLZCL09,
  author       = {Zhiheng Zhou and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Extended {PEG} Algorithm for High Rate {LDPC} Codes},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
                  2009},
  pages        = {494--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISPA.2009.80},
  doi          = {10.1109/ISPA.2009.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/ZhouLZCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/GuoLZLL09,
  author       = {Chaonian Guo and
                  Xiangxue Li and
                  Dong Zheng and
                  Shengli Liu and
                  Jianhua Li},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Chen Rui and
                  Jong Hyung Lee and
                  Jian Wang and
                  Gang Kou},
  title        = {{AE-BP:} Adaptive Erasure Belief Propagation Decoding Algorithm of
                  {LDPC} Codes},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2009, Fifth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2009: International Conference on Networked
                  Computing, {IMS} 2009: International Conference on Advanced Information
                  Management and Service, {IDC} 2009: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 25-27, 2009},
  pages        = {479--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCM.2009.15},
  doi          = {10.1109/NCM.2009.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/GuoLZLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/GongLZC08,
  author       = {Zheng Gong and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {A Generic Construction for Instrusion-Resilient Signatures from Linear
                  Feedback Shift Register},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {5},
  pages        = {1347--1360},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/GongLZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WengLCZQ08,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Dong Zheng and
                  Weidong Qiu},
  editor       = {Tal Malkin},
  title        = {Identity-Based Threshold Key-Insulated Encryption without Random Oracles},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_13},
  doi          = {10.1007/978-3-540-79263-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WengLCZQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HanHZCC08,
  author       = {Wei Han and
                  Tao Hao and
                  Dong Zheng and
                  Kefei Chen and
                  Xiaofeng Chen},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {A Tamper-Evident Voting Machine Resistant to Covert Channels},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_24},
  doi          = {10.1007/978-3-540-88733-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HanHZCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengLMCL08,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Changshe Ma and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Democratic Group Signatures with Threshold Traceability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {LFSR-based Signatures with Message Recovery},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {266--270},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p266-270.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhengLC07,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Kefei Chen},
  title        = {Code-based Ring Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {154--157},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p154-157.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhengLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  editor       = {Yuhua Luo},
  title        = {Efficient Blind Signatures from Linear Feedback Shift Register},
  booktitle    = {Cooperative Design, Visualization, and Engineering, 4th International
                  Conference, {CDVE} 2007, Shanghai, China, September 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4674},
  pages        = {423--425},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74780-2\_57},
  doi          = {10.1007/978-3-540-74780-2\_57},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhengLCL07,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Kefei Chen and
                  Jianhua Li},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {Linkable Ring Signatures from Linear Feedback Shift Register},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {716--727},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_66},
  doi          = {10.1007/978-3-540-77090-9\_66},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ZhengLCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  editor       = {Hai Jin and
                  Omer F. Rana and
                  Yi Pan and
                  Viktor K. Prasanna},
  title        = {Efficient Linkable Ring Signatures and Threshold Signatures from Linear
                  Feedback Shift Register},
  booktitle    = {Algorithms and Architectures for Parallel Processing, 7th International
                  Conference, {ICA3PP} 2007, Hangzhou, China, June 11-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4494},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72905-1\_9},
  doi          = {10.1007/978-3-540-72905-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/WeiZC07,
  author       = {Han Wei and
                  Dong Zheng and
                  Kefei Chen},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Richard Chbeir and
                  Albert Dipanda},
  title        = {A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme},
  booktitle    = {Third International {IEEE} Conference on Signal-Image Technologies
                  and Internet-Based System, {SITIS} 2007, Shanghai, China, December
                  16-18, 2007},
  pages        = {355--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SITIS.2007.15},
  doi          = {10.1109/SITIS.2007.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/WeiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaWZ07,
  author       = {Changshe Ma and
                  Jian Weng and
                  Dong Zheng},
  title        = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/019},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanZC07,
  author       = {Wei Han and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Filling the Gap between Voters and Cryptography in e-Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanZC06,
  author       = {Wei Han and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Some Remarks on the {TKIP} Key Mixing Function of {IEEE} 802.11i},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanZC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciarp/LiuZZC05,
  author       = {Yongguo Liu and
                  Wei Zhang and
                  Dong Zheng and
                  Kefei Chen},
  editor       = {Alberto Sanfeliu and
                  Manuel Lazo{-}Cort{\'{e}}s},
  title        = {A Novel Clustering Technique Based on Improved Noising Method},
  booktitle    = {Progress in Pattern Recognition, Image Analysis and Applications,
                  10th Iberoamerican Congress on Pattern Recognition, {CIARP} 2005,
                  Havana, Cuba, November 15-18, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3773},
  pages        = {81--92},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11578079\_9},
  doi          = {10.1007/11578079\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ciarp/LiuZZC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dis/LiuZLWC05,
  author       = {Yongguo Liu and
                  Dong Zheng and
                  Shiqun Li and
                  Libin Wang and
                  Kefei Chen},
  editor       = {Achim G. Hoffmann and
                  Hiroshi Motoda and
                  Tobias Scheffer},
  title        = {A Tabu Clustering Method with {DHB} Operation and Mergence and Partition
                  Operation},
  booktitle    = {Discovery Science, 8th International Conference, {DS} 2005, Singapore,
                  October 8-11, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3735},
  pages        = {380--382},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11563983\_36},
  doi          = {10.1007/11563983\_36},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dis/LiuZLWC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhangWDC05,
  author       = {Longjun Zhang and
                  Han Wei and
                  Dong Zheng and
                  Kefei Chen},
  title        = {A Security Solution of {WLAN} Based on Public Key Cryptosystem},
  booktitle    = {11th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages        = {422--427},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPADS.2005.46},
  doi          = {10.1109/ICPADS.2005.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ZhangWDC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MaCZL05,
  author       = {Changshe Ma and
                  Kefei Chen and
                  Dong Zheng and
                  Shengli Liu},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Efficient and Proactive Threshold Signcryption},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {233--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_17},
  doi          = {10.1007/11556992\_17},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MaCZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/MaCLZ05,
  author       = {Changshe Ma and
                  Kefei Chen and
                  Shengli Liu and
                  Dong Zheng},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Luis Javier Garc{\'{\i}}a Castro},
  title        = {Transitive Signatures Based on Bilinear Maps},
  booktitle    = {Security in Information Systems, Proceedings of the 3rd International
                  Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction
                  with ICEIS2005, Miami, USA, May 2005},
  pages        = {48--56},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/MaCLZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/DongZCK04,
  author       = {Dong Zheng and
                  Huang Zheng and
                  Kefei Chen and
                  Weidong Kou},
  title        = {ID-Based Proxy Blind Signature},
  booktitle    = {18th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages        = {380--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/AINA.2004.1283827},
  doi          = {10.1109/AINA.2004.1283827},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/DongZCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWZC04,
  author       = {Lizhen Yang and
                  Xiaoyun Wang and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Yet another attack on a password authentication scheme based on quadratic
                  residues with parameters unknown 1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWZC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/DongCY02,
  author       = {Dong Zheng and
                  Kefei Chen and
                  Jinyuan You},
  title        = {Multiparty Authentication Services and Key Agreement Protocols with
                  Semi-Trusted Third Party},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {17},
  number       = {6},
  pages        = {749--756},
  year         = {2002},
  url          = {https://doi.org/10.1007/BF02960765},
  doi          = {10.1007/BF02960765},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/DongCY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics