Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yan Zhu 0010
@article{DBLP:journals/iotj/LuZCFZM24, author = {Hai Lu and Yan Zhu and Cecilia E. Chen and Rongquan Feng and Lejun Zhang and Di Ma}, title = {Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {1893--1909}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3328719}, doi = {10.1109/JIOT.2023.3328719}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LuZCFZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GuoZCZFM24, author = {Guanglai Guo and Yan Zhu and Cecilia E. Chen and Lejun Zhang and Rongquan Feng and Di Ma}, title = {Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {7}, pages = {11353--11367}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3329660}, doi = {10.1109/JIOT.2023.3329660}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GuoZCZFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/GuoZCY24, author = {Guanglai Guo and Yan Zhu and E. Chen and Stephen S. Yau}, title = {Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {17}, number = {1}, pages = {1--17}, year = {2024}, url = {https://doi.org/10.1109/TSC.2023.3331520}, doi = {10.1109/TSC.2023.3331520}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/GuoZCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ChenZLY23, author = {E. Chen and Yan Zhu and Kaitai Liang and Hongjian Yin}, title = {Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {579--594}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3104323}, doi = {10.1109/TCC.2021.3104323}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ChenZLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/GuoZCYZLF23, author = {Guanglai Guo and Yan Zhu and E. Chen and Ruyun Yu and Lejun Zhang and Kewei Lv and Rongquan Feng}, title = {Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining}, journal = {{IEEE} Trans. Reliab.}, volume = {72}, number = {4}, pages = {1308--1323}, year = {2023}, url = {https://doi.org/10.1109/TR.2023.3246563}, doi = {10.1109/TR.2023.3246563}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/GuoZCYZLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChenWFZY23, author = {E. Chen and Shengdian Wang and Yuqing Fan and Yan Zhu and Stephen S. Yau}, title = {SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {5}, pages = {3665--3681}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3267489}, doi = {10.1109/TSC.2023.3267489}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ChenWFZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZhouXR0C23, author = {Chengxin Zhou and Xianbin Xue and Khaled Riad and Yan Zhu and William Cheng{-}Chung Chu}, title = {Remotely Controllable Data Self-Destruction for Privacy-Preserving Sensitive Data Services}, booktitle = {{IEEE} International Conference on High Performance Computing {\&} Communications, Data Science {\&} Systems, Smart City {\&} Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2023, Melbourne, Australia, December 17-21, 2023}, pages = {860--867}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00125}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS60770.2023.00125}, timestamp = {Wed, 10 Apr 2024 17:07:58 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZhouXR0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenZZLWC22, author = {E. Chen and Yan Zhu and Zhiyuan Zhou and Shou{-}Yu Lee and W. Eric Wong and William Cheng{-}Chung Chu}, title = {Policychain: {A} Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {7}, pages = {5391--5409}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3109147}, doi = {10.1109/JIOT.2021.3109147}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChenZZLWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YinCZZFY22, author = {Hongjian Yin and E. Chen and Yan Zhu and Chengwei Zhao and Rongquan Feng and Stephen S. Yau}, title = {Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {13}, pages = {10625--10639}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3124016}, doi = {10.1109/JIOT.2021.3124016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YinCZZFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/LuYZHLC22, author = {Hai Lu and Ruyun Yu and Yan Zhu and Xiao He and Kaitai Liang and William Cheng{-}Chung Chu}, title = {Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership}, journal = {J. Syst. Softw.}, volume = {188}, pages = {111271}, year = {2022}, url = {https://doi.org/10.1016/j.jss.2022.111271}, doi = {10.1016/J.JSS.2022.111271}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/LuYZHLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/GuoZCZMC22, author = {Guanglai Guo and Yan Zhu and E. Chen and Guizhen Zhu and Di Ma and William Cheng{-}Chung Chu}, title = {Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols}, journal = {Peer-to-Peer Netw. Appl.}, volume = {15}, number = {1}, pages = {304--323}, year = {2022}, url = {https://doi.org/10.1007/s12083-021-01243-x}, doi = {10.1007/S12083-021-01243-X}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/GuoZCZMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChenQZSWCY22, author = {E. Chen and Bohan Qin and Yan Zhu and Weijing Song and Shengdian Wang and William Cheng{-}Chung Chu and Stephen S. Yau}, title = {SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-Based Auction Services}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {5}, pages = {3061--3076}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3077291}, doi = {10.1109/TSC.2021.3077291}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ChenQZSWCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZZLF21, author = {E. Chen and Yan Zhu and Guizhen Zhu and Kaitai Liang and Rongquan Feng}, title = {How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors}, journal = {Comput. Secur.}, volume = {107}, pages = {102318}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102318}, doi = {10.1016/J.COSE.2021.102318}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenZZLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/0010GYLY21, author = {Yan Zhu and Qian Guo and Hongjian Yin and Kaitai Liang and Stephen S. Yau}, title = {Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts}, journal = {Computer}, volume = {54}, number = {12}, pages = {72--80}, year = {2021}, url = {https://doi.org/10.1109/MC.2021.3091379}, doi = {10.1109/MC.2021.3091379}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/0010GYLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/0010SWMC21, author = {Yan Zhu and Weijing Song and Di Wang and Di Ma and William Cheng{-}Chung Chu}, title = {{TA-SPESC:} Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain}, journal = {{IEEE} Trans. Reliab.}, volume = {70}, number = {3}, pages = {1255--1270}, year = {2021}, url = {https://doi.org/10.1109/TR.2021.3054617}, doi = {10.1109/TR.2021.3054617}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/0010SWMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/ChenQZSWCY21, author = {E. Chen and Bohan Qin and Yan Zhu and Weijing Song and Shengdian Wang and William Cheng{-}Chung Chu and Stephen S. Yau}, editor = {Nimanthi L. Atukorala and Carl K. Chang and Rong N. Chang and Ernesto Damiani and Ian T. Foster and Zhongjie Wang and Jia Zhang}, title = {SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-based Auction Services}, booktitle = {{IEEE} World Congress on Services, {SERVICES} 2021, Chicago, IL, USA, September 5-10, 2021}, pages = {3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERVICES51467.2021.00014}, doi = {10.1109/SERVICES51467.2021.00014}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/services/ChenQZSWCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GanCZZ20, author = {Guohua Gan and E. Chen and Zhiyuan Zhou and Yan Zhu}, title = {Token-Based Access Control}, journal = {{IEEE} Access}, volume = {8}, pages = {54189--54199}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2979746}, doi = {10.1109/ACCESS.2020.2979746}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GanCZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoZYCM20, author = {Guanglai Guo and Yan Zhu and Ruyun Yu and William Cheng{-}Chung Chu and Di Ma}, title = {A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {157116--157129}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3016041}, doi = {10.1109/ACCESS.2020.3016041}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoZYCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZZL20a, author = {Di Wang and Yan Zhu and Yi Zhang and Guowei Liu}, title = {Security Assessment of Blockchain in Chinese Classified Protection of Cybersecurity}, journal = {{IEEE} Access}, volume = {8}, pages = {203440--203456}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3036004}, doi = {10.1109/ACCESS.2020.3036004}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZZL20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ChenZLL20, author = {Enhong Chen and Yan Zhu and Changlu Lin and Kewei Lv}, title = {Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {4}, pages = {144806}, year = {2020}, url = {https://doi.org/10.1007/s11704-019-8320-0}, doi = {10.1007/S11704-019-8320-0}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ChenZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhuRGGF19, author = {Yan Zhu and Khaled Riad and Ruiqi Guo and Guohua Gan and Rongquan Feng}, title = {New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain}, journal = {Frontiers Comput. Sci.}, volume = {13}, number = {6}, pages = {1182--1197}, year = {2019}, url = {https://doi.org/10.1007/s11704-017-6338-8}, doi = {10.1007/S11704-017-6338-8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhuRGGF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ZhuYMC19, author = {Yan Zhu and Ruyun Yu and Di Ma and William Cheng{-}Chung Chu}, title = {Cryptographic Attribute-Based Access Control {(ABAC)} for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens}, journal = {{IEEE} Trans. Reliab.}, volume = {68}, number = {4}, pages = {1330--1346}, year = {2019}, url = {https://doi.org/10.1109/TR.2019.2948713}, doi = {10.1109/TR.2019.2948713}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/ZhuYMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/0010YCF19, author = {Yan Zhu and Shuai Yang and William Cheng{-}Chung Chu and Rongquan Feng}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table}, booktitle = {2019 {IEEE} International Conference on Services Computing, {SCC} 2019, Milan, Italy, July 8-13, 2019}, pages = {90--99}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SCC.2019.00026}, doi = {10.1109/SCC.2019.00026}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEscc/0010YCF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/0010ZWSCL19, author = {Yan Zhu and Yi Zhang and Jing Wang and Weijing Song and William Cheng{-}Chung Chu and Guowei Liu}, editor = {Vladimir Getov and Jean{-}Luc Gaudiot and Nariyoshi Yamai and Stelvio Cimato and J. Morris Chang and Yuuichi Teranishi and Ji{-}Jiang Yang and Hong Va Leong and Hossain Shahriar and Michiharu Takemoto and Dave Towey and Hiroki Takakura and Atilla El{\c{c}}i and Susumu Takeuchi and Satish Puri}, title = {From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era}, booktitle = {43rd {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2}, pages = {103--109}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COMPSAC.2019.10191}, doi = {10.1109/COMPSAC.2019.10191}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/0010ZWSCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/JiangLZ19, author = {Yihan Jiang and Yong Li and Yan Zhu}, editor = {Yulin Wang and Chin{-}Chen Chang}, title = {Auditable zerocoin scheme with user awareness}, booktitle = {Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21, 2019}, pages = {28--32}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309074.3309094}, doi = {10.1145/3309074.3309094}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/JiangLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangFZ18, author = {Qianwen Wang and Rongquan Feng and Yan Zhu}, title = {Verifiable random functions with Boolean function constraints}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {039105:1--039105:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9228-6}, doi = {10.1007/S11432-017-9228-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WangFZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/0010YCH18, author = {Yan Zhu and Ruyun Yu and E. Chen and Dijiang Huang}, title = {Dual-mode broadcast encryption}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {11}, pages = {118101:1--118101:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9287-6}, doi = {10.1007/S11432-017-9287-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/0010YCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/0010GGH18, author = {Yan Zhu and Guohua Gan and Ruiqi Guo and Dijiang Huang}, title = {{PHE:} An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {4}, pages = {1110--1124}, year = {2018}, url = {https://doi.org/10.1109/TCC.2016.2573299}, doi = {10.1109/TCC.2016.2573299}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/0010GGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiHWZ18, author = {Bing Li and Dijiang Huang and Zhijie Wang and Yan Zhu}, title = {Attribute-based Access Control for {ICN} Naming Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {194--206}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2550437}, doi = {10.1109/TDSC.2016.2550437}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiHWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/ZhaoLZGCZD18, author = {Hongke Zhao and Qi Liu and Hengshu Zhu and Yong Ge and Enhong Chen and Yan Zhu and Junping Du}, title = {A Sequential Approach to Market State Modeling and Analysis in Online {P2P} Lending}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {48}, number = {1}, pages = {21--33}, year = {2018}, url = {https://doi.org/10.1109/TSMC.2017.2665038}, doi = {10.1109/TSMC.2017.2665038}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/ZhaoLZGCZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/0010QZSLC18, author = {Yan Zhu and Yao Qin and Zhiyuan Zhou and Xiaoxu Song and Guowei Liu and William Cheng{-}Chung Chu}, title = {Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control}, booktitle = {2018 {IEEE} International Conference on Services Computing, {SCC} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {193--200}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SCC.2018.00032}, doi = {10.1109/SCC.2018.00032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/0010QZSLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HeQZCL18, author = {Xiao He and Bohan Qin and Yan Zhu and Xing Chen and Yi Liu}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {{SPESC:} {A} Specification Language for Smart Contracts}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 1}, pages = {132--137}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.00025}, doi = {10.1109/COMPSAC.2018.00025}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/HeQZCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/0010QGSC18, author = {Yan Zhu and Yao Qin and Guohua Gan and Yang Shuai and William Cheng{-}Chung Chu}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {{TBAC:} Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 1}, pages = {535--544}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.00083}, doi = {10.1109/COMPSAC.2018.00083}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/0010QGSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/0010YGH18, author = {Yan Zhu and Shuai Yang and Guohua Gan and Xiao He}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 1}, pages = {914--919}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.00157}, doi = {10.1109/COMPSAC.2018.00157}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/0010YGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/0010SYQZ18, author = {Yan Zhu and Xiaoxu Song and Shuai Yang and Yao Qin and Qiong Zhou}, title = {Secure Smart Contract System Built on {SMPC} Over Blockchain}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {1539--1544}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00259}, doi = {10.1109/CYBERMATICS\_2018.2018.00259}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ithings/0010SYQZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/0010YQMC18, author = {Yan Zhu and Ruyun Yu and Yao Qin and Di Ma and William Cheng{-}Chung Chu}, title = {Provably Secure Cryptographic {ABAC} System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy}, booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2018, Lisbon, Portugal, July 16-20, 2018}, pages = {277--288}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/QRS.2018.00041}, doi = {10.1109/QRS.2018.00041}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/0010YQMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/RiadZ17, author = {Khaled Riad and Yan Zhu}, title = {Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {26}, number = {4}, pages = {1750003:1--1750003:33}, year = {2017}, url = {https://doi.org/10.1142/S0218843017500034}, doi = {10.1142/S0218843017500034}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/RiadZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/0001GR17, author = {Yan Zhu and Guhua Gan and Khaled Riad}, title = {{BC-PDS:} Protecting Privacy and Self-Sovereignty through BlockChains for OpenPDS}, booktitle = {2017 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2017, San Francisco, CA, USA, April 6-9, 2017}, pages = {138--144}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SOSE.2017.30}, doi = {10.1109/SOSE.2017.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/0001GR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ZhuGGT16, author = {Yan Zhu and Ruiqi Guo and Guohua Gan and Wei{-}Tek Tsai}, title = {Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {443--448}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.142}, doi = {10.1109/COMPSAC.2016.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ZhuGGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/ZhuZLCLZ16, author = {Yan Zhu and Hengshu Zhu and Qi Liu and Enhong Chen and Hong Li and Hongke Zhao}, editor = {Shamkant B. Navathe and Weili Wu and Shashi Shekhar and Xiaoyong Du and X. Sean Wang and Hui Xiong}, title = {Exploring the Procrastination of College Students: {A} Data-Driven Behavioral Perspective}, booktitle = {Database Systems for Advanced Applications - 21st International Conference, {DASFAA} 2016, Dallas, TX, USA, April 16-19, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9642}, pages = {258--273}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32025-0\_17}, doi = {10.1007/978-3-319-32025-0\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasfaa/ZhuZLCLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/TsaiBZY16, author = {Wei{-}Tek Tsai and Robert Blower and Yan Zhu and Lian Yu}, title = {A System View of Financial Blockchains}, booktitle = {2016 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2016, Oxford, United Kingdom, March 29 - April 2, 2016}, pages = {450--457}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SOSE.2016.66}, doi = {10.1109/SOSE.2016.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/TsaiBZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/WuHZ15, author = {Huijun Wu and Dijiang Huang and Yan Zhu}, title = {Establishing {A} Personal On-Demand Execution Environment for Mobile Cloud Applications}, journal = {Mob. Networks Appl.}, volume = {20}, number = {3}, pages = {297--307}, year = {2015}, url = {https://doi.org/10.1007/s11036-015-0617-0}, doi = {10.1007/S11036-015-0617-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/WuHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/WangHZLC15, author = {Zhijie Wang and Dijiang Huang and Yan Zhu and Bing Li and Chun{-}Jen Chung}, title = {Efficient Attribute-Based Comparable Data Access Control}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {12}, pages = {3430--3443}, year = {2015}, url = {https://doi.org/10.1109/TC.2015.2401033}, doi = {10.1109/TC.2015.2401033}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/WangHZLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShresthaM0LS15, author = {Babins Shrestha and Di Ma and Yan Zhu and Haoyu Li and Nitesh Saxena}, title = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2270--2283}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2436364}, doi = {10.1109/TIFS.2015.2436364}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/0001HHW15, author = {Yan Zhu and Dijiang Huang and Chang{-}Jyun Hu and Xin Wang}, title = {From {RBAC} to {ABAC:} Constructing Flexible Data Access Control for Cloud Storage Services}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {8}, number = {4}, pages = {601--616}, year = {2015}, url = {https://doi.org/10.1109/TSC.2014.2363474}, doi = {10.1109/TSC.2014.2363474}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/0001HHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuWMG15, author = {Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {191--202}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714602}, doi = {10.1145/2714576.2714602}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuWMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LinLWZ15, author = {Changlu Lin and Fucai Luo and Huaxiong Wang and Yan Zhu}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {A Provable Data Possession Scheme with Data Hierarchy in Cloud}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {301--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_18}, doi = {10.1007/978-3-319-38898-4\_18}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LinLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/Riad0HA15, author = {Khaled Riad and Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn}, title = {{AR-ABAC:} {A} New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing}, booktitle = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015, Hangzhou, China, October 27-30, 2015}, pages = {28--35}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIC.2015.38}, doi = {10.1109/CIC.2015.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/Riad0HA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ZhuPGGZ15, author = {Yan Zhu and Feng Pu and Guohua Gan and Ruiqi Guo and Shuqing Zhang}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Traitor Tracing and Revocation for Secure Decoders in File Syncing-and-Sharing Service}, booktitle = {39th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2}, pages = {504--509}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.62}, doi = {10.1109/COMPSAC.2015.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ZhuPGGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobserv/ZhuYM15, author = {Yan Zhu and Liguang Yang and Di Ma}, editor = {Onur Altintas and Jia Zhang}, title = {Secure Snaps: {A} New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services}, booktitle = {2015 {IEEE} International Conference on Mobile Services, {MS} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MobServ.2015.29}, doi = {10.1109/MOBSERV.2015.29}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobserv/ZhuYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuWMG15, author = {Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo}, title = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2015}, url = {http://eprint.iacr.org/2015/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuWMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Wang0MF14, author = {Shan{-}Biao Wang and Yan Zhu and Di Ma and Rong{-}Quan Feng}, title = {Lattice-based key exchange on small integer solution problem}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {11}, pages = {1--12}, year = {2014}, url = {https://doi.org/10.1007/s11432-014-5147-z}, doi = {10.1007/S11432-014-5147-Z}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/Wang0MF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/0001MHAH14, author = {Yan Zhu and Di Ma and Changjun Hu and Gail{-}Joon Ahn and Hongxin Hu}, title = {Secure and efficient random functions with variable-length output}, journal = {J. Netw. Comput. Appl.}, volume = {45}, pages = {121--133}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.07.033}, doi = {10.1016/J.JNCA.2014.07.033}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/0001MHAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiVHWZ14, author = {Bing Li and Ashwin Prabhu Verleker and Dijiang Huang and Zhijie Wang and Yan Zhu}, title = {Attribute-based access control for {ICN} naming scheme}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {391--399}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997508}, doi = {10.1109/CNS.2014.6997508}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiVHWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhuLY14, author = {Yan Zhu and Dandan Li and Liguang Yang}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Traitor Tracing Based on Partially-Ordered Hierarchical Encryption}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {278--293}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_18}, doi = {10.1007/978-3-319-27998-5\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/ZhuLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaSXZ13, author = {Di Ma and Nitesh Saxena and Tuo Xiang and Yan Zhu}, title = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy via Location Sensing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {57--69}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.89}, doi = {10.1109/TDSC.2012.89}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuAHMW13, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Di Ma and Shan{-}Biao Wang}, title = {Role-Based Cryptosystem: {A} New Cryptographic {RBAC} System Based on Role-Key Hierarchy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {2138--2153}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2287858}, doi = {10.1109/TIFS.2013.2287858}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuAHMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhuAHYAH13, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau and Ho G. An and Changjun Hu}, title = {Dynamic Audit Services for Outsourced Storages in Clouds}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {6}, number = {2}, pages = {227--238}, year = {2013}, url = {https://doi.org/10.1109/TSC.2011.51}, doi = {10.1109/TSC.2011.51}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/ZhuAHYAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/ZhuHML13, author = {Yan Zhu and Changjun Hu and Di Ma and Jin Li}, editor = {Fatos Xhafa and Leonard Barolli and Dritan Nace and Salvatore Venticinque and Alain Bui}, title = {Cryptographic Spatio-temporal Predicates for Location-Based Services}, booktitle = {Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30, 2013}, pages = {84--91}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/3PGCIC.2013.19}, doi = {10.1109/3PGCIC.2013.19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/ZhuHML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001MHH13, author = {Yan Zhu and Di Ma and Changjun Hu and Dijiang Huang}, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {How to use attribute-based encryption to implement role-based access control in the cloud}, booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, pages = {33--40}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484402.2484411}, doi = {10.1145/2484402.2484411}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001MHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaZY13, author = {Di Ma and Yan Zhu and Mengyang Yu}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {End-to-end aggregate authentication of time-series data}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {51--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484400}, doi = {10.1145/2484389.2484400}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ZhuMHH13, author = {Yan Zhu and Di Ma and Dijiang Huang and Changjun Hu}, editor = {Mario Gerla and Dijiang Huang}, title = {Enabling secure location-based services in mobile cloud computing}, booktitle = {Proceedings of the second {ACM} {SIGCOMM} workshop on Mobile cloud computing, MCC@SIGCOMM 2013, Hong Kong, China, August 16, 2013}, pages = {27--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2491266.2491272}, doi = {10.1145/2491266.2491272}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ZhuMHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhuMWF13, author = {Yan Zhu and Di Ma and Shan{-}Biao Wang and Rong{-}Quan Feng}, editor = {Kui Ren and Xue Liu and Weifa Liang and Ming Xu and Xiaohua Jia and Kai Xing}, title = {Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices}, booktitle = {Wireless Algorithms, Systems, and Applications - 8th International Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7992}, pages = {42--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39701-1\_4}, doi = {10.1007/978-3-642-39701-1\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/ZhuMWF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiMSSZ13, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {25--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462101}, doi = {10.1145/2462096.2462101}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4010, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, title = {Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures}, journal = {CoRR}, volume = {abs/1302.4010}, year = {2013}, url = {http://arxiv.org/abs/1302.4010}, eprinttype = {arXiv}, eprint = {1302.4010}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhuYHAZ12, author = {Yan Zhu and Mengyang Yu and Hongxin Hu and Gail{-}Joon Ahn and Hong{-}Jia Zhao}, title = {Efficient construction of provably secure steganography under ordinary covert channels}, journal = {Sci. China Inf. Sci.}, volume = {55}, number = {7}, pages = {1639--1649}, year = {2012}, url = {https://doi.org/10.1007/s11432-012-4598-3}, doi = {10.1007/S11432-012-4598-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhuYHAZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/ZhuWHAM12, author = {Yan Zhu and Shan{-}Biao Wang and Hongxin Hu and Gail{-}Joon Ahn and Di Ma}, title = {Secure Collaborative Integrity Verification for Hybrid Cloud Environments}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {21}, number = {3}, pages = {165--198}, year = {2012}, url = {https://doi.org/10.1142/S0218843012410018}, doi = {10.1142/S0218843012410018}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/ZhuWHAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhuHAY12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Stephen S. Yau}, title = {Efficient audit service outsourcing for data integrity in clouds}, journal = {J. Syst. Softw.}, volume = {85}, number = {5}, pages = {1083--1095}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.12.024}, doi = {10.1016/J.JSS.2011.12.024}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhuHAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhuHAY12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Mengyang Yu}, title = {Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {23}, number = {12}, pages = {2231--2244}, year = {2012}, url = {https://doi.org/10.1109/TPDS.2012.66}, doi = {10.1109/TPDS.2012.66}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/ZhuHAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhuHAYZ12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Mengyang Yu and Hong{-}Jia Zhao}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Comparison-based encryption for fine-grained access control in clouds}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {105--116}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133614}, doi = {10.1145/2133601.2133614}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhuHAYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuWMHA12, author = {Yan Zhu and Shan{-}Biao Wang and Di Ma and Hongxin Hu and Gail{-}Joon Ahn}, title = {Secure and efficient constructions of hash, {MAC} and {PRF} for mobile devices}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {949--954}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503235}, doi = {10.1109/GLOCOM.2012.6503235}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhuWMHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhuMW12, author = {Yan Zhu and Di Ma and Shan{-}Biao Wang}, title = {Secure Data Retrieval of Outsourced Data with Complex Query Support}, booktitle = {32nd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012}, pages = {481--490}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCSW.2012.91}, doi = {10.1109/ICDCSW.2012.91}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhuMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhuHAHW12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Dijiang Huang and Shan{-}Biao Wang}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Towards temporal access control in cloud computing}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2576--2580}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195656}, doi = {10.1109/INFCOM.2012.6195656}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhuHAHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhuWHAH11, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu}, title = {Zero-knowledge proofs of retrievability}, journal = {Sci. China Inf. Sci.}, volume = {54}, number = {8}, pages = {1608--1617}, year = {2011}, url = {https://doi.org/10.1007/s11432-011-4293-9}, doi = {10.1007/S11432-011-4293-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhuWHAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhuHAWW11, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Huaixi Wang and Shan{-}Biao Wang}, title = {Provably Secure Role-Based Encryption with Revocation Mechanism}, journal = {J. Comput. Sci. Technol.}, volume = {26}, number = {4}, pages = {697--710}, year = {2011}, url = {https://doi.org/10.1007/s11390-011-1169-9}, doi = {10.1007/S11390-011-1169-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ZhuHAWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuHAGC11, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Xiaorui Gong and Shimin Chen}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: temporal attribute-based encryption in clouds}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {881--884}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093517}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuHAGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhuHAHC11, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Yujing Han and Shimin Chen}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {Collaborative integrity verification in hybrid clouds}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {191--200}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247089}, doi = {10.4108/ICST.COLLABORATECOM.2011.247089}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZhuHAHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZhuWHAHY11, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Dynamic audit services for integrity verification of outsourced storages in clouds}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {1550--1557}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982514}, doi = {10.1145/1982185.1982514}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ZhuWHAHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/WangZFY10, author = {Huaixi Wang and Yan Zhu and Rong{-}Quan Feng and Stephen S. Yau}, title = {Attribute-Based Signature with Policy-and-Endorsement Mechanism}, journal = {J. Comput. Sci. Technol.}, volume = {25}, number = {6}, pages = {1293--1304}, year = {2010}, url = {https://doi.org/10.1007/s11390-010-9406-1}, doi = {10.1007/S11390-010-9406-1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/WangZFY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuAHW10, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Huaixi Wang}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Cryptographic role-based security mechanisms based on role-key hierarchy}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {314--319}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755728}, doi = {10.1145/1755688.1755728}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuAHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuWHAHY10, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Efficient provable data possession for hybrid clouds}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {756--758}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866421}, doi = {10.1145/1866307.1866421}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuWHAHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhuHWHA10, author = {Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail{-}Joon Ahn}, editor = {Karl Aberer and James Joshi}, title = {A collaborative framework for privacy protection in online social networks}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--10}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.collaboratecom.2010.52}, doi = {10.4108/ICST.COLLABORATECOM.2010.52}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/ZhuHWHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/HuangZY10, author = {Dijiang Huang and Zhibin Zhou and Yan Zhu}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Gradual Identity Exposure Using Attribute-Based Encryption}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {881--888}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.131}, doi = {10.1109/SOCIALCOM.2010.131}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialcom/HuangZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuAHW10, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Huaixi Wang}, title = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2010}, url = {http://eprint.iacr.org/2010/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuAHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuWHAHY10, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, title = {Efficient provable data possession for hybrid clouds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2010}, url = {http://eprint.iacr.org/2010/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuWHAHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuHWHA10, author = {Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail{-}Joon Ahn}, title = {A Collaborative Framework for Privacy Protection in Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2010}, url = {http://eprint.iacr.org/2010/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuHWHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZhuLZ07, author = {Yan Zhu and Chang{-}Tsun Li and Hong{-}Jia Zhao}, editor = {Ning Zhang and Ajith Abraham}, title = {Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {478--483}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.46}, doi = {10.1109/IAS.2007.46}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/ZhuLZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuGZ06, author = {Xinshan Zhu and Yong Gao and Yan Zhu}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Image-adaptive watermarking based on perceptually shaping watermark blockwise}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {175--181}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128844}, doi = {10.1145/1128817.1128844}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuGZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuZZ06, author = {Yan Zhu and Wei Zou and Xinshan Zhu}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Collusion secure convolutional fingerprinting information codes}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {266--274}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128856}, doi = {10.1145/1128817.1128856}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/ZhangYZ06, author = {Xianhai Zhang and Yongtian Yang and Yan Zhu}, editor = {Jun Ni and Jack J. Dongarra}, title = {A Secure Hierarchical Fragile Watermarking Method with Tamper Localization}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.168}, doi = {10.1109/IMSCCS.2006.168}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/ZhangYZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhuFZ05, author = {Yan Zhu and Dengguo Feng and Wei Zou}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim}, title = {Collusion Secure Convolutional Spread Spectrum Fingerprinting}, booktitle = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena, Italy, September 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3710}, pages = {67--83}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11551492\_6}, doi = {10.1007/11551492\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhuFZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.