BibTeX records: Yan Zhu 0010

download as .bib file

@article{DBLP:journals/iotj/LuZCFZM24,
  author       = {Hai Lu and
                  Yan Zhu and
                  Cecilia E. Chen and
                  Rongquan Feng and
                  Lejun Zhang and
                  Di Ma},
  title        = {Efficient Key Generation on Lattice Cryptography for Privacy Protection
                  in Mobile IoT Crowdsourcing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {1893--1909},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3328719},
  doi          = {10.1109/JIOT.2023.3328719},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LuZCFZM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GuoZCZFM24,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  Cecilia E. Chen and
                  Lejun Zhang and
                  Rongquan Feng and
                  Di Ma},
  title        = {Privacy-Preserving Queries Using Multisource Private Data Counting
                  on Real Numbers in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {11353--11367},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3329660},
  doi          = {10.1109/JIOT.2023.3329660},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GuoZCZFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/GuoZCY24,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  E. Chen and
                  Stephen S. Yau},
  title        = {Privacy-Preserving Collaborative Queries in Services Computing Using
                  Multisource Private Data Counting},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {1--17},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSC.2023.3331520},
  doi          = {10.1109/TSC.2023.3331520},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/GuoZCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ChenZLY23,
  author       = {E. Chen and
                  Yan Zhu and
                  Kaitai Liang and
                  Hongjian Yin},
  title        = {Secure Remote Cloud File Sharing With Attribute-Based Access Control
                  and Performance Optimization},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {579--594},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3104323},
  doi          = {10.1109/TCC.2021.3104323},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ChenZLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/GuoZCYZLF23,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  E. Chen and
                  Ruyun Yu and
                  Lejun Zhang and
                  Kewei Lv and
                  Rongquan Feng},
  title        = {Efficient Multiparty Fully Homomorphic Encryption With Computation
                  Fairness and Error Detection in Privacy Preserving Multisource Data
                  Mining},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {72},
  number       = {4},
  pages        = {1308--1323},
  year         = {2023},
  url          = {https://doi.org/10.1109/TR.2023.3246563},
  doi          = {10.1109/TR.2023.3246563},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/GuoZCYZLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ChenWFZY23,
  author       = {E. Chen and
                  Shengdian Wang and
                  Yuqing Fan and
                  Yan Zhu and
                  Stephen S. Yau},
  title        = {SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions
                  Based on Blockchain's Smart Legal Contracts},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {3665--3681},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3267489},
  doi          = {10.1109/TSC.2023.3267489},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ChenWFZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhouXR0C23,
  author       = {Chengxin Zhou and
                  Xianbin Xue and
                  Khaled Riad and
                  Yan Zhu and
                  William Cheng{-}Chung Chu},
  title        = {Remotely Controllable Data Self-Destruction for Privacy-Preserving
                  Sensitive Data Services},
  booktitle    = {{IEEE} International Conference on High Performance Computing {\&}
                  Communications, Data Science {\&} Systems, Smart City {\&}
                  Dependability in Sensor, Cloud {\&} Big Data Systems {\&}
                  Application, HPCC/DSS/SmartCity/DependSys 2023, Melbourne, Australia,
                  December 17-21, 2023},
  pages        = {860--867},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00125},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS60770.2023.00125},
  timestamp    = {Wed, 10 Apr 2024 17:07:58 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZhouXR0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenZZLWC22,
  author       = {E. Chen and
                  Yan Zhu and
                  Zhiyuan Zhou and
                  Shou{-}Yu Lee and
                  W. Eric Wong and
                  William Cheng{-}Chung Chu},
  title        = {Policychain: {A} Decentralized Authorization Service With Script-Driven
                  Policy on Blockchain for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {7},
  pages        = {5391--5409},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3109147},
  doi          = {10.1109/JIOT.2021.3109147},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenZZLWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YinCZZFY22,
  author       = {Hongjian Yin and
                  E. Chen and
                  Yan Zhu and
                  Chengwei Zhao and
                  Rongquan Feng and
                  Stephen S. Yau},
  title        = {Attribute-Based Private Data Sharing With Script-Driven Programmable
                  Ciphertext and Decentralized Key Management in Blockchain Internet
                  of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {13},
  pages        = {10625--10639},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3124016},
  doi          = {10.1109/JIOT.2021.3124016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YinCZZFY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/LuYZHLC22,
  author       = {Hai Lu and
                  Ruyun Yu and
                  Yan Zhu and
                  Xiao He and
                  Kaitai Liang and
                  William Cheng{-}Chung Chu},
  title        = {Policy-driven Data Sharing over Attribute-Based Encryption supporting
                  Dual Membership},
  journal      = {J. Syst. Softw.},
  volume       = {188},
  pages        = {111271},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jss.2022.111271},
  doi          = {10.1016/J.JSS.2022.111271},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/LuYZHLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/GuoZCZMC22,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  E. Chen and
                  Guizhen Zhu and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {Continuous improvement of script-driven verifiable random functions
                  for reducing computing power in blockchain consensus protocols},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {15},
  number       = {1},
  pages        = {304--323},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12083-021-01243-x},
  doi          = {10.1007/S12083-021-01243-X},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/GuoZCZMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ChenQZSWCY22,
  author       = {E. Chen and
                  Bohan Qin and
                  Yan Zhu and
                  Weijing Song and
                  Shengdian Wang and
                  William Cheng{-}Chung Chu and
                  Stephen S. Yau},
  title        = {SPESC-Translator: Towards Automatically Smart Legal Contract Conversion
                  for Blockchain-Based Auction Services},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {3061--3076},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2021.3077291},
  doi          = {10.1109/TSC.2021.3077291},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ChenQZSWCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZZLF21,
  author       = {E. Chen and
                  Yan Zhu and
                  Guizhen Zhu and
                  Kaitai Liang and
                  Rongquan Feng},
  title        = {How to implement secure cloud file sharing using optimized attribute-based
                  access control with small policy matrix and minimized cumulative errors},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102318},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102318},
  doi          = {10.1016/J.COSE.2021.102318},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZZLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/0010GYLY21,
  author       = {Yan Zhu and
                  Qian Guo and
                  Hongjian Yin and
                  Kaitai Liang and
                  Stephen S. Yau},
  title        = {Blockchain-Based Software Architecture Development for Service Requirements
                  With Smart Contracts},
  journal      = {Computer},
  volume       = {54},
  number       = {12},
  pages        = {72--80},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2021.3091379},
  doi          = {10.1109/MC.2021.3091379},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/0010GYLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/0010SWMC21,
  author       = {Yan Zhu and
                  Weijing Song and
                  Di Wang and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {{TA-SPESC:} Toward Asset-Driven Smart Contract Language Supporting
                  Ownership Transaction and Rule-Based Generation on Blockchain},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {70},
  number       = {3},
  pages        = {1255--1270},
  year         = {2021},
  url          = {https://doi.org/10.1109/TR.2021.3054617},
  doi          = {10.1109/TR.2021.3054617},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/0010SWMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/ChenQZSWCY21,
  author       = {E. Chen and
                  Bohan Qin and
                  Yan Zhu and
                  Weijing Song and
                  Shengdian Wang and
                  William Cheng{-}Chung Chu and
                  Stephen S. Yau},
  editor       = {Nimanthi L. Atukorala and
                  Carl K. Chang and
                  Rong N. Chang and
                  Ernesto Damiani and
                  Ian T. Foster and
                  Zhongjie Wang and
                  Jia Zhang},
  title        = {SPESC-Translator: Towards Automatically Smart Legal Contract Conversion
                  for Blockchain-based Auction Services},
  booktitle    = {{IEEE} World Congress on Services, {SERVICES} 2021, Chicago, IL, USA,
                  September 5-10, 2021},
  pages        = {3},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SERVICES51467.2021.00014},
  doi          = {10.1109/SERVICES51467.2021.00014},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/services/ChenQZSWCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GanCZZ20,
  author       = {Guohua Gan and
                  E. Chen and
                  Zhiyuan Zhou and
                  Yan Zhu},
  title        = {Token-Based Access Control},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {54189--54199},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2979746},
  doi          = {10.1109/ACCESS.2020.2979746},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GanCZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoZYCM20,
  author       = {Guanglai Guo and
                  Yan Zhu and
                  Ruyun Yu and
                  William Cheng{-}Chung Chu and
                  Di Ma},
  title        = {A Privacy-Preserving Framework With Self-Governance and Permission
                  Delegation in Online Social Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {157116--157129},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3016041},
  doi          = {10.1109/ACCESS.2020.3016041},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoZYCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZZL20a,
  author       = {Di Wang and
                  Yan Zhu and
                  Yi Zhang and
                  Guowei Liu},
  title        = {Security Assessment of Blockchain in Chinese Classified Protection
                  of Cybersecurity},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {203440--203456},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3036004},
  doi          = {10.1109/ACCESS.2020.3036004},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangZZL20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ChenZLL20,
  author       = {Enhong Chen and
                  Yan Zhu and
                  Changlu Lin and
                  Kewei Lv},
  title        = {Zero-pole cancellation for identity-based aggregators: a constant-size
                  designated verifier-set signature},
  journal      = {Frontiers Comput. Sci.},
  volume       = {14},
  number       = {4},
  pages        = {144806},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11704-019-8320-0},
  doi          = {10.1007/S11704-019-8320-0},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ChenZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhuRGGF19,
  author       = {Yan Zhu and
                  Khaled Riad and
                  Ruiqi Guo and
                  Guohua Gan and
                  Rongquan Feng},
  title        = {New instant confirmation mechanism based on interactive incontestable
                  signature in consortium blockchain},
  journal      = {Frontiers Comput. Sci.},
  volume       = {13},
  number       = {6},
  pages        = {1182--1197},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11704-017-6338-8},
  doi          = {10.1007/S11704-017-6338-8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhuRGGF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ZhuYMC19,
  author       = {Yan Zhu and
                  Ruyun Yu and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {Cryptographic Attribute-Based Access Control {(ABAC)} for Secure Decision
                  Making of Dynamic Policy With Multiauthority Attribute Tokens},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {68},
  number       = {4},
  pages        = {1330--1346},
  year         = {2019},
  url          = {https://doi.org/10.1109/TR.2019.2948713},
  doi          = {10.1109/TR.2019.2948713},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/ZhuYMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/0010YCF19,
  author       = {Yan Zhu and
                  Shuai Yang and
                  William Cheng{-}Chung Chu and
                  Rongquan Feng},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {FlashGhost: Data Sanitization with Privacy Protection Based on Frequent
                  Colliding Hash Table},
  booktitle    = {2019 {IEEE} International Conference on Services Computing, {SCC}
                  2019, Milan, Italy, July 8-13, 2019},
  pages        = {90--99},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SCC.2019.00026},
  doi          = {10.1109/SCC.2019.00026},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/0010YCF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/0010ZWSCL19,
  author       = {Yan Zhu and
                  Yi Zhang and
                  Jing Wang and
                  Weijing Song and
                  William Cheng{-}Chung Chu and
                  Guowei Liu},
  editor       = {Vladimir Getov and
                  Jean{-}Luc Gaudiot and
                  Nariyoshi Yamai and
                  Stelvio Cimato and
                  J. Morris Chang and
                  Yuuichi Teranishi and
                  Ji{-}Jiang Yang and
                  Hong Va Leong and
                  Hossain Shahriar and
                  Michiharu Takemoto and
                  Dave Towey and
                  Hiroki Takakura and
                  Atilla El{\c{c}}i and
                  Susumu Takeuchi and
                  Satish Puri},
  title        = {From Data-Driven to Intelligent-Driven: Technology Evolution of Network
                  Security in Big Data Era},
  booktitle    = {43rd {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2},
  pages        = {103--109},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMPSAC.2019.10191},
  doi          = {10.1109/COMPSAC.2019.10191},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/0010ZWSCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/JiangLZ19,
  author       = {Yihan Jiang and
                  Yong Li and
                  Yan Zhu},
  editor       = {Yulin Wang and
                  Chin{-}Chen Chang},
  title        = {Auditable zerocoin scheme with user awareness},
  booktitle    = {Proceedings of the 3rd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21,
                  2019},
  pages        = {28--32},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309074.3309094},
  doi          = {10.1145/3309074.3309094},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/JiangLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangFZ18,
  author       = {Qianwen Wang and
                  Rongquan Feng and
                  Yan Zhu},
  title        = {Verifiable random functions with Boolean function constraints},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {039105:1--039105:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9228-6},
  doi          = {10.1007/S11432-017-9228-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangFZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/0010YCH18,
  author       = {Yan Zhu and
                  Ruyun Yu and
                  E. Chen and
                  Dijiang Huang},
  title        = {Dual-mode broadcast encryption},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {11},
  pages        = {118101:1--118101:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9287-6},
  doi          = {10.1007/S11432-017-9287-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/0010YCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/0010GGH18,
  author       = {Yan Zhu and
                  Guohua Gan and
                  Ruiqi Guo and
                  Dijiang Huang},
  title        = {{PHE:} An Efficient Traitor Tracing and Revocation for Encrypted File
                  Syncing-and-Sharing in Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {4},
  pages        = {1110--1124},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2016.2573299},
  doi          = {10.1109/TCC.2016.2573299},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/0010GGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiHWZ18,
  author       = {Bing Li and
                  Dijiang Huang and
                  Zhijie Wang and
                  Yan Zhu},
  title        = {Attribute-based Access Control for {ICN} Naming Scheme},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {194--206},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2550437},
  doi          = {10.1109/TDSC.2016.2550437},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiHWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/ZhaoLZGCZD18,
  author       = {Hongke Zhao and
                  Qi Liu and
                  Hengshu Zhu and
                  Yong Ge and
                  Enhong Chen and
                  Yan Zhu and
                  Junping Du},
  title        = {A Sequential Approach to Market State Modeling and Analysis in Online
                  {P2P} Lending},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {48},
  number       = {1},
  pages        = {21--33},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSMC.2017.2665038},
  doi          = {10.1109/TSMC.2017.2665038},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/ZhaoLZGCZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/0010QZSLC18,
  author       = {Yan Zhu and
                  Yao Qin and
                  Zhiyuan Zhou and
                  Xiaoxu Song and
                  Guowei Liu and
                  William Cheng{-}Chung Chu},
  title        = {Digital Asset Management with Distributed Permission over Blockchain
                  and Attribute-Based Access Control},
  booktitle    = {2018 {IEEE} International Conference on Services Computing, {SCC}
                  2018, San Francisco, CA, USA, July 2-7, 2018},
  pages        = {193--200},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SCC.2018.00032},
  doi          = {10.1109/SCC.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/0010QZSLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HeQZCL18,
  author       = {Xiao He and
                  Bohan Qin and
                  Yan Zhu and
                  Xing Chen and
                  Yi Liu},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {{SPESC:} {A} Specification Language for Smart Contracts},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 1},
  pages        = {132--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.00025},
  doi          = {10.1109/COMPSAC.2018.00025},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/HeQZCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/0010QGSC18,
  author       = {Yan Zhu and
                  Yao Qin and
                  Guohua Gan and
                  Yang Shuai and
                  William Cheng{-}Chung Chu},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {{TBAC:} Transaction-Based Access Control on Blockchain for Resource
                  Sharing with Cryptographically Decentralized Authorization},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 1},
  pages        = {535--544},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.00083},
  doi          = {10.1109/COMPSAC.2018.00083},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/0010QGSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/0010YGH18,
  author       = {Yan Zhu and
                  Shuai Yang and
                  Guohua Gan and
                  Xiao He},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {An Efficient Retrograde Storage for Self-Destructing Messages on Frequently
                  Colliding Hash Table},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 1},
  pages        = {914--919},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.00157},
  doi          = {10.1109/COMPSAC.2018.00157},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/0010YGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/0010SYQZ18,
  author       = {Yan Zhu and
                  Xiaoxu Song and
                  Shuai Yang and
                  Yao Qin and
                  Qiong Zhou},
  title        = {Secure Smart Contract System Built on {SMPC} Over Blockchain},
  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
                  30 - August 3, 2018},
  pages        = {1539--1544},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Cybermatics\_2018.2018.00259},
  doi          = {10.1109/CYBERMATICS\_2018.2018.00259},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/0010SYQZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/0010YQMC18,
  author       = {Yan Zhu and
                  Ruyun Yu and
                  Yao Qin and
                  Di Ma and
                  William Cheng{-}Chung Chu},
  title        = {Provably Secure Cryptographic {ABAC} System to Enhance Reliability
                  and Privacy Using Real-Time Token and Dynamic Policy},
  booktitle    = {2018 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2018, Lisbon, Portugal, July 16-20, 2018},
  pages        = {277--288},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/QRS.2018.00041},
  doi          = {10.1109/QRS.2018.00041},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/0010YQMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/RiadZ17,
  author       = {Khaled Riad and
                  Yan Zhu},
  title        = {Multi-Factor Synthesis Decision-Making for Trust-Based Access Control
                  on Cloud},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {26},
  number       = {4},
  pages        = {1750003:1--1750003:33},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0218843017500034},
  doi          = {10.1142/S0218843017500034},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcis/RiadZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/0001GR17,
  author       = {Yan Zhu and
                  Guhua Gan and
                  Khaled Riad},
  title        = {{BC-PDS:} Protecting Privacy and Self-Sovereignty through BlockChains
                  for OpenPDS},
  booktitle    = {2017 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE}
                  2017, San Francisco, CA, USA, April 6-9, 2017},
  pages        = {138--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SOSE.2017.30},
  doi          = {10.1109/SOSE.2017.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/0001GR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ZhuGGT16,
  author       = {Yan Zhu and
                  Ruiqi Guo and
                  Guohua Gan and
                  Wei{-}Tek Tsai},
  title        = {Interactive Incontestable Signature for Transactions Confirmation
                  in Bitcoin Blockchain},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {443--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.142},
  doi          = {10.1109/COMPSAC.2016.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ZhuGGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/ZhuZLCLZ16,
  author       = {Yan Zhu and
                  Hengshu Zhu and
                  Qi Liu and
                  Enhong Chen and
                  Hong Li and
                  Hongke Zhao},
  editor       = {Shamkant B. Navathe and
                  Weili Wu and
                  Shashi Shekhar and
                  Xiaoyong Du and
                  X. Sean Wang and
                  Hui Xiong},
  title        = {Exploring the Procrastination of College Students: {A} Data-Driven
                  Behavioral Perspective},
  booktitle    = {Database Systems for Advanced Applications - 21st International Conference,
                  {DASFAA} 2016, Dallas, TX, USA, April 16-19, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9642},
  pages        = {258--273},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32025-0\_17},
  doi          = {10.1007/978-3-319-32025-0\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasfaa/ZhuZLCLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/TsaiBZY16,
  author       = {Wei{-}Tek Tsai and
                  Robert Blower and
                  Yan Zhu and
                  Lian Yu},
  title        = {A System View of Financial Blockchains},
  booktitle    = {2016 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE}
                  2016, Oxford, United Kingdom, March 29 - April 2, 2016},
  pages        = {450--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SOSE.2016.66},
  doi          = {10.1109/SOSE.2016.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/TsaiBZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/WuHZ15,
  author       = {Huijun Wu and
                  Dijiang Huang and
                  Yan Zhu},
  title        = {Establishing {A} Personal On-Demand Execution Environment for Mobile
                  Cloud Applications},
  journal      = {Mob. Networks Appl.},
  volume       = {20},
  number       = {3},
  pages        = {297--307},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11036-015-0617-0},
  doi          = {10.1007/S11036-015-0617-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/WuHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WangHZLC15,
  author       = {Zhijie Wang and
                  Dijiang Huang and
                  Yan Zhu and
                  Bing Li and
                  Chun{-}Jen Chung},
  title        = {Efficient Attribute-Based Comparable Data Access Control},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {12},
  pages        = {3430--3443},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2015.2401033},
  doi          = {10.1109/TC.2015.2401033},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/WangHZLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShresthaM0LS15,
  author       = {Babins Shrestha and
                  Di Ma and
                  Yan Zhu and
                  Haoyu Li and
                  Nitesh Saxena},
  title        = {Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging
                  Smartphone Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2270--2283},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2436364},
  doi          = {10.1109/TIFS.2015.2436364},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ShresthaM0LS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/0001HHW15,
  author       = {Yan Zhu and
                  Dijiang Huang and
                  Chang{-}Jyun Hu and
                  Xin Wang},
  title        = {From {RBAC} to {ABAC:} Constructing Flexible Data Access Control for
                  Cloud Storage Services},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {601--616},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSC.2014.2363474},
  doi          = {10.1109/TSC.2014.2363474},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/0001HHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuWMG15,
  author       = {Yan Zhu and
                  Xin Wang and
                  Di Ma and
                  Ruiqi Guo},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select"
                  with Short Ciphertext},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {191--202},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714602},
  doi          = {10.1145/2714576.2714602},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuWMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LinLWZ15,
  author       = {Changlu Lin and
                  Fucai Luo and
                  Huaxiong Wang and
                  Yan Zhu},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {A Provable Data Possession Scheme with Data Hierarchy in Cloud},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {301--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_18},
  doi          = {10.1007/978-3-319-38898-4\_18},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LinLWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/Riad0HA15,
  author       = {Khaled Riad and
                  Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {{AR-ABAC:} {A} New Attribute Based Access Control Model Supporting
                  Attribute-Rules for Cloud Computing},
  booktitle    = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015,
                  Hangzhou, China, October 27-30, 2015},
  pages        = {28--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIC.2015.38},
  doi          = {10.1109/CIC.2015.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/Riad0HA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ZhuPGGZ15,
  author       = {Yan Zhu and
                  Feng Pu and
                  Guohua Gan and
                  Ruiqi Guo and
                  Shuqing Zhang},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Traitor Tracing and Revocation for Secure Decoders in File Syncing-and-Sharing
                  Service},
  booktitle    = {39th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2},
  pages        = {504--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.62},
  doi          = {10.1109/COMPSAC.2015.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ZhuPGGZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobserv/ZhuYM15,
  author       = {Yan Zhu and
                  Liguang Yang and
                  Di Ma},
  editor       = {Onur Altintas and
                  Jia Zhang},
  title        = {Secure Snaps: {A} New Forward Secrecy Cryptosystem for Self-Destructing
                  Messages in Mobile Services},
  booktitle    = {2015 {IEEE} International Conference on Mobile Services, {MS} 2015,
                  New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MobServ.2015.29},
  doi          = {10.1109/MOBSERV.2015.29},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobserv/ZhuYM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuWMG15,
  author       = {Yan Zhu and
                  Xin Wang and
                  Di Ma and
                  Ruiqi Guo},
  title        = {Identity-Set-based Broadcast Encryption supporting "Cut-or-Select"
                  with Short Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuWMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Wang0MF14,
  author       = {Shan{-}Biao Wang and
                  Yan Zhu and
                  Di Ma and
                  Rong{-}Quan Feng},
  title        = {Lattice-based key exchange on small integer solution problem},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {11},
  pages        = {1--12},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-014-5147-z},
  doi          = {10.1007/S11432-014-5147-Z},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/Wang0MF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/0001MHAH14,
  author       = {Yan Zhu and
                  Di Ma and
                  Changjun Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Secure and efficient random functions with variable-length output},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {45},
  pages        = {121--133},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2014.07.033},
  doi          = {10.1016/J.JNCA.2014.07.033},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/0001MHAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiVHWZ14,
  author       = {Bing Li and
                  Ashwin Prabhu Verleker and
                  Dijiang Huang and
                  Zhijie Wang and
                  Yan Zhu},
  title        = {Attribute-based access control for {ICN} naming scheme},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {391--399},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997508},
  doi          = {10.1109/CNS.2014.6997508},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiVHWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhuLY14,
  author       = {Yan Zhu and
                  Dandan Li and
                  Liguang Yang},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Traitor Tracing Based on Partially-Ordered Hierarchical Encryption},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_18},
  doi          = {10.1007/978-3-319-27998-5\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhuLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaSXZ13,
  author       = {Di Ma and
                  Nitesh Saxena and
                  Tuo Xiang and
                  Yan Zhu},
  title        = {Location-Aware and Safer Cards: Enhancing {RFID} Security and Privacy
                  via Location Sensing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {57--69},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2012.89},
  doi          = {10.1109/TDSC.2012.89},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaSXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuAHMW13,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Di Ma and
                  Shan{-}Biao Wang},
  title        = {Role-Based Cryptosystem: {A} New Cryptographic {RBAC} System Based
                  on Role-Key Hierarchy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {2138--2153},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2287858},
  doi          = {10.1109/TIFS.2013.2287858},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuAHMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhuAHYAH13,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau and
                  Ho G. An and
                  Changjun Hu},
  title        = {Dynamic Audit Services for Outsourced Storages in Clouds},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {227--238},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSC.2011.51},
  doi          = {10.1109/TSC.2011.51},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhuAHYAH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/ZhuHML13,
  author       = {Yan Zhu and
                  Changjun Hu and
                  Di Ma and
                  Jin Li},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Dritan Nace and
                  Salvatore Venticinque and
                  Alain Bui},
  title        = {Cryptographic Spatio-temporal Predicates for Location-Based Services},
  booktitle    = {Eighth International Conference on P2P, Parallel, Grid, Cloud and
                  Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30,
                  2013},
  pages        = {84--91},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/3PGCIC.2013.19},
  doi          = {10.1109/3PGCIC.2013.19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/ZhuHML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001MHH13,
  author       = {Yan Zhu and
                  Di Ma and
                  Changjun Hu and
                  Dijiang Huang},
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {How to use attribute-based encryption to implement role-based access
                  control in the cloud},
  booktitle    = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484402.2484411},
  doi          = {10.1145/2484402.2484411},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001MHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaZY13,
  author       = {Di Ma and
                  Yan Zhu and
                  Mengyang Yu},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {End-to-end aggregate authentication of time-series data},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484400},
  doi          = {10.1145/2484389.2484400},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ZhuMHH13,
  author       = {Yan Zhu and
                  Di Ma and
                  Dijiang Huang and
                  Changjun Hu},
  editor       = {Mario Gerla and
                  Dijiang Huang},
  title        = {Enabling secure location-based services in mobile cloud computing},
  booktitle    = {Proceedings of the second {ACM} {SIGCOMM} workshop on Mobile cloud
                  computing, MCC@SIGCOMM 2013, Hong Kong, China, August 16, 2013},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2491266.2491272},
  doi          = {10.1145/2491266.2491272},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ZhuMHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ZhuMWF13,
  author       = {Yan Zhu and
                  Di Ma and
                  Shan{-}Biao Wang and
                  Rong{-}Quan Feng},
  editor       = {Kui Ren and
                  Xue Liu and
                  Weifa Liang and
                  Ming Xu and
                  Xiaohua Jia and
                  Kai Xing},
  title        = {Efficient Identity-Based Encryption without Pairings and Key Escrow
                  for Mobile Devices},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 8th International
                  Conference, {WASA} 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7992},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39701-1\_4},
  doi          = {10.1007/978-3-642-39701-1\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/ZhuMWF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiMSSZ13,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Tap-Wave-Rub: lightweight malware prevention for smartphones using
                  intuitive human gestures},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462101},
  doi          = {10.1145/2462096.2462101},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4010,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  title        = {Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using
                  Intuitive Human Gestures},
  journal      = {CoRR},
  volume       = {abs/1302.4010},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4010},
  eprinttype    = {arXiv},
  eprint       = {1302.4010},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhuYHAZ12,
  author       = {Yan Zhu and
                  Mengyang Yu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Hong{-}Jia Zhao},
  title        = {Efficient construction of provably secure steganography under ordinary
                  covert channels},
  journal      = {Sci. China Inf. Sci.},
  volume       = {55},
  number       = {7},
  pages        = {1639--1649},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11432-012-4598-3},
  doi          = {10.1007/S11432-012-4598-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhuYHAZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/ZhuWHAM12,
  author       = {Yan Zhu and
                  Shan{-}Biao Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Di Ma},
  title        = {Secure Collaborative Integrity Verification for Hybrid Cloud Environments},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {21},
  number       = {3},
  pages        = {165--198},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218843012410018},
  doi          = {10.1142/S0218843012410018},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcis/ZhuWHAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhuHAY12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Stephen S. Yau},
  title        = {Efficient audit service outsourcing for data integrity in clouds},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {5},
  pages        = {1083--1095},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.12.024},
  doi          = {10.1016/J.JSS.2011.12.024},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhuHAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ZhuHAY12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Mengyang Yu},
  title        = {Cooperative Provable Data Possession for Integrity Verification in
                  Multicloud Storage},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {23},
  number       = {12},
  pages        = {2231--2244},
  year         = {2012},
  url          = {https://doi.org/10.1109/TPDS.2012.66},
  doi          = {10.1109/TPDS.2012.66},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/ZhuHAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhuHAYZ12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Mengyang Yu and
                  Hong{-}Jia Zhao},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Comparison-based encryption for fine-grained access control in clouds},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133614},
  doi          = {10.1145/2133601.2133614},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhuHAYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuWMHA12,
  author       = {Yan Zhu and
                  Shan{-}Biao Wang and
                  Di Ma and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {Secure and efficient constructions of hash, {MAC} and {PRF} for mobile
                  devices},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {949--954},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503235},
  doi          = {10.1109/GLOCOM.2012.6503235},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuWMHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhuMW12,
  author       = {Yan Zhu and
                  Di Ma and
                  Shan{-}Biao Wang},
  title        = {Secure Data Retrieval of Outsourced Data with Complex Query Support},
  booktitle    = {32nd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012},
  pages        = {481--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCSW.2012.91},
  doi          = {10.1109/ICDCSW.2012.91},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhuMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhuHAHW12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Dijiang Huang and
                  Shan{-}Biao Wang},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Towards temporal access control in cloud computing},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2576--2580},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195656},
  doi          = {10.1109/INFCOM.2012.6195656},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhuHAHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhuWHAH11,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Zero-knowledge proofs of retrievability},
  journal      = {Sci. China Inf. Sci.},
  volume       = {54},
  number       = {8},
  pages        = {1608--1617},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11432-011-4293-9},
  doi          = {10.1007/S11432-011-4293-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhuWHAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhuHAWW11,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Huaixi Wang and
                  Shan{-}Biao Wang},
  title        = {Provably Secure Role-Based Encryption with Revocation Mechanism},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {26},
  number       = {4},
  pages        = {697--710},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11390-011-1169-9},
  doi          = {10.1007/S11390-011-1169-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhuHAWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuHAGC11,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Xiaorui Gong and
                  Shimin Chen},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: temporal attribute-based encryption in clouds},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {881--884},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093517},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuHAGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhuHAHC11,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Yujing Han and
                  Shimin Chen},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {Collaborative integrity verification in hybrid clouds},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {191--200},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247089},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247089},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhuHAHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZhuWHAHY11,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Dynamic audit services for integrity verification of outsourced storages
                  in clouds},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {1550--1557},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982514},
  doi          = {10.1145/1982185.1982514},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ZhuWHAHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WangZFY10,
  author       = {Huaixi Wang and
                  Yan Zhu and
                  Rong{-}Quan Feng and
                  Stephen S. Yau},
  title        = {Attribute-Based Signature with Policy-and-Endorsement Mechanism},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {25},
  number       = {6},
  pages        = {1293--1304},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11390-010-9406-1},
  doi          = {10.1007/S11390-010-9406-1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/WangZFY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuAHW10,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Huaixi Wang},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Cryptographic role-based security mechanisms based on role-key hierarchy},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {314--319},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755728},
  doi          = {10.1145/1755688.1755728},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuAHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuWHAHY10,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Efficient provable data possession for hybrid clouds},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {756--758},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866421},
  doi          = {10.1145/1866307.1866421},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuWHAHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhuHWHA10,
  author       = {Yan Zhu and
                  Zexing Hu and
                  Huaixi Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {A collaborative framework for privacy protection in online social
                  networks},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.52},
  doi          = {10.4108/ICST.COLLABORATECOM.2010.52},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhuHWHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/HuangZY10,
  author       = {Dijiang Huang and
                  Zhibin Zhou and
                  Yan Zhu},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Gradual Identity Exposure Using Attribute-Based Encryption},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {881--888},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.131},
  doi          = {10.1109/SOCIALCOM.2010.131},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialcom/HuangZY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuAHW10,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Huaixi Wang},
  title        = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuAHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuWHAHY10,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  title        = {Efficient provable data possession for hybrid clouds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuWHAHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuHWHA10,
  author       = {Yan Zhu and
                  Zexing Hu and
                  Huaixi Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {A Collaborative Framework for Privacy Protection in Online Social
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuHWHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhuLZ07,
  author       = {Yan Zhu and
                  Chang{-}Tsun Li and
                  Hong{-}Jia Zhao},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Structural Digital Signature and Semi-Fragile Fingerprinting for Image
                  Authentication in Wavelet Domain},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {478--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.46},
  doi          = {10.1109/IAS.2007.46},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhuLZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuGZ06,
  author       = {Xinshan Zhu and
                  Yong Gao and
                  Yan Zhu},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Image-adaptive watermarking based on perceptually shaping watermark
                  blockwise},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {175--181},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128844},
  doi          = {10.1145/1128817.1128844},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuGZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuZZ06,
  author       = {Yan Zhu and
                  Wei Zou and
                  Xinshan Zhu},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Collusion secure convolutional fingerprinting information codes},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {266--274},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128856},
  doi          = {10.1145/1128817.1128856},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/ZhangYZ06,
  author       = {Xianhai Zhang and
                  Yongtian Yang and
                  Yan Zhu},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {A Secure Hierarchical Fragile Watermarking Method with Tamper Localization},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.168},
  doi          = {10.1109/IMSCCS.2006.168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/ZhangYZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhuFZ05,
  author       = {Yan Zhu and
                  Dengguo Feng and
                  Wei Zou},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Collusion Secure Convolutional Spread Spectrum Fingerprinting},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {67--83},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_6},
  doi          = {10.1007/11551492\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhuFZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics