Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fushan Wei
@inproceedings{DBLP:conf/cisc/ChengZCW23, author = {Qingfeng Cheng and Chunzhi Zhao and Jinzheng Cao and Fushan Wei}, title = {Improved Herrmann-May's Attack with Merging Variables and Lower {LLL} Bound}, booktitle = {Inscrypt {(2)}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {209--229}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/icics/SongZW23, author = {Yuhan Song and Yuefei Zhu and Fushan Wei}, title = {Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions}, booktitle = {{ICICS}}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {590--607}, publisher = {Springer}, year = {2023} }
@article{DBLP:journals/tnsm/SongWZZ22, author = {Yuhan Song and Fushan Wei and Kaijie Zhu and Yuefei Zhu}, title = {Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {3794--3809}, year = {2022} }
@article{DBLP:journals/toit/MaMKWSA22, author = {Xindi Ma and Jianfeng Ma and Saru Kumari and Fushan Wei and Mohammad Shojafar and Mamoun Alazab}, title = {Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {45:1--45:24}, year = {2022} }
@inproceedings{DBLP:conf/lcn/LiGLWL22, author = {Ji Li and Chunxiang Gu and Luan Luan and Fushan Wei and Wenfen Liu}, title = {Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning}, booktitle = {{LCN}}, pages = {371--374}, publisher = {{IEEE}}, year = {2022} }
@article{DBLP:journals/iotj/WeiVKZC21, author = {Fushan Wei and Pandi Vijayakumar and Neeraj Kumar and Ruijie Zhang and Qingfeng Cheng}, title = {Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {7}, pages = {5599--5606}, year = {2021} }
@article{DBLP:journals/itc/GuoGCLW21, author = {Jiaxing Guo and Chunxiang Gu and Xi Chen and Siqi Lu and Fushan Wei}, title = {Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations}, journal = {Inf. Technol. Control.}, volume = {50}, number = {3}, pages = {570--587}, year = {2021} }
@article{DBLP:journals/scn/ChenWG21, author = {Binjie Chen and Fushan Wei and Chunxiang Gu}, title = {Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6643763:1--6643763:10}, year = {2021} }
@article{DBLP:journals/sensors/HuGCW21, author = {Xinyi Hu and Chunxiang Gu and Yihang Chen and Fushan Wei}, title = {{CBD:} {A} Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method}, journal = {Sensors}, volume = {21}, number = {24}, pages = {8231}, year = {2021} }
@article{DBLP:journals/tits/WeiZVKH21, author = {Fushan Wei and Sherali Zeadally and Pandi Vijayakumar and Neeraj Kumar and Debiao He}, title = {An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {3939--3951}, year = {2021} }
@inproceedings{DBLP:conf/ccci/HuGCW21, author = {Xinyi Hu and Chunxiang Gu and Yihang Chen and Fushan Wei}, title = {tCLD-Net: {A} Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network}, booktitle = {{CCCI}}, pages = {1--5}, publisher = {{IEEE}}, year = {2021} }
@article{DBLP:journals/access/WangZYWW20, author = {Ding Wang and Peichang Zhang and Zeyu Yang and Fushan Wei and Cheng Wang}, title = {A Novel Estimator for {TDOA} and {FDOA} Positioning of Multiple Disjoint Sources in the Presence of Calibration Emitters}, journal = {{IEEE} Access}, volume = {8}, pages = {1613--1643}, year = {2020} }
@article{DBLP:journals/fgcs/ShenLSWX20, author = {Jian Shen and Dengzhi Liu and Xingming Sun and Fushan Wei and Yang Xiang}, title = {Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities}, journal = {Future Gener. Comput. Syst.}, volume = {109}, pages = {450--456}, year = {2020} }
@article{DBLP:journals/iet-com/ZhangKOW20, author = {Hui Zhang and Saru Kumari and Mohammad S. Obaidat and Fushan S. Wei}, title = {Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing}, journal = {{IET} Commun.}, volume = {14}, number = {15}, pages = {2427--2433}, year = {2020} }
@article{DBLP:journals/joeuc/YeGJWZM20, author = {Ziwei Ye and Yuanbo Guo and Ankang Ju and Fushan Wei and Ruijie Zhang and Jun Ma}, title = {A Risk Analysis Framework for Social Engineering Attack Based on User Profiling}, journal = {J. Organ. End User Comput.}, volume = {32}, number = {3}, pages = {37--49}, year = {2020} }
@article{DBLP:journals/mssp/YangWYW20, author = {Zeyu Yang and Ding Wang and Bin Yang and Fushan Wei}, title = {Robust Direct position determination against sensor gain and phase errors with the use of calibration sources}, journal = {Multidimens. Syst. Signal Process.}, volume = {31}, number = {4}, pages = {1435--1468}, year = {2020} }
@article{DBLP:journals/tsusc/WeiVJZ20, author = {Fushan Wei and Pandi Vijayakumar and Qi Jiang and Ruijie Zhang}, title = {A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {5}, number = {2}, pages = {268--278}, year = {2020} }
@inproceedings{DBLP:conf/nana/GuoLGCW20, author = {Jiaxing Guo and Siqi Lu and Chunxiang Gu and Xi Chen and Fushan Wei}, title = {Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things}, booktitle = {NaNA}, pages = {233--240}, publisher = {{IEEE}}, year = {2020} }
@article{DBLP:journals/access/GuoGCW19, author = {Jiaxing Guo and Chunxiang Gu and Xi Chen and Fushan Wei}, title = {Model Learning and Model Checking of IPSec Implementations for Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {171322--171332}, year = {2019} }
@article{DBLP:journals/dsp/WangYZJW19, author = {Ding Wang and Jiexin Yin and Tao Zhang and Changgui Jia and Fushan Wei}, title = {Iterative constrained weighted least squares estimator for {TDOA} and {FDOA} positioning of multiple disjoint sources in the presence of sensor position and velocity uncertainties}, journal = {Digit. Signal Process.}, volume = {92}, pages = {179--205}, year = {2019} }
@article{DBLP:journals/ejasp/WangYCJW19, author = {Ding Wang and Jiexin Yin and Xin Chen and Changgui Jia and Fushan Wei}, title = {On the use of calibration emitters for {TDOA} source localization in the presence of synchronization clock bias and sensor location errors}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2019}, pages = {37}, year = {2019} }
@article{DBLP:journals/ijcomsys/0001QMMCW19, author = {Qi Jiang and Yuanyuan Qian and Jianfeng Ma and XinDi Ma and Qingfeng Cheng and Fushan Wei}, title = {User centric three-factor authentication protocol for cloud-assisted wearable devices}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {6}, year = {2019} }
@inproceedings{DBLP:conf/blocksys/LiGWC19, author = {Ji Li and Chunxiang Gu and Fushan Wei and Xi Chen}, title = {A Survey on Blockchain Anomaly Detection Using Data Mining Techniques}, booktitle = {BlockSys}, series = {Communications in Computer and Information Science}, volume = {1156}, pages = {491--504}, publisher = {Springer}, year = {2019} }
@article{DBLP:journals/cee/WeiVSZL18, author = {Fushan Wei and Pandi Vijayakumar and Jian Shen and Ruijie Zhang and Li Li}, title = {A provably secure password-based anonymous authentication scheme for wireless body area networks}, journal = {Comput. Electr. Eng.}, volume = {65}, pages = {322--331}, year = {2018} }
@article{DBLP:journals/dam/WeiKHY18, author = {Fushan Wei and Neeraj Kumar and Debiao He and Sang{-}Soo Yeo}, title = {A general compiler for password-authenticated group key exchange protocol in the standard model}, journal = {Discret. Appl. Math.}, volume = {241}, pages = {78--86}, year = {2018} }
@article{DBLP:journals/fuin/WeiZM18, author = {Fushan Wei and Ruijie Zhang and Chuangui Ma}, title = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing}, journal = {Fundam. Informaticae}, volume = {157}, number = {1-2}, pages = {201--220}, year = {2018} }
@article{DBLP:journals/ijhpcn/MiaoMWZL18, author = {Yinbin Miao and Jianfeng Ma and Fushan Wei and Kai Zhang and Zhiquan Liu}, title = {{VKSE-DO:} verifiable keyword search over encrypted data for dynamic data-owner}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {12}, number = {1}, pages = {39--48}, year = {2018} }
@article{DBLP:journals/iotj/ShenZWSX18, author = {Jian Shen and Tianqi Zhou and Fushan Wei and Xingming Sun and Yang Xiang}, title = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G} in the Social Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {2526--2536}, year = {2018} }
@article{DBLP:journals/jise/DouWMW18, author = {Yunqi Dou and Jiang Weng and Chuangui Ma and Fushan Wei}, title = {Revisiting the Expansion Length of Triple-base Number System for Elliptic Curve Scalar Multiplication}, journal = {J. Inf. Sci. Eng.}, volume = {34}, number = {3}, pages = {721--732}, year = {2018} }
@article{DBLP:journals/ppna/MiaoMLLSW18, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Zhiquan Liu and Limin Shen and Fushan Wei}, title = {{VMKDO:} Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {2}, pages = {287--297}, year = {2018} }
@article{DBLP:journals/ppna/MiaoMLLZW18, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Zhiquan Liu and Junwei Zhang and Fushan Wei}, title = {{DOAS:} Efficient data owner authorized search over encrypted cloud data}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {3}, pages = {349--360}, year = {2018} }
@article{DBLP:journals/sj/0001MW18, author = {Qi Jiang and Jianfeng Ma and Fushan Wei}, title = {On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {2}, pages = {2039--2042}, year = {2018} }
@article{DBLP:journals/wicomm/ZhangXW18, author = {Ke Zhang and Kai Xu and Fushan Wei}, title = {A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on {ECC} for Wireless Sensor Networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {2484268:1--2484268:9}, year = {2018} }
@article{DBLP:journals/wicomm/LiLZWW18, author = {Wenting Li and Bin Li and Yiming Zhao and Ping Wang and Fushan Wei}, title = {Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {8539674:1--8539674:11}, year = {2018} }
@article{DBLP:journals/artmed/ZhangSWLS17, author = {Ruijie Zhang and Jian Shen and Fushan Wei and Xiong Li and Arun Kumar Sangaiah}, title = {Medical image classification based on multi-scale non-negative sparse coding}, journal = {Artif. Intell. Medicine}, volume = {83}, pages = {44--51}, year = {2017} }
@article{DBLP:journals/chinaf/WeiMZMW17, author = {Fushan Wei and Jianfeng Ma and Ruijie Zhang and Chuangui Ma and Xu An Wang}, title = {An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {7}, pages = {72103}, year = {2017} }
@article{DBLP:journals/ijsnet/ShenSLWL17, author = {Jian Shen and Jun Shen and Xiong Li and Fushan Wei and Jiguo Li}, title = {Outsourced data modification algorithm with assistance of multi-assistants in cloud computing}, journal = {Int. J. Sens. Networks}, volume = {24}, number = {1}, pages = {62--73}, year = {2017} }
@article{DBLP:journals/iotj/ShenMLWM17, author = {Limin Shen and Jianfeng Ma and Ximeng Liu and Fushan Wei and Meixia Miao}, title = {A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {2}, pages = {546--554}, year = {2017} }
@article{DBLP:journals/jise/WeiJZM17, author = {Fushan Wei and Qi Jiang and Ruijie Zhang and Chuangui Ma}, title = {A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {4}, pages = {907--921}, year = {2017} }
@article{DBLP:journals/ppna/MiaoMWLWL17, author = {Yinbin Miao and Jianfeng Ma and Fushan Wei and Zhiquan Liu and Xu An Wang and Cunbo Lu}, title = {{VCSE:} Verifiable conjunctive keywords search over encrypted data without secure-channel}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {4}, pages = {995--1007}, year = {2017} }
@article{DBLP:journals/soco/DouWMW17, author = {Yunqi Dou and Jiang Weng and Chuangui Ma and Fushan Wei}, title = {Secure and efficient {ECC} speeding up algorithms for wireless sensor networks}, journal = {Soft Comput.}, volume = {21}, number = {19}, pages = {5665--5673}, year = {2017} }
@inproceedings{DBLP:conf/cisc/YinMLSZMW17, author = {Jun Yin and Chuyan Ma and Lijun Lyu and Jian Song and Guang Zeng and Chuangui Ma and Fushan Wei}, title = {Improved Cryptanalysis of an {ISO} Standard Lightweight Block Cipher with Refined {MILP} Modelling}, booktitle = {Inscrypt}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {404--426}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/icccsec/DouMLW17, author = {Yunqi Dou and Chuangui Ma and Yanbin Li and Fushan Wei}, title = {An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing}, booktitle = {{ICCCS} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10602}, pages = {542--551}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/spaccs/ZhangCWZ17, author = {Junqi Zhang and Qingfeng Cheng and Fushan Wei and Xinglong Zhang}, title = {A Compact Construction for Non-monotonic Online/Offline {CP-ABE} Scheme}, booktitle = {SpaCCS Workshops}, series = {Lecture Notes in Computer Science}, volume = {10658}, pages = {507--523}, publisher = {Springer}, year = {2017} }
@article{DBLP:journals/cee/WangXCMW16, author = {Xu An Wang and Fatos Xhafa and Weiyi Cai and Jianfeng Ma and Fushan Wei}, title = {Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage}, journal = {Comput. Electr. Eng.}, volume = {56}, pages = {871--883}, year = {2016} }
@article{DBLP:journals/ijnsec/LiJSW16, author = {Guangsong Li and Qi Jiang and Yanan Shi and Fushan Wei}, title = {Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {1}, pages = {193--200}, year = {2016} }
@article{DBLP:journals/ijnsec/WeiWM16, author = {Fushan Wei and Yun Wei and Chuangui Ma}, title = {Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {2}, pages = {393--396}, year = {2016} }
@article{DBLP:journals/itc/WeiMJSM16, author = {Fushan Wei and Jianfeng Ma and Qi Jiang and Jian Shen and Chuangui Ma}, title = {Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks}, journal = {Inf. Technol. Control.}, volume = {45}, number = {1}, pages = {62--70}, year = {2016} }
@article{DBLP:journals/jms/MiaoMLWLW16, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Fushan Wei and Zhiquan Liu and Xu An Wang}, title = {m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting}, journal = {J. Medical Syst.}, volume = {40}, number = {11}, pages = {246:1--246:12}, year = {2016} }
@article{DBLP:journals/jnca/JiangMWTSY16, author = {Qi Jiang and Jianfeng Ma and Fushan Wei and Youliang Tian and Jian Shen and Yuanyuan Yang}, title = {An untraceable temporal-credential-based two-factor authentication scheme using {ECC} for wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {76}, pages = {37--48}, year = {2016} }
@inproceedings{DBLP:conf/3pgcic/XiaoGWM16, author = {Siyu Xiao and Aijun Ge and Fushan Wei and Chuangui Ma}, title = {Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe}, booktitle = {3PGCIC}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {1}, pages = {115--122}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/bwcca/WeiZS16, author = {Fushan Wei and Ruijie Zhang and Jian Shen}, title = {A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption}, booktitle = {{BWCCA}}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {2}, pages = {849--855}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/icccsec/WeiZM16, author = {Fushan Wei and Ruijie Zhang and Chuangui Ma}, title = {Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction}, booktitle = {{ICCCS} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {377--388}, year = {2016} }
@inproceedings{DBLP:conf/icccsec/ShenSLWL16, author = {Jian Shen and Jun Shen and Xiong Li and Fushan Wei and Jiguo Li}, title = {Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing}, booktitle = {{ICCCS} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {389--408}, year = {2016} }
@article{DBLP:journals/ijdsn/ChenWM15, author = {Lei Chen and Fushan Wei and Chuangui Ma}, title = {A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {704502:1--704502:10}, year = {2015} }
@article{DBLP:journals/ijes/WeiMML15, author = {Fushan Wei and Jianfeng Ma and Chuangui Ma and Xinghua Li}, title = {A two-factor authenticated key exchange protocol based on {RSA} with dynamic passwords}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {257--265}, year = {2015} }
@article{DBLP:journals/itc/WeiMGLM15, author = {Fushan Wei and Jianfeng Ma and Aijun Ge and Guangsong Li and Chuangui Ma}, title = {A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems}, journal = {Inf. Technol. Control.}, volume = {44}, number = {2}, pages = {195--206}, year = {2015} }
@article{DBLP:journals/wpc/LiJWM15, author = {Guangsong Li and Qi Jiang and Fushan Wei and Chuangui Ma}, title = {A New Privacy-Aware Handover Authentication Scheme for Wireless Networks}, journal = {Wirel. Pers. Commun.}, volume = {80}, number = {2}, pages = {581--589}, year = {2015} }
@inproceedings{DBLP:conf/bwcca/DouWMW15, author = {Yunqi Dou and Jiang Weng and Chuangui Ma and Fushan Wei}, title = {Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications}, booktitle = {{BWCCA}}, pages = {426--431}, publisher = {{IEEE} Computer Society}, year = {2015} }
@inproceedings{DBLP:conf/globecom/LiLWMY15, author = {Xinghua Li and Hai Liu and Fushan Wei and Jianfeng Ma and Weidong Yang}, title = {A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks}, booktitle = {{GLOBECOM}}, pages = {1--6}, publisher = {{IEEE}}, year = {2015} }
@inproceedings{DBLP:conf/ispec/TianWM15, author = {Baoping Tian and Fushan Wei and Chuangui Ma}, title = {Strongly Secure Key Exchange Protocol with Minimal {KEM}}, booktitle = {{ISPEC}}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {139--153}, publisher = {Springer}, year = {2015} }
@article{DBLP:journals/ijon/ZhangWL14a, author = {Ruijie Zhang and Fushan Wei and Bicheng Li}, title = {{E2LSH} based multiple kernel approach for object detection}, journal = {Neurocomputing}, volume = {124}, pages = {105--110}, year = {2014} }
@inproceedings{DBLP:conf/intrust/TianWM14, author = {Baoping Tian and Fushan Wei and Chuangui Ma}, title = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over {RSA} Group}, booktitle = {{INTRUST}}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {407--421}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/secrypt/WeiWM14, author = {Yun Wei and Fushan Wei and Chuangui Ma}, title = {Certificateless Non-Interactive Key Exchange Protocol without Pairings}, booktitle = {{SECRYPT}}, pages = {31--42}, publisher = {SciTePress}, year = {2014} }
@article{DBLP:journals/ieicet/WeiZM13, author = {Fushan Wei and Zhenfeng Zhang and Chuangui Ma}, title = {Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {9}, pages = {1864--1871}, year = {2013} }
@inproceedings{DBLP:conf/incos/MaWG13, author = {Chuangui Ma and Fushan Wei and Fengxiu Gao}, title = {Efficient Client-to-Client Password Authenticated Key Exchange Based on {RSA}}, booktitle = {INCoS}, pages = {233--238}, publisher = {{IEEE}}, year = {2013} }
@article{DBLP:journals/jss/WeiZM12, author = {Fushan Wei and Zhenfeng Zhang and Chuangui Ma}, title = {Gateway-oriented password-authenticated key exchange protocol in the standard model}, journal = {J. Syst. Softw.}, volume = {85}, number = {3}, pages = {760--768}, year = {2012} }
@article{DBLP:journals/jss/WeiZM12a, author = {Fushan Wei and Zhenfeng Zhang and Chuangui Ma}, title = {Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" {[J.} Syst. Softw. 85 (March {(3))} {(2012)} 760-768]}, journal = {J. Syst. Softw.}, volume = {85}, number = {9}, pages = {2192}, year = {2012} }
@article{DBLP:journals/adt/ChengMW11, author = {Qingfeng Cheng and Chuangui Ma and Fushan Wei}, title = {Analysis and improvement of a new authenticated group key agreement in a mobile environment}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {66}, number = {5-6}, pages = {331--337}, year = {2011} }
@article{DBLP:journals/ejwcn/WeiMC11, author = {Fushan Wei and Chuangui Ma and Qingfeng Cheng}, title = {Anonymous gateway-oriented password-based authenticated key exchange based on {RSA}}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, pages = {162}, year = {2011} }
@inproceedings{DBLP:conf/provsec/WeiMZ11, author = {Fushan Wei and Chuangui Ma and Zhenfeng Zhang}, title = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security}, booktitle = {ProvSec}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {366--379}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/cisc/LiuWM10, author = {Ying Liu and Fushan Wei and Chuangui Ma}, title = {Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting}, booktitle = {Inscrypt}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {255--267}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/icica/WeiMC10, author = {Fushan Wei and Chuangui Ma and Qingfeng Cheng}, title = {Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings}, booktitle = {{ICICA} {(LNCS)}}, series = {Lecture Notes in Computer Science}, volume = {6377}, pages = {135--142}, publisher = {Springer}, year = {2010} }
@article{DBLP:journals/iacr/ChengMW10, author = {Qingfeng Cheng and Chuangui Ma and Fushan Wei}, title = {A modified eCK model with stronger security for tripartite authenticated key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2010} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.