BibTeX records: Fushan Wei

download as .bib file

@inproceedings{DBLP:conf/cisc/ChengZCW23,
  author       = {Qingfeng Cheng and
                  Chunzhi Zhao and
                  Jinzheng Cao and
                  Fushan Wei},
  title        = {Improved Herrmann-May's Attack with Merging Variables and Lower {LLL}
                  Bound},
  booktitle    = {Inscrypt {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {209--229},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/icics/SongZW23,
  author       = {Yuhan Song and
                  Yuefei Zhu and
                  Fushan Wei},
  title        = {Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based
                  Cryptocurrency Transactions},
  booktitle    = {{ICICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {590--607},
  publisher    = {Springer},
  year         = {2023}
}
@article{DBLP:journals/tnsm/SongWZZ22,
  author       = {Yuhan Song and
                  Fushan Wei and
                  Kaijie Zhu and
                  Yuefei Zhu},
  title        = {Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme
                  for Blockchain in a Privacy-Preserving Manner},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {3794--3809},
  year         = {2022}
}
@article{DBLP:journals/toit/MaMKWSA22,
  author       = {Xindi Ma and
                  Jianfeng Ma and
                  Saru Kumari and
                  Fushan Wei and
                  Mohammad Shojafar and
                  Mamoun Alazab},
  title        = {Privacy-Preserving Distributed Multi-Task Learning against Inference
                  Attack in Cloud Computing},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {2},
  pages        = {45:1--45:24},
  year         = {2022}
}
@inproceedings{DBLP:conf/lcn/LiGLWL22,
  author       = {Ji Li and
                  Chunxiang Gu and
                  Luan Luan and
                  Fushan Wei and
                  Wenfen Liu},
  title        = {Few-Shot Open-Set Traffic Classification Based on Self-Supervised
                  Learning},
  booktitle    = {{LCN}},
  pages        = {371--374},
  publisher    = {{IEEE}},
  year         = {2022}
}
@article{DBLP:journals/iotj/WeiVKZC21,
  author       = {Fushan Wei and
                  Pandi Vijayakumar and
                  Neeraj Kumar and
                  Ruijie Zhang and
                  Qingfeng Cheng},
  title        = {Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity
                  for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {7},
  pages        = {5599--5606},
  year         = {2021}
}
@article{DBLP:journals/itc/GuoGCLW21,
  author       = {Jiaxing Guo and
                  Chunxiang Gu and
                  Xi Chen and
                  Siqi Lu and
                  Fushan Wei},
  title        = {Automated State-Machine-Based Analysis of Hostname Verification in
                  IPsec Implementations},
  journal      = {Inf. Technol. Control.},
  volume       = {50},
  number       = {3},
  pages        = {570--587},
  year         = {2021}
}
@article{DBLP:journals/scn/ChenWG21,
  author       = {Binjie Chen and
                  Fushan Wei and
                  Chunxiang Gu},
  title        = {Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6643763:1--6643763:10},
  year         = {2021}
}
@article{DBLP:journals/sensors/HuGCW21,
  author       = {Xinyi Hu and
                  Chunxiang Gu and
                  Yihang Chen and
                  Fushan Wei},
  title        = {{CBD:} {A} Deep-Learning-Based Scheme for Encrypted Traffic Classification
                  with a General Pre-Training Method},
  journal      = {Sensors},
  volume       = {21},
  number       = {24},
  pages        = {8231},
  year         = {2021}
}
@article{DBLP:journals/tits/WeiZVKH21,
  author       = {Fushan Wei and
                  Sherali Zeadally and
                  Pandi Vijayakumar and
                  Neeraj Kumar and
                  Debiao He},
  title        = {An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit
                  Authentication Protocol for Internet of Connected Vehicles},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {3939--3951},
  year         = {2021}
}
@inproceedings{DBLP:conf/ccci/HuGCW21,
  author       = {Xinyi Hu and
                  Chunxiang Gu and
                  Yihang Chen and
                  Fushan Wei},
  title        = {tCLD-Net: {A} Transfer Learning Internet Encrypted Traffic Classification
                  Scheme Based on Convolution Neural Network and Long Short-Term Memory
                  Network},
  booktitle    = {{CCCI}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021}
}
@article{DBLP:journals/access/WangZYWW20,
  author       = {Ding Wang and
                  Peichang Zhang and
                  Zeyu Yang and
                  Fushan Wei and
                  Cheng Wang},
  title        = {A Novel Estimator for {TDOA} and {FDOA} Positioning of Multiple Disjoint
                  Sources in the Presence of Calibration Emitters},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {1613--1643},
  year         = {2020}
}
@article{DBLP:journals/fgcs/ShenLSWX20,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xingming Sun and
                  Fushan Wei and
                  Yang Xiang},
  title        = {Efficient cloud-aided verifiable secret sharing scheme with batch
                  verification for smart cities},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {109},
  pages        = {450--456},
  year         = {2020}
}
@article{DBLP:journals/iet-com/ZhangKOW20,
  author       = {Hui Zhang and
                  Saru Kumari and
                  Mohammad S. Obaidat and
                  Fushan S. Wei},
  title        = {Gateway-oriented two-server password authenticated key exchange protocol
                  for unmanned aerial vehicles in mobile edge computing},
  journal      = {{IET} Commun.},
  volume       = {14},
  number       = {15},
  pages        = {2427--2433},
  year         = {2020}
}
@article{DBLP:journals/joeuc/YeGJWZM20,
  author       = {Ziwei Ye and
                  Yuanbo Guo and
                  Ankang Ju and
                  Fushan Wei and
                  Ruijie Zhang and
                  Jun Ma},
  title        = {A Risk Analysis Framework for Social Engineering Attack Based on User
                  Profiling},
  journal      = {J. Organ. End User Comput.},
  volume       = {32},
  number       = {3},
  pages        = {37--49},
  year         = {2020}
}
@article{DBLP:journals/mssp/YangWYW20,
  author       = {Zeyu Yang and
                  Ding Wang and
                  Bin Yang and
                  Fushan Wei},
  title        = {Robust Direct position determination against sensor gain and phase
                  errors with the use of calibration sources},
  journal      = {Multidimens. Syst. Signal Process.},
  volume       = {31},
  number       = {4},
  pages        = {1435--1468},
  year         = {2020}
}
@article{DBLP:journals/tsusc/WeiVJZ20,
  author       = {Fushan Wei and
                  Pandi Vijayakumar and
                  Qi Jiang and
                  Ruijie Zhang},
  title        = {A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange
                  Protocol for Roaming Service in Global Mobility Networks},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {268--278},
  year         = {2020}
}
@inproceedings{DBLP:conf/nana/GuoLGCW20,
  author       = {Jiaxing Guo and
                  Siqi Lu and
                  Chunxiang Gu and
                  Xi Chen and
                  Fushan Wei},
  title        = {Security Analysis and Design of Authentication Key Agreement Protocol
                  in Medical Internet of Things},
  booktitle    = {NaNA},
  pages        = {233--240},
  publisher    = {{IEEE}},
  year         = {2020}
}
@article{DBLP:journals/access/GuoGCW19,
  author       = {Jiaxing Guo and
                  Chunxiang Gu and
                  Xi Chen and
                  Fushan Wei},
  title        = {Model Learning and Model Checking of IPSec Implementations for Internet
                  of Things},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {171322--171332},
  year         = {2019}
}
@article{DBLP:journals/dsp/WangYZJW19,
  author       = {Ding Wang and
                  Jiexin Yin and
                  Tao Zhang and
                  Changgui Jia and
                  Fushan Wei},
  title        = {Iterative constrained weighted least squares estimator for {TDOA}
                  and {FDOA} positioning of multiple disjoint sources in the presence
                  of sensor position and velocity uncertainties},
  journal      = {Digit. Signal Process.},
  volume       = {92},
  pages        = {179--205},
  year         = {2019}
}
@article{DBLP:journals/ejasp/WangYCJW19,
  author       = {Ding Wang and
                  Jiexin Yin and
                  Xin Chen and
                  Changgui Jia and
                  Fushan Wei},
  title        = {On the use of calibration emitters for {TDOA} source localization
                  in the presence of synchronization clock bias and sensor location
                  errors},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2019},
  pages        = {37},
  year         = {2019}
}
@article{DBLP:journals/ijcomsys/0001QMMCW19,
  author       = {Qi Jiang and
                  Yuanyuan Qian and
                  Jianfeng Ma and
                  XinDi Ma and
                  Qingfeng Cheng and
                  Fushan Wei},
  title        = {User centric three-factor authentication protocol for cloud-assisted
                  wearable devices},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {6},
  year         = {2019}
}
@inproceedings{DBLP:conf/blocksys/LiGWC19,
  author       = {Ji Li and
                  Chunxiang Gu and
                  Fushan Wei and
                  Xi Chen},
  title        = {A Survey on Blockchain Anomaly Detection Using Data Mining Techniques},
  booktitle    = {BlockSys},
  series       = {Communications in Computer and Information Science},
  volume       = {1156},
  pages        = {491--504},
  publisher    = {Springer},
  year         = {2019}
}
@article{DBLP:journals/cee/WeiVSZL18,
  author       = {Fushan Wei and
                  Pandi Vijayakumar and
                  Jian Shen and
                  Ruijie Zhang and
                  Li Li},
  title        = {A provably secure password-based anonymous authentication scheme for
                  wireless body area networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {65},
  pages        = {322--331},
  year         = {2018}
}
@article{DBLP:journals/dam/WeiKHY18,
  author       = {Fushan Wei and
                  Neeraj Kumar and
                  Debiao He and
                  Sang{-}Soo Yeo},
  title        = {A general compiler for password-authenticated group key exchange protocol
                  in the standard model},
  journal      = {Discret. Appl. Math.},
  volume       = {241},
  pages        = {78--86},
  year         = {2018}
}
@article{DBLP:journals/fuin/WeiZM18,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Chuangui Ma},
  title        = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange
                  Protocol for Cloud Computing},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {201--220},
  year         = {2018}
}
@article{DBLP:journals/ijhpcn/MiaoMWZL18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Fushan Wei and
                  Kai Zhang and
                  Zhiquan Liu},
  title        = {{VKSE-DO:} verifiable keyword search over encrypted data for dynamic
                  data-owner},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {12},
  number       = {1},
  pages        = {39--48},
  year         = {2018}
}
@article{DBLP:journals/iotj/ShenZWSX18,
  author       = {Jian Shen and
                  Tianqi Zhou and
                  Fushan Wei and
                  Xingming Sun and
                  Yang Xiang},
  title        = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G}
                  in the Social Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {2526--2536},
  year         = {2018}
}
@article{DBLP:journals/jise/DouWMW18,
  author       = {Yunqi Dou and
                  Jiang Weng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Revisiting the Expansion Length of Triple-base Number System for Elliptic
                  Curve Scalar Multiplication},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {34},
  number       = {3},
  pages        = {721--732},
  year         = {2018}
}
@article{DBLP:journals/ppna/MiaoMLLSW18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Zhiquan Liu and
                  Limin Shen and
                  Fushan Wei},
  title        = {{VMKDO:} Verifiable multi-keyword search over encrypted cloud data
                  for dynamic data-owner},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {2},
  pages        = {287--297},
  year         = {2018}
}
@article{DBLP:journals/ppna/MiaoMLLZW18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Zhiquan Liu and
                  Junwei Zhang and
                  Fushan Wei},
  title        = {{DOAS:} Efficient data owner authorized search over encrypted cloud
                  data},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {3},
  pages        = {349--360},
  year         = {2018}
}
@article{DBLP:journals/sj/0001MW18,
  author       = {Qi Jiang and
                  Jianfeng Ma and
                  Fushan Wei},
  title        = {On the Security of a Privacy-Aware Authentication Scheme for Distributed
                  Mobile Cloud Computing Services},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {2},
  pages        = {2039--2042},
  year         = {2018}
}
@article{DBLP:journals/wicomm/ZhangXW18,
  author       = {Ke Zhang and
                  Kai Xu and
                  Fushan Wei},
  title        = {A Provably Secure Anonymous Authenticated Key Exchange Protocol Based
                  on {ECC} for Wireless Sensor Networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {2484268:1--2484268:9},
  year         = {2018}
}
@article{DBLP:journals/wicomm/LiLZWW18,
  author       = {Wenting Li and
                  Bin Li and
                  Yiming Zhao and
                  Ping Wang and
                  Fushan Wei},
  title        = {Cryptanalysis and Security Enhancement of Three Authentication Schemes
                  in Wireless Sensor Networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {8539674:1--8539674:11},
  year         = {2018}
}
@article{DBLP:journals/artmed/ZhangSWLS17,
  author       = {Ruijie Zhang and
                  Jian Shen and
                  Fushan Wei and
                  Xiong Li and
                  Arun Kumar Sangaiah},
  title        = {Medical image classification based on multi-scale non-negative sparse
                  coding},
  journal      = {Artif. Intell. Medicine},
  volume       = {83},
  pages        = {44--51},
  year         = {2017}
}
@article{DBLP:journals/chinaf/WeiMZMW17,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Ruijie Zhang and
                  Chuangui Ma and
                  Xu An Wang},
  title        = {An efficient and practical threshold gateway-oriented password-authenticated
                  key exchange protocol in the standard model},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {7},
  pages        = {72103},
  year         = {2017}
}
@article{DBLP:journals/ijsnet/ShenSLWL17,
  author       = {Jian Shen and
                  Jun Shen and
                  Xiong Li and
                  Fushan Wei and
                  Jiguo Li},
  title        = {Outsourced data modification algorithm with assistance of multi-assistants
                  in cloud computing},
  journal      = {Int. J. Sens. Networks},
  volume       = {24},
  number       = {1},
  pages        = {62--73},
  year         = {2017}
}
@article{DBLP:journals/iotj/ShenMLWM17,
  author       = {Limin Shen and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Fushan Wei and
                  Meixia Miao},
  title        = {A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {2},
  pages        = {546--554},
  year         = {2017}
}
@article{DBLP:journals/jise/WeiJZM17,
  author       = {Fushan Wei and
                  Qi Jiang and
                  Ruijie Zhang and
                  Chuangui Ma},
  title        = {A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol
                  with Provable Security for Cloud Computing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {4},
  pages        = {907--921},
  year         = {2017}
}
@article{DBLP:journals/ppna/MiaoMWLWL17,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Fushan Wei and
                  Zhiquan Liu and
                  Xu An Wang and
                  Cunbo Lu},
  title        = {{VCSE:} Verifiable conjunctive keywords search over encrypted data
                  without secure-channel},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {4},
  pages        = {995--1007},
  year         = {2017}
}
@article{DBLP:journals/soco/DouWMW17,
  author       = {Yunqi Dou and
                  Jiang Weng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Secure and efficient {ECC} speeding up algorithms for wireless sensor
                  networks},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {19},
  pages        = {5665--5673},
  year         = {2017}
}
@inproceedings{DBLP:conf/cisc/YinMLSZMW17,
  author       = {Jun Yin and
                  Chuyan Ma and
                  Lijun Lyu and
                  Jian Song and
                  Guang Zeng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Improved Cryptanalysis of an {ISO} Standard Lightweight Block Cipher
                  with Refined {MILP} Modelling},
  booktitle    = {Inscrypt},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {404--426},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/icccsec/DouMLW17,
  author       = {Yunqi Dou and
                  Chuangui Ma and
                  Yanbin Li and
                  Fushan Wei},
  title        = {An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication
                  on Koblitz Curves for Cloud Computing},
  booktitle    = {{ICCCS} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10602},
  pages        = {542--551},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/spaccs/ZhangCWZ17,
  author       = {Junqi Zhang and
                  Qingfeng Cheng and
                  Fushan Wei and
                  Xinglong Zhang},
  title        = {A Compact Construction for Non-monotonic Online/Offline {CP-ABE} Scheme},
  booktitle    = {SpaCCS Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {10658},
  pages        = {507--523},
  publisher    = {Springer},
  year         = {2017}
}
@article{DBLP:journals/cee/WangXCMW16,
  author       = {Xu An Wang and
                  Fatos Xhafa and
                  Weiyi Cai and
                  Jianfeng Ma and
                  Fushan Wei},
  title        = {Efficient privacy preserving predicate encryption with fine-grained
                  searchable capability for Cloud storage},
  journal      = {Comput. Electr. Eng.},
  volume       = {56},
  pages        = {871--883},
  year         = {2016}
}
@article{DBLP:journals/ijnsec/LiJSW16,
  author       = {Guangsong Li and
                  Qi Jiang and
                  Yanan Shi and
                  Fushan Wei},
  title        = {Anonymous Network Information Acquirement Protocol for Mobile Users
                  in Heterogeneous Wireless Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {193--200},
  year         = {2016}
}
@article{DBLP:journals/ijnsec/WeiWM16,
  author       = {Fushan Wei and
                  Yun Wei and
                  Chuangui Ma},
  title        = {Attack on An ID-based Authenticated Group Key Exchange Protocol with
                  Identifying Malicious Participants},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {393--396},
  year         = {2016}
}
@article{DBLP:journals/itc/WeiMJSM16,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Qi Jiang and
                  Jian Shen and
                  Chuangui Ma},
  title        = {Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication
                  Scheme in Wireless Sensor Networks},
  journal      = {Inf. Technol. Control.},
  volume       = {45},
  number       = {1},
  pages        = {62--70},
  year         = {2016}
}
@article{DBLP:journals/jms/MiaoMLWLW16,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Fushan Wei and
                  Zhiquan Liu and
                  Xu An Wang},
  title        = {m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal
                  Health Records in Multi-Owner Setting},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {11},
  pages        = {246:1--246:12},
  year         = {2016}
}
@article{DBLP:journals/jnca/JiangMWTSY16,
  author       = {Qi Jiang and
                  Jianfeng Ma and
                  Fushan Wei and
                  Youliang Tian and
                  Jian Shen and
                  Yuanyuan Yang},
  title        = {An untraceable temporal-credential-based two-factor authentication
                  scheme using {ECC} for wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {76},
  pages        = {37--48},
  year         = {2016}
}
@inproceedings{DBLP:conf/3pgcic/XiaoGWM16,
  author       = {Siyu Xiao and
                  Aijun Ge and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {Ciphertext-Policy Attribute Based Encryption with Large Attribute
                  Universe},
  booktitle    = {3PGCIC},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {1},
  pages        = {115--122},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/bwcca/WeiZS16,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Jian Shen},
  title        = {A Provably Secure Two-Factor Authenticated Key Exchange Protocol for
                  Wireless Sensor Networks Based on Authenticated Encryption},
  booktitle    = {{BWCCA}},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {2},
  pages        = {849--855},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/icccsec/WeiZM16,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Chuangui Ma},
  title        = {Two Factor Authenticated Key Exchange Protocol for Wireless Sensor
                  Networks: Formal Model and Secure Construction},
  booktitle    = {{ICCCS} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {377--388},
  year         = {2016}
}
@inproceedings{DBLP:conf/icccsec/ShenSLWL16,
  author       = {Jian Shen and
                  Jun Shen and
                  Xiong Li and
                  Fushan Wei and
                  Jiguo Li},
  title        = {Outsourced Data Modification Algorithm with Assistance of Multi-assistants
                  in Cloud Computing},
  booktitle    = {{ICCCS} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {389--408},
  year         = {2016}
}
@article{DBLP:journals/ijdsn/ChenWM15,
  author       = {Lei Chen and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {A Secure User Authentication Scheme against Smart-Card Loss Attack
                  for Wireless Sensor Networks Using Symmetric Key Techniques},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {704502:1--704502:10},
  year         = {2015}
}
@article{DBLP:journals/ijes/WeiMML15,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Chuangui Ma and
                  Xinghua Li},
  title        = {A two-factor authenticated key exchange protocol based on {RSA} with
                  dynamic passwords},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {257--265},
  year         = {2015}
}
@article{DBLP:journals/itc/WeiMGLM15,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Aijun Ge and
                  Guangsong Li and
                  Chuangui Ma},
  title        = {A Provably Secure Three-Party Password Authenticated Key Exchange
                  Protocol without Using Server's Public-Keys and Symmetric Cryptosystems},
  journal      = {Inf. Technol. Control.},
  volume       = {44},
  number       = {2},
  pages        = {195--206},
  year         = {2015}
}
@article{DBLP:journals/wpc/LiJWM15,
  author       = {Guangsong Li and
                  Qi Jiang and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {A New Privacy-Aware Handover Authentication Scheme for Wireless Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {80},
  number       = {2},
  pages        = {581--589},
  year         = {2015}
}
@inproceedings{DBLP:conf/bwcca/DouWMW15,
  author       = {Yunqi Dou and
                  Jiang Weng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Fast Scalar Multiplication Algorithm Using Constrained Triple-Base
                  Number System and Its Applications},
  booktitle    = {{BWCCA}},
  pages        = {426--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2015}
}
@inproceedings{DBLP:conf/globecom/LiLWMY15,
  author       = {Xinghua Li and
                  Hai Liu and
                  Fushan Wei and
                  Jianfeng Ma and
                  Weidong Yang},
  title        = {A Lightweight Anonymous Authentication Protocol Using k-Pseudonym
                  Set in Wireless Networks},
  booktitle    = {{GLOBECOM}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015}
}
@inproceedings{DBLP:conf/ispec/TianWM15,
  author       = {Baoping Tian and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {Strongly Secure Key Exchange Protocol with Minimal {KEM}},
  booktitle    = {{ISPEC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {2015}
}
@article{DBLP:journals/ijon/ZhangWL14a,
  author       = {Ruijie Zhang and
                  Fushan Wei and
                  Bicheng Li},
  title        = {{E2LSH} based multiple kernel approach for object detection},
  journal      = {Neurocomputing},
  volume       = {124},
  pages        = {105--110},
  year         = {2014}
}
@inproceedings{DBLP:conf/intrust/TianWM14,
  author       = {Baoping Tian and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol
                  over {RSA} Group},
  booktitle    = {{INTRUST}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {407--421},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/secrypt/WeiWM14,
  author       = {Yun Wei and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {Certificateless Non-Interactive Key Exchange Protocol without Pairings},
  booktitle    = {{SECRYPT}},
  pages        = {31--42},
  publisher    = {SciTePress},
  year         = {2014}
}
@article{DBLP:journals/ieicet/WeiZM13,
  author       = {Fushan Wei and
                  Zhenfeng Zhang and
                  Chuangui Ma},
  title        = {Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based
                  Authenticated Key Exchange Protocol},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {9},
  pages        = {1864--1871},
  year         = {2013}
}
@inproceedings{DBLP:conf/incos/MaWG13,
  author       = {Chuangui Ma and
                  Fushan Wei and
                  Fengxiu Gao},
  title        = {Efficient Client-to-Client Password Authenticated Key Exchange Based
                  on {RSA}},
  booktitle    = {INCoS},
  pages        = {233--238},
  publisher    = {{IEEE}},
  year         = {2013}
}
@article{DBLP:journals/jss/WeiZM12,
  author       = {Fushan Wei and
                  Zhenfeng Zhang and
                  Chuangui Ma},
  title        = {Gateway-oriented password-authenticated key exchange protocol in the
                  standard model},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {3},
  pages        = {760--768},
  year         = {2012}
}
@article{DBLP:journals/jss/WeiZM12a,
  author       = {Fushan Wei and
                  Zhenfeng Zhang and
                  Chuangui Ma},
  title        = {Corrigendum to "Gateway-oriented password-authenticated key exchange
                  protocol in the standard model" {[J.} Syst. Softw. 85 (March
                  {(3))} {(2012)} 760-768]},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {9},
  pages        = {2192},
  year         = {2012}
}
@article{DBLP:journals/adt/ChengMW11,
  author       = {Qingfeng Cheng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Analysis and improvement of a new authenticated group key agreement
                  in a mobile environment},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {66},
  number       = {5-6},
  pages        = {331--337},
  year         = {2011}
}
@article{DBLP:journals/ejwcn/WeiMC11,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Qingfeng Cheng},
  title        = {Anonymous gateway-oriented password-based authenticated key exchange
                  based on {RSA}},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2011},
  pages        = {162},
  year         = {2011}
}
@inproceedings{DBLP:conf/provsec/WeiMZ11,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Zhenfeng Zhang},
  title        = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with
                  Stronger Security},
  booktitle    = {ProvSec},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {366--379},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/cisc/LiuWM10,
  author       = {Ying Liu and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {Multi-Factor Authenticated Key Exchange Protocol in the Three-Party
                  Setting},
  booktitle    = {Inscrypt},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/icica/WeiMC10,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Qingfeng Cheng},
  title        = {Three-Party Password-Based Authenticated Key Exchange Protocol Based
                  on Bilinear Pairings},
  booktitle    = {{ICICA} {(LNCS)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6377},
  pages        = {135--142},
  publisher    = {Springer},
  year         = {2010}
}
@article{DBLP:journals/iacr/ChengMW10,
  author       = {Qingfeng Cheng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {A modified eCK model with stronger security for tripartite authenticated
                  key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2010}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics