BibTeX records: Fushan Wei

download as .bib file

@inproceedings{DBLP:conf/cisc/ChengZCW23,
  author       = {Qingfeng Cheng and
                  Chunzhi Zhao and
                  Jinzheng Cao and
                  Fushan Wei},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Improved Herrmann-May's Attack with Merging Variables and Lower {LLL}
                  Bound},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {209--229},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_12},
  doi          = {10.1007/978-981-97-0945-8\_12},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ChengZCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SongZW23,
  author       = {Yuhan Song and
                  Yuefei Zhu and
                  Fushan Wei},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based
                  Cryptocurrency Transactions},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {590--607},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_35},
  doi          = {10.1007/978-981-99-7356-9\_35},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/SongZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SongWZZ22,
  author       = {Yuhan Song and
                  Fushan Wei and
                  Kaijie Zhu and
                  Yuefei Zhu},
  title        = {Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme
                  for Blockchain in a Privacy-Preserving Manner},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {3794--3809},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3215006},
  doi          = {10.1109/TNSM.2022.3215006},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SongWZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/MaMKWSA22,
  author       = {Xindi Ma and
                  Jianfeng Ma and
                  Saru Kumari and
                  Fushan Wei and
                  Mohammad Shojafar and
                  Mamoun Alazab},
  title        = {Privacy-Preserving Distributed Multi-Task Learning against Inference
                  Attack in Cloud Computing},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {2},
  pages        = {45:1--45:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3426969},
  doi          = {10.1145/3426969},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/MaMKWSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/LiGLWL22,
  author       = {Ji Li and
                  Chunxiang Gu and
                  Luan Luan and
                  Fushan Wei and
                  Wenfen Liu},
  editor       = {Sharief Oteafy and
                  Eyuphan Bulut and
                  Florian Tschorsch},
  title        = {Few-Shot Open-Set Traffic Classification Based on Self-Supervised
                  Learning},
  booktitle    = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton,
                  AB, Canada, September 26-29, 2022},
  pages        = {371--374},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCN53696.2022.9843450},
  doi          = {10.1109/LCN53696.2022.9843450},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/LiGLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WeiVKZC21,
  author       = {Fushan Wei and
                  Pandi Vijayakumar and
                  Neeraj Kumar and
                  Ruijie Zhang and
                  Qingfeng Cheng},
  title        = {Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity
                  for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {7},
  pages        = {5599--5606},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3031486},
  doi          = {10.1109/JIOT.2020.3031486},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WeiVKZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/GuoGCLW21,
  author       = {Jiaxing Guo and
                  Chunxiang Gu and
                  Xi Chen and
                  Siqi Lu and
                  Fushan Wei},
  title        = {Automated State-Machine-Based Analysis of Hostname Verification in
                  IPsec Implementations},
  journal      = {Inf. Technol. Control.},
  volume       = {50},
  number       = {3},
  pages        = {570--587},
  year         = {2021},
  url          = {https://doi.org/10.5755/j01.itc.50.3.27844},
  doi          = {10.5755/J01.ITC.50.3.27844},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/GuoGCLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenWG21,
  author       = {Binjie Chen and
                  Fushan Wei and
                  Chunxiang Gu},
  title        = {Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6643763:1--6643763:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6643763},
  doi          = {10.1155/2021/6643763},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenWG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuGCW21,
  author       = {Xinyi Hu and
                  Chunxiang Gu and
                  Yihang Chen and
                  Fushan Wei},
  title        = {{CBD:} {A} Deep-Learning-Based Scheme for Encrypted Traffic Classification
                  with a General Pre-Training Method},
  journal      = {Sensors},
  volume       = {21},
  number       = {24},
  pages        = {8231},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21248231},
  doi          = {10.3390/S21248231},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HuGCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WeiZVKH21,
  author       = {Fushan Wei and
                  Sherali Zeadally and
                  Pandi Vijayakumar and
                  Neeraj Kumar and
                  Debiao He},
  title        = {An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit
                  Authentication Protocol for Internet of Connected Vehicles},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {3939--3951},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.2998775},
  doi          = {10.1109/TITS.2020.2998775},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/WeiZVKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccci/HuGCW21,
  author       = {Xinyi Hu and
                  Chunxiang Gu and
                  Yihang Chen and
                  Fushan Wei},
  title        = {tCLD-Net: {A} Transfer Learning Internet Encrypted Traffic Classification
                  Scheme Based on Convolution Neural Network and Long Short-Term Memory
                  Network},
  booktitle    = {International Conference on Communications, Computing, Cybersecurity,
                  and Informatics, {CCCI} 2021, Beijing, China, October 15-17, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CCCI52664.2021.9583214},
  doi          = {10.1109/CCCI52664.2021.9583214},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccci/HuGCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZYWW20,
  author       = {Ding Wang and
                  Peichang Zhang and
                  Zeyu Yang and
                  Fushan Wei and
                  Cheng Wang},
  title        = {A Novel Estimator for {TDOA} and {FDOA} Positioning of Multiple Disjoint
                  Sources in the Presence of Calibration Emitters},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {1613--1643},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2959235},
  doi          = {10.1109/ACCESS.2019.2959235},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangZYWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShenLSWX20,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xingming Sun and
                  Fushan Wei and
                  Yang Xiang},
  title        = {Efficient cloud-aided verifiable secret sharing scheme with batch
                  verification for smart cities},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {109},
  pages        = {450--456},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2018.10.049},
  doi          = {10.1016/J.FUTURE.2018.10.049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShenLSWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/ZhangKOW20,
  author       = {Hui Zhang and
                  Saru Kumari and
                  Mohammad S. Obaidat and
                  Fushan S. Wei},
  title        = {Gateway-oriented two-server password authenticated key exchange protocol
                  for unmanned aerial vehicles in mobile edge computing},
  journal      = {{IET} Commun.},
  volume       = {14},
  number       = {15},
  pages        = {2427--2433},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-com.2019.1009},
  doi          = {10.1049/IET-COM.2019.1009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/ZhangKOW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/YeGJWZM20,
  author       = {Ziwei Ye and
                  Yuanbo Guo and
                  Ankang Ju and
                  Fushan Wei and
                  Ruijie Zhang and
                  Jun Ma},
  title        = {A Risk Analysis Framework for Social Engineering Attack Based on User
                  Profiling},
  journal      = {J. Organ. End User Comput.},
  volume       = {32},
  number       = {3},
  pages        = {37--49},
  year         = {2020},
  url          = {https://doi.org/10.4018/JOEUC.2020070104},
  doi          = {10.4018/JOEUC.2020070104},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joeuc/YeGJWZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mssp/YangWYW20,
  author       = {Zeyu Yang and
                  Ding Wang and
                  Bin Yang and
                  Fushan Wei},
  title        = {Robust Direct position determination against sensor gain and phase
                  errors with the use of calibration sources},
  journal      = {Multidimens. Syst. Signal Process.},
  volume       = {31},
  number       = {4},
  pages        = {1435--1468},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11045-020-00716-1},
  doi          = {10.1007/S11045-020-00716-1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mssp/YangWYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/WeiVJZ20,
  author       = {Fushan Wei and
                  Pandi Vijayakumar and
                  Qi Jiang and
                  Ruijie Zhang},
  title        = {A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange
                  Protocol for Roaming Service in Global Mobility Networks},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {268--278},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSUSC.2018.2817657},
  doi          = {10.1109/TSUSC.2018.2817657},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/WeiVJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/GuoLGCW20,
  author       = {Jiaxing Guo and
                  Siqi Lu and
                  Chunxiang Gu and
                  Xi Chen and
                  Fushan Wei},
  title        = {Security Analysis and Design of Authentication Key Agreement Protocol
                  in Medical Internet of Things},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2020, Haikou City, China, December 10-13, 2020},
  pages        = {233--240},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NaNA51271.2020.00047},
  doi          = {10.1109/NANA51271.2020.00047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nana/GuoLGCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoGCW19,
  author       = {Jiaxing Guo and
                  Chunxiang Gu and
                  Xi Chen and
                  Fushan Wei},
  title        = {Model Learning and Model Checking of IPSec Implementations for Internet
                  of Things},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {171322--171332},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2956062},
  doi          = {10.1109/ACCESS.2019.2956062},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GuoGCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WangYZJW19,
  author       = {Ding Wang and
                  Jiexin Yin and
                  Tao Zhang and
                  Changgui Jia and
                  Fushan Wei},
  title        = {Iterative constrained weighted least squares estimator for {TDOA}
                  and {FDOA} positioning of multiple disjoint sources in the presence
                  of sensor position and velocity uncertainties},
  journal      = {Digit. Signal Process.},
  volume       = {92},
  pages        = {179--205},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.dsp.2019.06.001},
  doi          = {10.1016/J.DSP.2019.06.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/WangYZJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/WangYCJW19,
  author       = {Ding Wang and
                  Jiexin Yin and
                  Xin Chen and
                  Changgui Jia and
                  Fushan Wei},
  title        = {On the use of calibration emitters for {TDOA} source localization
                  in the presence of synchronization clock bias and sensor location
                  errors},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2019},
  pages        = {37},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13634-019-0629-1},
  doi          = {10.1186/S13634-019-0629-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/WangYCJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/0001QMMCW19,
  author       = {Qi Jiang and
                  Yuanyuan Qian and
                  Jianfeng Ma and
                  XinDi Ma and
                  Qingfeng Cheng and
                  Fushan Wei},
  title        = {User centric three-factor authentication protocol for cloud-assisted
                  wearable devices},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3900},
  doi          = {10.1002/DAC.3900},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/0001QMMCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blocksys/LiGWC19,
  author       = {Ji Li and
                  Chunxiang Gu and
                  Fushan Wei and
                  Xi Chen},
  editor       = {Zibin Zheng and
                  Hong{-}Ning Dai and
                  Mingdong Tang and
                  Xiangping Chen},
  title        = {A Survey on Blockchain Anomaly Detection Using Data Mining Techniques},
  booktitle    = {Blockchain and Trustworthy Systems - First International Conference,
                  BlockSys 2019, Guangzhou, China, December 7-8, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1156},
  pages        = {491--504},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-2777-7\_40},
  doi          = {10.1007/978-981-15-2777-7\_40},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blocksys/LiGWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WeiVSZL18,
  author       = {Fushan Wei and
                  Pandi Vijayakumar and
                  Jian Shen and
                  Ruijie Zhang and
                  Li Li},
  title        = {A provably secure password-based anonymous authentication scheme for
                  wireless body area networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {65},
  pages        = {322--331},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2017.04.017},
  doi          = {10.1016/J.COMPELECENG.2017.04.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/WeiVSZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/WeiKHY18,
  author       = {Fushan Wei and
                  Neeraj Kumar and
                  Debiao He and
                  Sang{-}Soo Yeo},
  title        = {A general compiler for password-authenticated group key exchange protocol
                  in the standard model},
  journal      = {Discret. Appl. Math.},
  volume       = {241},
  pages        = {78--86},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.dam.2016.04.007},
  doi          = {10.1016/J.DAM.2016.04.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/WeiKHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WeiZM18,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Chuangui Ma},
  title        = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange
                  Protocol for Cloud Computing},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {201--220},
  year         = {2018},
  url          = {https://doi.org/10.3233/FI-2018-1626},
  doi          = {10.3233/FI-2018-1626},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/WeiZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/MiaoMWZL18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Fushan Wei and
                  Kai Zhang and
                  Zhiquan Liu},
  title        = {{VKSE-DO:} verifiable keyword search over encrypted data for dynamic
                  data-owner},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {12},
  number       = {1},
  pages        = {39--48},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJHPCN.2018.10015026},
  doi          = {10.1504/IJHPCN.2018.10015026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/MiaoMWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenZWSX18,
  author       = {Jian Shen and
                  Tianqi Zhou and
                  Fushan Wei and
                  Xingming Sun and
                  Yang Xiang},
  title        = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G}
                  in the Social Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {2526--2536},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2017.2775248},
  doi          = {10.1109/JIOT.2017.2775248},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenZWSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/DouWMW18,
  author       = {Yunqi Dou and
                  Jiang Weng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Revisiting the Expansion Length of Triple-base Number System for Elliptic
                  Curve Scalar Multiplication},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {34},
  number       = {3},
  pages        = {721--732},
  year         = {2018},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=162\_2144},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/DouWMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMLLSW18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Zhiquan Liu and
                  Limin Shen and
                  Fushan Wei},
  title        = {{VMKDO:} Verifiable multi-keyword search over encrypted cloud data
                  for dynamic data-owner},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {2},
  pages        = {287--297},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0487-7},
  doi          = {10.1007/S12083-016-0487-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/MiaoMLLSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMLLZW18,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Zhiquan Liu and
                  Junwei Zhang and
                  Fushan Wei},
  title        = {{DOAS:} Efficient data owner authorized search over encrypted cloud
                  data},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {3},
  pages        = {349--360},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0523-7},
  doi          = {10.1007/S12083-016-0523-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/MiaoMLLZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/0001MW18,
  author       = {Qi Jiang and
                  Jianfeng Ma and
                  Fushan Wei},
  title        = {On the Security of a Privacy-Aware Authentication Scheme for Distributed
                  Mobile Cloud Computing Services},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {2},
  pages        = {2039--2042},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2016.2574719},
  doi          = {10.1109/JSYST.2016.2574719},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/0001MW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangXW18,
  author       = {Ke Zhang and
                  Kai Xu and
                  Fushan Wei},
  title        = {A Provably Secure Anonymous Authenticated Key Exchange Protocol Based
                  on {ECC} for Wireless Sensor Networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {2484268:1--2484268:9},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2484268},
  doi          = {10.1155/2018/2484268},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhangXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiLZWW18,
  author       = {Wenting Li and
                  Bin Li and
                  Yiming Zhao and
                  Ping Wang and
                  Fushan Wei},
  title        = {Cryptanalysis and Security Enhancement of Three Authentication Schemes
                  in Wireless Sensor Networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {8539674:1--8539674:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8539674},
  doi          = {10.1155/2018/8539674},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiLZWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/ZhangSWLS17,
  author       = {Ruijie Zhang and
                  Jian Shen and
                  Fushan Wei and
                  Xiong Li and
                  Arun Kumar Sangaiah},
  title        = {Medical image classification based on multi-scale non-negative sparse
                  coding},
  journal      = {Artif. Intell. Medicine},
  volume       = {83},
  pages        = {44--51},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.artmed.2017.05.006},
  doi          = {10.1016/J.ARTMED.2017.05.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/artmed/ZhangSWLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WeiMZMW17,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Ruijie Zhang and
                  Chuangui Ma and
                  Xu An Wang},
  title        = {An efficient and practical threshold gateway-oriented password-authenticated
                  key exchange protocol in the standard model},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {7},
  pages        = {72103},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-5535-7},
  doi          = {10.1007/S11432-016-5535-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WeiMZMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ShenSLWL17,
  author       = {Jian Shen and
                  Jun Shen and
                  Xiong Li and
                  Fushan Wei and
                  Jiguo Li},
  title        = {Outsourced data modification algorithm with assistance of multi-assistants
                  in cloud computing},
  journal      = {Int. J. Sens. Networks},
  volume       = {24},
  number       = {1},
  pages        = {62--73},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSNET.2017.10005205},
  doi          = {10.1504/IJSNET.2017.10005205},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/ShenSLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenMLWM17,
  author       = {Limin Shen and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Fushan Wei and
                  Meixia Miao},
  title        = {A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {2},
  pages        = {546--554},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2016.2557487},
  doi          = {10.1109/JIOT.2016.2557487},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenMLWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WeiJZM17,
  author       = {Fushan Wei and
                  Qi Jiang and
                  Ruijie Zhang and
                  Chuangui Ma},
  title        = {A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol
                  with Provable Security for Cloud Computing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {4},
  pages        = {907--921},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2049},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WeiJZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MiaoMWLWL17,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Fushan Wei and
                  Zhiquan Liu and
                  Xu An Wang and
                  Cunbo Lu},
  title        = {{VCSE:} Verifiable conjunctive keywords search over encrypted data
                  without secure-channel},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {4},
  pages        = {995--1007},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12083-016-0458-z},
  doi          = {10.1007/S12083-016-0458-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/MiaoMWLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/DouWMW17,
  author       = {Yunqi Dou and
                  Jiang Weng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Secure and efficient {ECC} speeding up algorithms for wireless sensor
                  networks},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {19},
  pages        = {5665--5673},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2142-x},
  doi          = {10.1007/S00500-016-2142-X},
  timestamp    = {Mon, 02 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/DouWMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YinMLSZMW17,
  author       = {Jun Yin and
                  Chuyan Ma and
                  Lijun Lyu and
                  Jian Song and
                  Guang Zeng and
                  Chuangui Ma and
                  Fushan Wei},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Improved Cryptanalysis of an {ISO} Standard Lightweight Block Cipher
                  with Refined {MILP} Modelling},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {404--426},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_24},
  doi          = {10.1007/978-3-319-75160-3\_24},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YinMLSZMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/DouMLW17,
  author       = {Yunqi Dou and
                  Chuangui Ma and
                  Yanbin Li and
                  Fushan Wei},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication
                  on Koblitz Curves for Cloud Computing},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10602},
  pages        = {542--551},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68505-2\_47},
  doi          = {10.1007/978-3-319-68505-2\_47},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/DouMLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ZhangCWZ17,
  author       = {Junqi Zhang and
                  Qingfeng Cheng and
                  Fushan Wei and
                  Xinglong Zhang},
  editor       = {Guojun Wang and
                  Mohammed Atiquzzaman and
                  Zheng Yan and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Compact Construction for Non-monotonic Online/Offline {CP-ABE} Scheme},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
                  12-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10658},
  pages        = {507--523},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72395-2\_47},
  doi          = {10.1007/978-3-319-72395-2\_47},
  timestamp    = {Tue, 03 Mar 2020 16:31:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/ZhangCWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WangXCMW16,
  author       = {Xu An Wang and
                  Fatos Xhafa and
                  Weiyi Cai and
                  Jianfeng Ma and
                  Fushan Wei},
  title        = {Efficient privacy preserving predicate encryption with fine-grained
                  searchable capability for Cloud storage},
  journal      = {Comput. Electr. Eng.},
  volume       = {56},
  pages        = {871--883},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.05.012},
  doi          = {10.1016/J.COMPELECENG.2016.05.012},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/WangXCMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiJSW16,
  author       = {Guangsong Li and
                  Qi Jiang and
                  Yanan Shi and
                  Fushan Wei},
  title        = {Anonymous Network Information Acquirement Protocol for Mobile Users
                  in Heterogeneous Wireless Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {193--200},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p193-200.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiJSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiWM16,
  author       = {Fushan Wei and
                  Yun Wei and
                  Chuangui Ma},
  title        = {Attack on An ID-based Authenticated Group Key Exchange Protocol with
                  Identifying Malicious Participants},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {393--396},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p393-396.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WeiWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/WeiMJSM16,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Qi Jiang and
                  Jian Shen and
                  Chuangui Ma},
  title        = {Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication
                  Scheme in Wireless Sensor Networks},
  journal      = {Inf. Technol. Control.},
  volume       = {45},
  number       = {1},
  pages        = {62--70},
  year         = {2016},
  url          = {https://doi.org/10.5755/j01.itc.45.1.11949},
  doi          = {10.5755/J01.ITC.45.1.11949},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/WeiMJSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MiaoMLWLW16,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Fushan Wei and
                  Zhiquan Liu and
                  Xu An Wang},
  title        = {m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal
                  Health Records in Multi-Owner Setting},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {11},
  pages        = {246:1--246:12},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-016-0617-z},
  doi          = {10.1007/S10916-016-0617-Z},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/MiaoMLWLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiangMWTSY16,
  author       = {Qi Jiang and
                  Jianfeng Ma and
                  Fushan Wei and
                  Youliang Tian and
                  Jian Shen and
                  Yuanyuan Yang},
  title        = {An untraceable temporal-credential-based two-factor authentication
                  scheme using {ECC} for wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {76},
  pages        = {37--48},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.001},
  doi          = {10.1016/J.JNCA.2016.10.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/JiangMWTSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/XiaoGWM16,
  author       = {Siyu Xiao and
                  Aijun Ge and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Flora Amato},
  title        = {Ciphertext-Policy Attribute Based Encryption with Large Attribute
                  Universe},
  booktitle    = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings
                  of the 11th International Conference on P2P, Parallel, Grid, Cloud
                  and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan,
                  South Korea, November 5-7, 2016},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {1},
  pages        = {115--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49109-7\_11},
  doi          = {10.1007/978-3-319-49109-7\_11},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/3pgcic/XiaoGWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/WeiZS16,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Jian Shen},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Kangbin Yim},
  title        = {A Provably Secure Two-Factor Authenticated Key Exchange Protocol for
                  Wireless Sensor Networks Based on Authenticated Encryption},
  booktitle    = {Advances on Broad-Band Wireless Computing, Communication and Applications,
                  Proceedings of the 11th International Conference On Broad-Band Wireless
                  Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
                  University, Asan, Korea, November 5-7, 2016},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {2},
  pages        = {849--855},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49106-6\_87},
  doi          = {10.1007/978-3-319-49106-6\_87},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/WeiZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WeiZM16,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Chuangui Ma},
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {Two Factor Authenticated Key Exchange Protocol for Wireless Sensor
                  Networks: Formal Model and Secure Construction},
  booktitle    = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {377--388},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48671-0\_34},
  doi          = {10.1007/978-3-319-48671-0\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WeiZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShenSLWL16,
  author       = {Jian Shen and
                  Jun Shen and
                  Xiong Li and
                  Fushan Wei and
                  Jiguo Li},
  editor       = {Xingming Sun and
                  Alex X. Liu and
                  Han{-}Chieh Chao and
                  Elisa Bertino},
  title        = {Outsourced Data Modification Algorithm with Assistance of Multi-assistants
                  in Cloud Computing},
  booktitle    = {Cloud Computing and Security - Second International Conference, {ICCCS}
                  2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10039},
  pages        = {389--408},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48671-0\_35},
  doi          = {10.1007/978-3-319-48671-0\_35},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShenSLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ChenWM15,
  author       = {Lei Chen and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {A Secure User Authentication Scheme against Smart-Card Loss Attack
                  for Wireless Sensor Networks Using Symmetric Key Techniques},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {704502:1--704502:10},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/704502},
  doi          = {10.1155/2015/704502},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ChenWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WeiMML15,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Chuangui Ma and
                  Xinghua Li},
  title        = {A two-factor authenticated key exchange protocol based on {RSA} with
                  dynamic passwords},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {257--265},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072366},
  doi          = {10.1504/IJES.2015.072366},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/WeiMML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/WeiMGLM15,
  author       = {Fushan Wei and
                  Jianfeng Ma and
                  Aijun Ge and
                  Guangsong Li and
                  Chuangui Ma},
  title        = {A Provably Secure Three-Party Password Authenticated Key Exchange
                  Protocol without Using Server's Public-Keys and Symmetric Cryptosystems},
  journal      = {Inf. Technol. Control.},
  volume       = {44},
  number       = {2},
  pages        = {195--206},
  year         = {2015},
  url          = {https://doi.org/10.5755/j01.itc.44.2.8197},
  doi          = {10.5755/J01.ITC.44.2.8197},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/WeiMGLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiJWM15,
  author       = {Guangsong Li and
                  Qi Jiang and
                  Fushan Wei and
                  Chuangui Ma},
  title        = {A New Privacy-Aware Handover Authentication Scheme for Wireless Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {80},
  number       = {2},
  pages        = {581--589},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-014-2029-z},
  doi          = {10.1007/S11277-014-2029-Z},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiJWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/DouWMW15,
  author       = {Yunqi Dou and
                  Jiang Weng and
                  Chuangui Ma and
                  Fushan Wei},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {Fast Scalar Multiplication Algorithm Using Constrained Triple-Base
                  Number System and Its Applications},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {426--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.24},
  doi          = {10.1109/BWCCA.2015.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/DouWMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiLWMY15,
  author       = {Xinghua Li and
                  Hai Liu and
                  Fushan Wei and
                  Jianfeng Ma and
                  Weidong Yang},
  title        = {A Lightweight Anonymous Authentication Protocol Using k-Pseudonym
                  Set in Wireless Networks},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417584},
  doi          = {10.1109/GLOCOM.2014.7417584},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiLWMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TianWM15,
  author       = {Baoping Tian and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Strongly Secure Key Exchange Protocol with Minimal {KEM}},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_10},
  doi          = {10.1007/978-3-319-17533-1\_10},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TianWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhangWL14a,
  author       = {Ruijie Zhang and
                  Fushan Wei and
                  Bicheng Li},
  title        = {{E2LSH} based multiple kernel approach for object detection},
  journal      = {Neurocomputing},
  volume       = {124},
  pages        = {105--110},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.neucom.2013.07.027},
  doi          = {10.1016/J.NEUCOM.2013.07.027},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhangWL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/TianWM14,
  author       = {Baoping Tian and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol
                  over {RSA} Group},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {407--421},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_26},
  doi          = {10.1007/978-3-319-27998-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/TianWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WeiWM14,
  author       = {Yun Wei and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Certificateless Non-Interactive Key Exchange Protocol without Pairings},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {31--42},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509472/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WeiWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WeiZM13,
  author       = {Fushan Wei and
                  Zhenfeng Zhang and
                  Chuangui Ma},
  title        = {Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based
                  Authenticated Key Exchange Protocol},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {9},
  pages        = {1864--1871},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1864},
  doi          = {10.1587/TRANSFUN.E96.A.1864},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WeiZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MaWG13,
  author       = {Chuangui Ma and
                  Fushan Wei and
                  Fengxiu Gao},
  title        = {Efficient Client-to-Client Password Authenticated Key Exchange Based
                  on {RSA}},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {233--238},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.41},
  doi          = {10.1109/INCOS.2013.41},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/MaWG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WeiZM12,
  author       = {Fushan Wei and
                  Zhenfeng Zhang and
                  Chuangui Ma},
  title        = {Gateway-oriented password-authenticated key exchange protocol in the
                  standard model},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {3},
  pages        = {760--768},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.09.061},
  doi          = {10.1016/J.JSS.2011.09.061},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/WeiZM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WeiZM12a,
  author       = {Fushan Wei and
                  Zhenfeng Zhang and
                  Chuangui Ma},
  title        = {Corrigendum to "Gateway-oriented password-authenticated key exchange
                  protocol in the standard model" {[J.} Syst. Softw. 85 (March
                  {(3))} {(2012)} 760-768]},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {9},
  pages        = {2192},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2012.05.070},
  doi          = {10.1016/J.JSS.2012.05.070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/WeiZM12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ChengMW11,
  author       = {Qingfeng Cheng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {Analysis and improvement of a new authenticated group key agreement
                  in a mobile environment},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {66},
  number       = {5-6},
  pages        = {331--337},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12243-010-0213-z},
  doi          = {10.1007/S12243-010-0213-Z},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ChengMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/WeiMC11,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Qingfeng Cheng},
  title        = {Anonymous gateway-oriented password-based authenticated key exchange
                  based on {RSA}},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2011},
  pages        = {162},
  year         = {2011},
  url          = {https://doi.org/10.1186/1687-1499-2011-162},
  doi          = {10.1186/1687-1499-2011-162},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/WeiMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WeiMZ11,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Zhenfeng Zhang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with
                  Stronger Security},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {366--379},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_26},
  doi          = {10.1007/978-3-642-24316-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WeiMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuWM10,
  author       = {Ying Liu and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Multi-Factor Authenticated Key Exchange Protocol in the Three-Party
                  Setting},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_18},
  doi          = {10.1007/978-3-642-21518-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icica/WeiMC10,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Qingfeng Cheng},
  editor       = {Rongbo Zhu and
                  Yanchun Zhang and
                  Baoxiang Liu and
                  Chunfeng Liu},
  title        = {Three-Party Password-Based Authenticated Key Exchange Protocol Based
                  on Bilinear Pairings},
  booktitle    = {Information Computing and Applications - First International Conference,
                  {ICICA} 2010, Tangshan, China, October 15-18, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6377},
  pages        = {135--142},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16167-4\_18},
  doi          = {10.1007/978-3-642-16167-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icica/WeiMC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengMW10,
  author       = {Qingfeng Cheng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {A modified eCK model with stronger security for tripartite authenticated
                  key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics