Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fushan Wei
@inproceedings{DBLP:conf/cisc/ChengZCW23, author = {Qingfeng Cheng and Chunzhi Zhao and Jinzheng Cao and Fushan Wei}, editor = {Chunpeng Ge and Moti Yung}, title = {Improved Herrmann-May's Attack with Merging Variables and Lower {LLL} Bound}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {209--229}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_12}, doi = {10.1007/978-981-97-0945-8\_12}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChengZCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SongZW23, author = {Yuhan Song and Yuefei Zhu and Fushan Wei}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {590--607}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_35}, doi = {10.1007/978-981-99-7356-9\_35}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/SongZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SongWZZ22, author = {Yuhan Song and Fushan Wei and Kaijie Zhu and Yuefei Zhu}, title = {Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {3794--3809}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3215006}, doi = {10.1109/TNSM.2022.3215006}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SongWZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/MaMKWSA22, author = {Xindi Ma and Jianfeng Ma and Saru Kumari and Fushan Wei and Mohammad Shojafar and Mamoun Alazab}, title = {Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {45:1--45:24}, year = {2022}, url = {https://doi.org/10.1145/3426969}, doi = {10.1145/3426969}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/MaMKWSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/LiGLWL22, author = {Ji Li and Chunxiang Gu and Luan Luan and Fushan Wei and Wenfen Liu}, editor = {Sharief Oteafy and Eyuphan Bulut and Florian Tschorsch}, title = {Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning}, booktitle = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton, AB, Canada, September 26-29, 2022}, pages = {371--374}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LCN53696.2022.9843450}, doi = {10.1109/LCN53696.2022.9843450}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/LiGLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WeiVKZC21, author = {Fushan Wei and Pandi Vijayakumar and Neeraj Kumar and Ruijie Zhang and Qingfeng Cheng}, title = {Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {7}, pages = {5599--5606}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3031486}, doi = {10.1109/JIOT.2020.3031486}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WeiVKZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/GuoGCLW21, author = {Jiaxing Guo and Chunxiang Gu and Xi Chen and Siqi Lu and Fushan Wei}, title = {Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations}, journal = {Inf. Technol. Control.}, volume = {50}, number = {3}, pages = {570--587}, year = {2021}, url = {https://doi.org/10.5755/j01.itc.50.3.27844}, doi = {10.5755/J01.ITC.50.3.27844}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/GuoGCLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenWG21, author = {Binjie Chen and Fushan Wei and Chunxiang Gu}, title = {Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6643763:1--6643763:10}, year = {2021}, url = {https://doi.org/10.1155/2021/6643763}, doi = {10.1155/2021/6643763}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuGCW21, author = {Xinyi Hu and Chunxiang Gu and Yihang Chen and Fushan Wei}, title = {{CBD:} {A} Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method}, journal = {Sensors}, volume = {21}, number = {24}, pages = {8231}, year = {2021}, url = {https://doi.org/10.3390/s21248231}, doi = {10.3390/S21248231}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HuGCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WeiZVKH21, author = {Fushan Wei and Sherali Zeadally and Pandi Vijayakumar and Neeraj Kumar and Debiao He}, title = {An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {3939--3951}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.2998775}, doi = {10.1109/TITS.2020.2998775}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/WeiZVKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccci/HuGCW21, author = {Xinyi Hu and Chunxiang Gu and Yihang Chen and Fushan Wei}, title = {tCLD-Net: {A} Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network}, booktitle = {International Conference on Communications, Computing, Cybersecurity, and Informatics, {CCCI} 2021, Beijing, China, October 15-17, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CCCI52664.2021.9583214}, doi = {10.1109/CCCI52664.2021.9583214}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccci/HuGCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZYWW20, author = {Ding Wang and Peichang Zhang and Zeyu Yang and Fushan Wei and Cheng Wang}, title = {A Novel Estimator for {TDOA} and {FDOA} Positioning of Multiple Disjoint Sources in the Presence of Calibration Emitters}, journal = {{IEEE} Access}, volume = {8}, pages = {1613--1643}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2959235}, doi = {10.1109/ACCESS.2019.2959235}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZYWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShenLSWX20, author = {Jian Shen and Dengzhi Liu and Xingming Sun and Fushan Wei and Yang Xiang}, title = {Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities}, journal = {Future Gener. Comput. Syst.}, volume = {109}, pages = {450--456}, year = {2020}, url = {https://doi.org/10.1016/j.future.2018.10.049}, doi = {10.1016/J.FUTURE.2018.10.049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ShenLSWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/ZhangKOW20, author = {Hui Zhang and Saru Kumari and Mohammad S. Obaidat and Fushan S. Wei}, title = {Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing}, journal = {{IET} Commun.}, volume = {14}, number = {15}, pages = {2427--2433}, year = {2020}, url = {https://doi.org/10.1049/iet-com.2019.1009}, doi = {10.1049/IET-COM.2019.1009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/ZhangKOW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/YeGJWZM20, author = {Ziwei Ye and Yuanbo Guo and Ankang Ju and Fushan Wei and Ruijie Zhang and Jun Ma}, title = {A Risk Analysis Framework for Social Engineering Attack Based on User Profiling}, journal = {J. Organ. End User Comput.}, volume = {32}, number = {3}, pages = {37--49}, year = {2020}, url = {https://doi.org/10.4018/JOEUC.2020070104}, doi = {10.4018/JOEUC.2020070104}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joeuc/YeGJWZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mssp/YangWYW20, author = {Zeyu Yang and Ding Wang and Bin Yang and Fushan Wei}, title = {Robust Direct position determination against sensor gain and phase errors with the use of calibration sources}, journal = {Multidimens. Syst. Signal Process.}, volume = {31}, number = {4}, pages = {1435--1468}, year = {2020}, url = {https://doi.org/10.1007/s11045-020-00716-1}, doi = {10.1007/S11045-020-00716-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mssp/YangWYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/WeiVJZ20, author = {Fushan Wei and Pandi Vijayakumar and Qi Jiang and Ruijie Zhang}, title = {A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {5}, number = {2}, pages = {268--278}, year = {2020}, url = {https://doi.org/10.1109/TSUSC.2018.2817657}, doi = {10.1109/TSUSC.2018.2817657}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/WeiVJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/GuoLGCW20, author = {Jiaxing Guo and Siqi Lu and Chunxiang Gu and Xi Chen and Fushan Wei}, title = {Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things}, booktitle = {International Conference on Networking and Network Applications, NaNA 2020, Haikou City, China, December 10-13, 2020}, pages = {233--240}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NaNA51271.2020.00047}, doi = {10.1109/NANA51271.2020.00047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nana/GuoLGCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoGCW19, author = {Jiaxing Guo and Chunxiang Gu and Xi Chen and Fushan Wei}, title = {Model Learning and Model Checking of IPSec Implementations for Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {171322--171332}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2956062}, doi = {10.1109/ACCESS.2019.2956062}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GuoGCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/WangYZJW19, author = {Ding Wang and Jiexin Yin and Tao Zhang and Changgui Jia and Fushan Wei}, title = {Iterative constrained weighted least squares estimator for {TDOA} and {FDOA} positioning of multiple disjoint sources in the presence of sensor position and velocity uncertainties}, journal = {Digit. Signal Process.}, volume = {92}, pages = {179--205}, year = {2019}, url = {https://doi.org/10.1016/j.dsp.2019.06.001}, doi = {10.1016/J.DSP.2019.06.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/WangYZJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/WangYCJW19, author = {Ding Wang and Jiexin Yin and Xin Chen and Changgui Jia and Fushan Wei}, title = {On the use of calibration emitters for {TDOA} source localization in the presence of synchronization clock bias and sensor location errors}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2019}, pages = {37}, year = {2019}, url = {https://doi.org/10.1186/s13634-019-0629-1}, doi = {10.1186/S13634-019-0629-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/WangYCJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/0001QMMCW19, author = {Qi Jiang and Yuanyuan Qian and Jianfeng Ma and XinDi Ma and Qingfeng Cheng and Fushan Wei}, title = {User centric three-factor authentication protocol for cloud-assisted wearable devices}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/dac.3900}, doi = {10.1002/DAC.3900}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/0001QMMCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blocksys/LiGWC19, author = {Ji Li and Chunxiang Gu and Fushan Wei and Xi Chen}, editor = {Zibin Zheng and Hong{-}Ning Dai and Mingdong Tang and Xiangping Chen}, title = {A Survey on Blockchain Anomaly Detection Using Data Mining Techniques}, booktitle = {Blockchain and Trustworthy Systems - First International Conference, BlockSys 2019, Guangzhou, China, December 7-8, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1156}, pages = {491--504}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-2777-7\_40}, doi = {10.1007/978-981-15-2777-7\_40}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blocksys/LiGWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/WeiVSZL18, author = {Fushan Wei and Pandi Vijayakumar and Jian Shen and Ruijie Zhang and Li Li}, title = {A provably secure password-based anonymous authentication scheme for wireless body area networks}, journal = {Comput. Electr. Eng.}, volume = {65}, pages = {322--331}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2017.04.017}, doi = {10.1016/J.COMPELECENG.2017.04.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/WeiVSZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/WeiKHY18, author = {Fushan Wei and Neeraj Kumar and Debiao He and Sang{-}Soo Yeo}, title = {A general compiler for password-authenticated group key exchange protocol in the standard model}, journal = {Discret. Appl. Math.}, volume = {241}, pages = {78--86}, year = {2018}, url = {https://doi.org/10.1016/j.dam.2016.04.007}, doi = {10.1016/J.DAM.2016.04.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/WeiKHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/WeiZM18, author = {Fushan Wei and Ruijie Zhang and Chuangui Ma}, title = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing}, journal = {Fundam. Informaticae}, volume = {157}, number = {1-2}, pages = {201--220}, year = {2018}, url = {https://doi.org/10.3233/FI-2018-1626}, doi = {10.3233/FI-2018-1626}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/WeiZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/MiaoMWZL18, author = {Yinbin Miao and Jianfeng Ma and Fushan Wei and Kai Zhang and Zhiquan Liu}, title = {{VKSE-DO:} verifiable keyword search over encrypted data for dynamic data-owner}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {12}, number = {1}, pages = {39--48}, year = {2018}, url = {https://doi.org/10.1504/IJHPCN.2018.10015026}, doi = {10.1504/IJHPCN.2018.10015026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/MiaoMWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShenZWSX18, author = {Jian Shen and Tianqi Zhou and Fushan Wei and Xingming Sun and Yang Xiang}, title = {Privacy-Preserving and Lightweight Key Agreement Protocol for {V2G} in the Social Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {2526--2536}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2017.2775248}, doi = {10.1109/JIOT.2017.2775248}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ShenZWSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/DouWMW18, author = {Yunqi Dou and Jiang Weng and Chuangui Ma and Fushan Wei}, title = {Revisiting the Expansion Length of Triple-base Number System for Elliptic Curve Scalar Multiplication}, journal = {J. Inf. Sci. Eng.}, volume = {34}, number = {3}, pages = {721--732}, year = {2018}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=162\_2144}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/DouWMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/MiaoMLLSW18, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Zhiquan Liu and Limin Shen and Fushan Wei}, title = {{VMKDO:} Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {2}, pages = {287--297}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0487-7}, doi = {10.1007/S12083-016-0487-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/MiaoMLLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/MiaoMLLZW18, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Zhiquan Liu and Junwei Zhang and Fushan Wei}, title = {{DOAS:} Efficient data owner authorized search over encrypted cloud data}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {3}, pages = {349--360}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0523-7}, doi = {10.1007/S12083-016-0523-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/MiaoMLLZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/0001MW18, author = {Qi Jiang and Jianfeng Ma and Fushan Wei}, title = {On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {2}, pages = {2039--2042}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2016.2574719}, doi = {10.1109/JSYST.2016.2574719}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/0001MW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ZhangXW18, author = {Ke Zhang and Kai Xu and Fushan Wei}, title = {A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on {ECC} for Wireless Sensor Networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {2484268:1--2484268:9}, year = {2018}, url = {https://doi.org/10.1155/2018/2484268}, doi = {10.1155/2018/2484268}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ZhangXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiLZWW18, author = {Wenting Li and Bin Li and Yiming Zhao and Ping Wang and Fushan Wei}, title = {Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {8539674:1--8539674:11}, year = {2018}, url = {https://doi.org/10.1155/2018/8539674}, doi = {10.1155/2018/8539674}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LiLZWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/artmed/ZhangSWLS17, author = {Ruijie Zhang and Jian Shen and Fushan Wei and Xiong Li and Arun Kumar Sangaiah}, title = {Medical image classification based on multi-scale non-negative sparse coding}, journal = {Artif. Intell. Medicine}, volume = {83}, pages = {44--51}, year = {2017}, url = {https://doi.org/10.1016/j.artmed.2017.05.006}, doi = {10.1016/J.ARTMED.2017.05.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/artmed/ZhangSWLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WeiMZMW17, author = {Fushan Wei and Jianfeng Ma and Ruijie Zhang and Chuangui Ma and Xu An Wang}, title = {An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {7}, pages = {72103}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-5535-7}, doi = {10.1007/S11432-016-5535-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WeiMZMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/ShenSLWL17, author = {Jian Shen and Jun Shen and Xiong Li and Fushan Wei and Jiguo Li}, title = {Outsourced data modification algorithm with assistance of multi-assistants in cloud computing}, journal = {Int. J. Sens. Networks}, volume = {24}, number = {1}, pages = {62--73}, year = {2017}, url = {https://doi.org/10.1504/IJSNET.2017.10005205}, doi = {10.1504/IJSNET.2017.10005205}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/ShenSLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShenMLWM17, author = {Limin Shen and Jianfeng Ma and Ximeng Liu and Fushan Wei and Meixia Miao}, title = {A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {2}, pages = {546--554}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2016.2557487}, doi = {10.1109/JIOT.2016.2557487}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ShenMLWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WeiJZM17, author = {Fushan Wei and Qi Jiang and Ruijie Zhang and Chuangui Ma}, title = {A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {4}, pages = {907--921}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2049}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WeiJZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/MiaoMWLWL17, author = {Yinbin Miao and Jianfeng Ma and Fushan Wei and Zhiquan Liu and Xu An Wang and Cunbo Lu}, title = {{VCSE:} Verifiable conjunctive keywords search over encrypted data without secure-channel}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {4}, pages = {995--1007}, year = {2017}, url = {https://doi.org/10.1007/s12083-016-0458-z}, doi = {10.1007/S12083-016-0458-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/MiaoMWLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/DouWMW17, author = {Yunqi Dou and Jiang Weng and Chuangui Ma and Fushan Wei}, title = {Secure and efficient {ECC} speeding up algorithms for wireless sensor networks}, journal = {Soft Comput.}, volume = {21}, number = {19}, pages = {5665--5673}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2142-x}, doi = {10.1007/S00500-016-2142-X}, timestamp = {Mon, 02 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/DouWMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YinMLSZMW17, author = {Jun Yin and Chuyan Ma and Lijun Lyu and Jian Song and Guang Zeng and Chuangui Ma and Fushan Wei}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {Improved Cryptanalysis of an {ISO} Standard Lightweight Block Cipher with Refined {MILP} Modelling}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {404--426}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_24}, doi = {10.1007/978-3-319-75160-3\_24}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YinMLSZMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DouMLW17, author = {Yunqi Dou and Chuangui Ma and Yanbin Li and Fushan Wei}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10602}, pages = {542--551}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68505-2\_47}, doi = {10.1007/978-3-319-68505-2\_47}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DouMLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/ZhangCWZ17, author = {Junqi Zhang and Qingfeng Cheng and Fushan Wei and Xinglong Zhang}, editor = {Guojun Wang and Mohammed Atiquzzaman and Zheng Yan and Kim{-}Kwang Raymond Choo}, title = {A Compact Construction for Non-monotonic Online/Offline {CP-ABE} Scheme}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10658}, pages = {507--523}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72395-2\_47}, doi = {10.1007/978-3-319-72395-2\_47}, timestamp = {Tue, 03 Mar 2020 16:31:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/ZhangCWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/WangXCMW16, author = {Xu An Wang and Fatos Xhafa and Weiyi Cai and Jianfeng Ma and Fushan Wei}, title = {Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage}, journal = {Comput. Electr. Eng.}, volume = {56}, pages = {871--883}, year = {2016}, url = {https://doi.org/10.1016/j.compeleceng.2016.05.012}, doi = {10.1016/J.COMPELECENG.2016.05.012}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/WangXCMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiJSW16, author = {Guangsong Li and Qi Jiang and Yanan Shi and Fushan Wei}, title = {Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {1}, pages = {193--200}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n1/ijns-2016-v18-n1-p193-200.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiJSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WeiWM16, author = {Fushan Wei and Yun Wei and Chuangui Ma}, title = {Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {2}, pages = {393--396}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p393-396.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WeiWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/WeiMJSM16, author = {Fushan Wei and Jianfeng Ma and Qi Jiang and Jian Shen and Chuangui Ma}, title = {Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks}, journal = {Inf. Technol. Control.}, volume = {45}, number = {1}, pages = {62--70}, year = {2016}, url = {https://doi.org/10.5755/j01.itc.45.1.11949}, doi = {10.5755/J01.ITC.45.1.11949}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/WeiMJSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MiaoMLWLW16, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Fushan Wei and Zhiquan Liu and Xu An Wang}, title = {m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting}, journal = {J. Medical Syst.}, volume = {40}, number = {11}, pages = {246:1--246:12}, year = {2016}, url = {https://doi.org/10.1007/s10916-016-0617-z}, doi = {10.1007/S10916-016-0617-Z}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/MiaoMLWLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangMWTSY16, author = {Qi Jiang and Jianfeng Ma and Fushan Wei and Youliang Tian and Jian Shen and Yuanyuan Yang}, title = {An untraceable temporal-credential-based two-factor authentication scheme using {ECC} for wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {76}, pages = {37--48}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.10.001}, doi = {10.1016/J.JNCA.2016.10.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JiangMWTSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/XiaoGWM16, author = {Siyu Xiao and Aijun Ge and Fushan Wei and Chuangui Ma}, editor = {Fatos Xhafa and Leonard Barolli and Flora Amato}, title = {Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe}, booktitle = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan, South Korea, November 5-7, 2016}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {1}, pages = {115--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49109-7\_11}, doi = {10.1007/978-3-319-49109-7\_11}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/XiaoGWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/WeiZS16, author = {Fushan Wei and Ruijie Zhang and Jian Shen}, editor = {Leonard Barolli and Fatos Xhafa and Kangbin Yim}, title = {A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption}, booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {2}, pages = {849--855}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49106-6\_87}, doi = {10.1007/978-3-319-49106-6\_87}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/WeiZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WeiZM16, author = {Fushan Wei and Ruijie Zhang and Chuangui Ma}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {377--388}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_34}, doi = {10.1007/978-3-319-48671-0\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WeiZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenSLWL16, author = {Jian Shen and Jun Shen and Xiong Li and Fushan Wei and Jiguo Li}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {389--408}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_35}, doi = {10.1007/978-3-319-48671-0\_35}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShenSLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ChenWM15, author = {Lei Chen and Fushan Wei and Chuangui Ma}, title = {A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {704502:1--704502:10}, year = {2015}, url = {https://doi.org/10.1155/2015/704502}, doi = {10.1155/2015/704502}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ChenWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/WeiMML15, author = {Fushan Wei and Jianfeng Ma and Chuangui Ma and Xinghua Li}, title = {A two-factor authenticated key exchange protocol based on {RSA} with dynamic passwords}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {257--265}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072366}, doi = {10.1504/IJES.2015.072366}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/WeiMML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/WeiMGLM15, author = {Fushan Wei and Jianfeng Ma and Aijun Ge and Guangsong Li and Chuangui Ma}, title = {A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems}, journal = {Inf. Technol. Control.}, volume = {44}, number = {2}, pages = {195--206}, year = {2015}, url = {https://doi.org/10.5755/j01.itc.44.2.8197}, doi = {10.5755/J01.ITC.44.2.8197}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/WeiMGLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiJWM15, author = {Guangsong Li and Qi Jiang and Fushan Wei and Chuangui Ma}, title = {A New Privacy-Aware Handover Authentication Scheme for Wireless Networks}, journal = {Wirel. Pers. Commun.}, volume = {80}, number = {2}, pages = {581--589}, year = {2015}, url = {https://doi.org/10.1007/s11277-014-2029-z}, doi = {10.1007/S11277-014-2029-Z}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiJWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/DouWMW15, author = {Yunqi Dou and Jiang Weng and Chuangui Ma and Fushan Wei}, editor = {Leonard Barolli and Fatos Xhafa and Marek R. Ogiela and Lidia Ogiela}, title = {Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications}, booktitle = {10th International Conference on Broadband and Wireless Computing, Communication and Applications, {BWCCA} 2015, Krakow, Poland, November 4-6, 2015}, pages = {426--431}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BWCCA.2015.24}, doi = {10.1109/BWCCA.2015.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/DouWMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiLWMY15, author = {Xinghua Li and Hai Liu and Fushan Wei and Jianfeng Ma and Weidong Yang}, title = {A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417584}, doi = {10.1109/GLOCOM.2014.7417584}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiLWMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TianWM15, author = {Baoping Tian and Fushan Wei and Chuangui Ma}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Strongly Secure Key Exchange Protocol with Minimal {KEM}}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {139--153}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_10}, doi = {10.1007/978-3-319-17533-1\_10}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TianWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhangWL14a, author = {Ruijie Zhang and Fushan Wei and Bicheng Li}, title = {{E2LSH} based multiple kernel approach for object detection}, journal = {Neurocomputing}, volume = {124}, pages = {105--110}, year = {2014}, url = {https://doi.org/10.1016/j.neucom.2013.07.027}, doi = {10.1016/J.NEUCOM.2013.07.027}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhangWL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/TianWM14, author = {Baoping Tian and Fushan Wei and Chuangui Ma}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over {RSA} Group}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {407--421}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_26}, doi = {10.1007/978-3-319-27998-5\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/TianWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WeiWM14, author = {Yun Wei and Fushan Wei and Chuangui Ma}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Certificateless Non-Interactive Key Exchange Protocol without Pairings}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {31--42}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509472/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WeiWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WeiZM13, author = {Fushan Wei and Zhenfeng Zhang and Chuangui Ma}, title = {Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {9}, pages = {1864--1871}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1864}, doi = {10.1587/TRANSFUN.E96.A.1864}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WeiZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/MaWG13, author = {Chuangui Ma and Fushan Wei and Fengxiu Gao}, title = {Efficient Client-to-Client Password Authenticated Key Exchange Based on {RSA}}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {233--238}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.41}, doi = {10.1109/INCOS.2013.41}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/MaWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WeiZM12, author = {Fushan Wei and Zhenfeng Zhang and Chuangui Ma}, title = {Gateway-oriented password-authenticated key exchange protocol in the standard model}, journal = {J. Syst. Softw.}, volume = {85}, number = {3}, pages = {760--768}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.09.061}, doi = {10.1016/J.JSS.2011.09.061}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/WeiZM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WeiZM12a, author = {Fushan Wei and Zhenfeng Zhang and Chuangui Ma}, title = {Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" {[J.} Syst. Softw. 85 (March {(3))} {(2012)} 760-768]}, journal = {J. Syst. Softw.}, volume = {85}, number = {9}, pages = {2192}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2012.05.070}, doi = {10.1016/J.JSS.2012.05.070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/WeiZM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/ChengMW11, author = {Qingfeng Cheng and Chuangui Ma and Fushan Wei}, title = {Analysis and improvement of a new authenticated group key agreement in a mobile environment}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {66}, number = {5-6}, pages = {331--337}, year = {2011}, url = {https://doi.org/10.1007/s12243-010-0213-z}, doi = {10.1007/S12243-010-0213-Z}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/ChengMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/WeiMC11, author = {Fushan Wei and Chuangui Ma and Qingfeng Cheng}, title = {Anonymous gateway-oriented password-based authenticated key exchange based on {RSA}}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, pages = {162}, year = {2011}, url = {https://doi.org/10.1186/1687-1499-2011-162}, doi = {10.1186/1687-1499-2011-162}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/WeiMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WeiMZ11, author = {Fushan Wei and Chuangui Ma and Zhenfeng Zhang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {366--379}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_26}, doi = {10.1007/978-3-642-24316-5\_26}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WeiMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuWM10, author = {Ying Liu and Fushan Wei and Chuangui Ma}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {255--267}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_18}, doi = {10.1007/978-3-642-21518-6\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icica/WeiMC10, author = {Fushan Wei and Chuangui Ma and Qingfeng Cheng}, editor = {Rongbo Zhu and Yanchun Zhang and Baoxiang Liu and Chunfeng Liu}, title = {Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings}, booktitle = {Information Computing and Applications - First International Conference, {ICICA} 2010, Tangshan, China, October 15-18, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6377}, pages = {135--142}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16167-4\_18}, doi = {10.1007/978-3-642-16167-4\_18}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icica/WeiMC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengMW10, author = {Qingfeng Cheng and Chuangui Ma and Fushan Wei}, title = {A modified eCK model with stronger security for tripartite authenticated key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2010}, url = {http://eprint.iacr.org/2010/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.