Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chunguang Ma
@article{DBLP:journals/lgrs/ChenMZL24, author = {Xu Chen and Chunguang Ma and Chaofan Zhao and Yong Luo}, title = {{UAV} Classification Based on Deep Learning Fusion of Multidimensional {UAV} Micro-Doppler Image Features}, journal = {{IEEE} Geosci. Remote. Sens. Lett.}, volume = {21}, pages = {1--5}, year = {2024}, url = {https://doi.org/10.1109/LGRS.2024.3371171}, doi = {10.1109/LGRS.2024.3371171}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lgrs/ChenMZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Li0MGS21, author = {Zengpeng Li and Vishal Sharma and Chunguang Ma and Chunpeng Ge and Willy Susilo}, title = {Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {6}, year = {2021}, url = {https://doi.org/10.1007/s11432-019-2856-8}, doi = {10.1007/S11432-019-2856-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/Li0MGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/LiMW21, author = {Zengpeng Li and Chunguang Ma and Ding Wang}, title = {Leakage Resilient Leveled {\textdollar}{\textbackslash}mathsf \{FHE\}{\textdollar}FHE on Multiple Bits Message}, journal = {{IEEE} Trans. Big Data}, volume = {7}, number = {5}, pages = {845--858}, year = {2021}, url = {https://doi.org/10.1109/TBDATA.2017.2726554}, doi = {10.1109/TBDATA.2017.2726554}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/LiMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SongMZZ20, author = {Lei Song and Chunguang Ma and Guoyin Zhang and Yun Zhang}, title = {Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting}, journal = {{IEEE} Access}, volume = {8}, pages = {143233--143240}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3014264}, doi = {10.1109/ACCESS.2020.3014264}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SongMZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/LiMG20, author = {Juyan Li and Chunguang Ma and Zhen Gu}, title = {Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting}, journal = {Int. J. Found. Comput. Sci.}, volume = {31}, number = {5}, pages = {551--567}, year = {2020}, url = {https://doi.org/10.1142/s0129054120500252}, doi = {10.1142/S0129054120500252}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/LiMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/OuyangMZD20, author = {Weiping Ouyang and Chunguang Ma and Guoyin Zhang and Keming Diao}, title = {Achieving Message-Encapsulated Leveled {FHE} for IoT Privacy Protection}, journal = {Mob. Inf. Syst.}, volume = {2020}, pages = {8862920:1--8862920:10}, year = {2020}, url = {https://doi.org/10.1155/2020/8862920}, doi = {10.1155/2020/8862920}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mis/OuyangMZD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiMW20, author = {Zengpeng Li and Chunguang Ma and Ding Wang}, title = {Achieving Multi-Hop {PRE} via Branching Program}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {1}, pages = {45--58}, year = {2020}, url = {https://doi.org/10.1109/TCC.2017.2764082}, doi = {10.1109/TCC.2017.2764082}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/LiMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangLZM20, author = {Lingling Wang and Xiaodong Lin and Eugene V. Zima and Chunguang Ma}, title = {Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {3}, pages = {2411--2423}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2964526}, doi = {10.1109/TVT.2020.2964526}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/WangLZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/MaBWC20, author = {Chunguang Ma and Hongjun Bei and Chuner Wang and Guihua Chen}, title = {Accelerated Depreciation Tax Credit and Corporate Financialization Based on the {PSM-DID} Model}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {6622900:1--6622900:10}, year = {2020}, url = {https://doi.org/10.1155/2020/6622900}, doi = {10.1155/2020/6622900}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/MaBWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangLQM20, author = {Lingling Wang and Xiaodong Lin and Lijun Qu and Chunguang Ma}, title = {Ring Selection for Ring Signature-Based Privacy Protection in VANETs}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149247}, doi = {10.1109/ICC40277.2020.9149247}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangLQM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiMZY19, author = {Juyan Li and Chunguang Ma and Lei Zhang and Qi Yuan}, title = {Unidirectional {FHPRE} Scheme from Lattice for Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {4}, pages = {592--600}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p592-600.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiMZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lgrs/GuoTZJHM19, author = {Jiyu Guo and Jisheng Tong and Qing Zhao and Jiao Jiao and Jianjian Huo and Chunguang Ma}, title = {An Ultrawide Band Antipodal Vivaldi Antenna for Airborne {GPR} Application}, journal = {{IEEE} Geosci. Remote. Sens. Lett.}, volume = {16}, number = {10}, pages = {1560--1564}, year = {2019}, url = {https://doi.org/10.1109/LGRS.2019.2905013}, doi = {10.1109/LGRS.2019.2905013}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lgrs/GuoTZJHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LiMZ19, author = {Juyan Li and Chunguang Ma and Kejia Zhang}, title = {A Novel Lattice-Based {CP-ABPRE} Scheme for Cloud Sharing}, journal = {Symmetry}, volume = {11}, number = {10}, pages = {1262}, year = {2019}, url = {https://doi.org/10.3390/sym11101262}, doi = {10.3390/SYM11101262}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/LiMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/HuoZZLMGX19, author = {Jianjian Huo and Qing Zhao and Binzhong Zhou and Lanbo Liu and Chunguang Ma and Jiyu Guo and Longhao Xie}, title = {Energy Flow Domain Reverse-Time Migration for Borehole Radar}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {57}, number = {9}, pages = {7221--7231}, year = {2019}, url = {https://doi.org/10.1109/TGRS.2019.2912318}, doi = {10.1109/TGRS.2019.2912318}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/HuoZZLMGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SongMWZ19, author = {Lei Song and Chunguang Ma and Peng Wu and Yun Zhang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {{PPD-DL:} Privacy-Preserving Decentralized Deep Learning}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11632}, pages = {273--282}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24274-9\_24}, doi = {10.1007/978-3-030-24274-9\_24}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SongMWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/LiMZ19, author = {Juyan Li and Chunguang Ma and Kejia Zhang}, editor = {Weizhi Meng and Steven Furnell}, title = {A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing}, booktitle = {Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1095}, pages = {32--46}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0758-8\_3}, doi = {10.1007/978-981-15-0758-8\_3}, timestamp = {Mon, 22 Feb 2021 16:00:52 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/LiMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiMZ18, author = {Zengpeng Li and Chunguang Ma and Hong{-}Sheng Zhou}, title = {Multi-key {FHE} for multi-bit messages}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {2}, pages = {029101:1--029101:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9206-y}, doi = {10.1007/S11432-017-9206-Y}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangKMZS18, author = {Ke{-}Jia Zhang and Leong{-}Chuan Kwek and Chun{-}Guang Ma and Long Zhang and Hong{-}Wei Sun}, title = {Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons}, journal = {Quantum Inf. Process.}, volume = {17}, number = {2}, pages = {38}, year = {2018}, url = {https://doi.org/10.1007/s11128-017-1808-3}, doi = {10.1007/S11128-017-1808-3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangKMZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YuanMYB18, author = {Qi Yuan and Chunguang Ma and Haitao Yu and Xuefen Bian}, title = {A Key Pre-Distribution Scheme Based on \emph{{\(\mathrm{\mu}\)}}-PBIBD for Enhancing Resilience in Wireless Sensor Networks}, journal = {Sensors}, volume = {18}, number = {5}, pages = {1539}, year = {2018}, url = {https://doi.org/10.3390/s18051539}, doi = {10.3390/S18051539}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/YuanMYB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eleot/LiWZMMLS18, author = {Jingmei Li and Yanxia Wu and Guoyin Zhang and Chaoguang Men and Chunguang Ma and Xiang Li and Changting Shi}, editor = {Shuai Liu and Matt Glowatz and Marco Zappatore and Honghao Gao and Bing Jia and Alberto Bucciero}, title = {Application of {WINDLX} Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline}, booktitle = {e-Learning, e-Education, and Online Training - 4th International Conference, eLEOT 2018, Shanghai, China, April 5-7, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {243}, pages = {47--52}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93719-9\_7}, doi = {10.1007/978-3-319-93719-9\_7}, timestamp = {Tue, 05 Feb 2019 13:46:07 +0100}, biburl = {https://dblp.org/rec/conf/eleot/LiWZMMLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiMW17, author = {Zengpeng Li and Chunguang Ma and Ding Wang}, title = {Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program}, journal = {{IEEE} Access}, volume = {5}, pages = {16214--16228}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2740720}, doi = {10.1109/ACCESS.2017.2740720}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/MaLO17, author = {Chunguang Ma and Juyan Li and Weiping Ouyang}, title = {Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment}, journal = {Int. J. Found. Comput. Sci.}, volume = {28}, number = {6}, pages = {645--660}, year = {2017}, url = {https://doi.org/10.1142/S0129054117400111}, doi = {10.1142/S0129054117400111}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/MaLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/YaoMWDY17, author = {Jiansheng Yao and Chunguang Ma and Peng Wu and Gang Du and Qi Yuan}, title = {An Opportunistic Network Coding Routing for Opportunistic Networks}, journal = {Int. J. Parallel Program.}, volume = {45}, number = {1}, pages = {157--171}, year = {2017}, url = {https://doi.org/10.1007/s10766-015-0392-3}, doi = {10.1007/S10766-015-0392-3}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/YaoMWDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiMWD17, author = {Zengpeng Li and Chunguang Ma and Ding Wang and Gang Du}, title = {Toward single-server private information retrieval protocol via learning with errors}, journal = {J. Inf. Secur. Appl.}, volume = {34}, pages = {280--284}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2016.11.003}, doi = {10.1016/J.JISA.2016.11.003}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiMWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/MaZYZ17, author = {Chunguang Ma and Lei Zhang and Songtao Yang and Xiaodong Zheng}, title = {Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services}, journal = {J. Circuits Syst. Comput.}, volume = {26}, number = {7}, pages = {1750119:1--1750119:25}, year = {2017}, url = {https://doi.org/10.1142/S0218126617501195}, doi = {10.1142/S0218126617501195}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/MaZYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MaLD17, author = {Chunguang Ma and Juyan Li and Gang Du}, title = {A Flexible Fully Homomorphic Encryption}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {2}, pages = {761--772}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3796-5}, doi = {10.1007/S11277-016-3796-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MaLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ZhangMYZ17, author = {Lei Zhang and Chunguang Ma and Songtao Yang and Xiaodong Zheng}, title = {Probability Indistinguishable: {A} Query and Location Correlation Attack Resistance Scheme}, journal = {Wirel. Pers. Commun.}, volume = {97}, number = {4}, pages = {6167--6187}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4833-8}, doi = {10.1007/S11277-017-4833-8}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ZhangMYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DuMLW17, author = {Gang Du and Chunguang Ma and Zengpeng Li and Ding Wang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {256--267}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_21}, doi = {10.1007/978-3-319-68542-7\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DuMLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/ZhangMYL17, author = {Lei Zhang and Chunguang Ma and Songtao Yang and Zengpeng Li}, editor = {Antonio A. F. Loureiro and Hsiao{-}Chun Wu and F. Richard Yu}, title = {An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection}, booktitle = {Proceedings of the 20th {ACM} International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2017, Miami, FL, USA, November 21 - 25, 2017}, pages = {215--218}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3127540.3127572}, doi = {10.1145/3127540.3127572}, timestamp = {Thu, 21 Mar 2019 15:01:06 +0100}, biburl = {https://dblp.org/rec/conf/mswim/ZhangMYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiMWZZZ17, author = {Zengpeng Li and Chunguang Ma and Ding Wang and Minghao Zhao and Qian Zhao and Lu Zhou}, title = {Toward Proxy Re-encryption From Learning with Errors in the Exponent}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {683--690}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.300}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiMWZZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LinWMDM16, author = {Yun Lin and Can Wang and Chunguang Ma and Zheng Dou and Xuefei Ma}, title = {A new combination method for multisensor conflict information}, journal = {J. Supercomput.}, volume = {72}, number = {7}, pages = {2874--2890}, year = {2016}, url = {https://doi.org/10.1007/s11227-016-1681-3}, doi = {10.1007/S11227-016-1681-3}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LinWMDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiMMD16, author = {Zengpeng Li and Chunguang Ma and Eduardo Morais and Gang Du}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Multi-bit Leveled Homomorphic Encryption via {\textbackslash}mathsf Dual.LWE -Based}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {221--242}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_14}, doi = {10.1007/978-3-319-54705-3\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiMMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZhuZFM16, author = {Haitao Zhu and Lei Zhang and Weimiao Feng and Chunguang Ma}, title = {A Users Collaborative Scheme for Location and Query Privacy}, booktitle = {22nd {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2016, Wuhan, China, December 13-16, 2016}, pages = {383--390}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICPADS.2016.0059}, doi = {10.1109/ICPADS.2016.0059}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ZhuZFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/LiMDO16, author = {Zengpeng Li and Chunguang Ma and Gang Du and Weiping Ouyang}, title = {Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching}, booktitle = {22nd {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2016, Wuhan, China, December 13-16, 2016}, pages = {1169--1174}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICPADS.2016.0154}, doi = {10.1109/ICPADS.2016.0154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/LiMDO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/MaLO16, author = {Chunguang Ma and Juyan Li and Weiping Ouyang}, editor = {Liqun Chen and Jinguang Han}, title = {A Homomorphic Proxy Re-encryption from Lattices}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {353--372}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_21}, doi = {10.1007/978-3-319-47422-9\_21}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/MaLO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiGM16, author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma}, editor = {Liqun Chen and Jinguang Han}, title = {Preventing Adaptive Key Recovery Attacks on the {GSW} Levelled Homomorphic Encryption Scheme}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {373--383}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_22}, doi = {10.1007/978-3-319-47422-9\_22}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LiGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGM16, author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma}, title = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2016}, url = {http://eprint.iacr.org/2016/1146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/MaZY15, author = {Chunguang Ma and Chang{-}li Zhou and Songtao Yang}, title = {A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in {LBS}}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {326953:1--326953:17}, year = {2015}, url = {https://doi.org/10.1155/2015/326953}, doi = {10.1155/2015/326953}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/MaZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/YuanML15, author = {Qi Yuan and Chunguang Ma and Junyu Lin}, editor = {Hongzhi Wang and Haoliang Qi and Wanxiang Che and Zhaowen Qiu and Leilei Kong and Zhongyuan Han and Junyu Lin and Zeguang Lu}, title = {Fine-Grained Access Control for Big Data Based on {CP-ABE} in Cloud Computing}, booktitle = {Intelligent Computation in Big Data Era - International Conference of Young Computer Scientists, Engineers and Educators, {ICYCSEE} 2015, Harbin, China, January 10-12, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {503}, pages = {344--352}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46248-5\_42}, doi = {10.1007/978-3-662-46248-5\_42}, timestamp = {Wed, 06 Jan 2021 14:57:34 +0100}, biburl = {https://dblp.org/rec/conf/icycsee/YuanML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/ZhouMY15, author = {Chang{-}li Zhou and Chunguang Ma and Songtao Yang}, editor = {Hongzhi Wang and Haoliang Qi and Wanxiang Che and Zhaowen Qiu and Leilei Kong and Zhongyuan Han and Junyu Lin and Zeguang Lu}, title = {An Improved Fine-Grained Encryption Method for Unstructured Big Data}, booktitle = {Intelligent Computation in Big Data Era - International Conference of Young Computer Scientists, Engineers and Educators, {ICYCSEE} 2015, Harbin, China, January 10-12, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {503}, pages = {361--369}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46248-5\_44}, doi = {10.1007/978-3-662-46248-5\_44}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icycsee/ZhouMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MaWZ14, author = {Chunguang Ma and Ding Wang and Sendong Zhao}, title = {Security flaws in two improved remote user authentication schemes using smart cards}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {10}, pages = {2215--2227}, year = {2014}, url = {https://doi.org/10.1002/dac.2468}, doi = {10.1002/DAC.2468}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/MaWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/ZhouMYWL14, author = {Chang{-}li Zhou and Chunguang Ma and Songtao Yang and Peng Wu and Linlin Liu}, editor = {Ching{-}Hsien Hsu and Xuanhua Shi and Valentina Salapura}, title = {A Location Privacy Preserving Method Based on Sensitive Diversity for {LBS}}, booktitle = {Network and Parallel Computing - 11th {IFIP} {WG} 10.3 International Conference, {NPC} 2014, Ilan, Taiwan, September 18-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8707}, pages = {409--422}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44917-2\_34}, doi = {10.1007/978-3-662-44917-2\_34}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/ZhouMYWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/WangM13, author = {Ding Wang and Chunguang Ma}, title = {Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on {ECC}}, journal = {Inf. Fusion}, volume = {14}, number = {4}, pages = {498--503}, year = {2013}, url = {https://doi.org/10.1016/j.inffus.2012.12.002}, doi = {10.1016/J.INFFUS.2012.12.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/WangM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMZZ13, author = {Ding Wang and Chunguang Ma and Qi{-}Ming Zhang and Sendong Zhao}, title = {Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {148--155}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.148-155}, doi = {10.4304/JNW.8.1.148-155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangMZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/MaWWZ12, author = {Chunguang Ma and Jiuru Wang and Peng Wu and Hua Zhang}, title = {Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks}, journal = {J. Comput.}, volume = {7}, number = {8}, pages = {1847--1852}, year = {2012}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=120\&\#38;id=2312}, doi = {10.4304/JCP.7.8.1847-1852}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/MaWWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/MaWZW12, author = {Chunguang Ma and Ding Wang and Ping Zhao and Yu{-}Heng Wang}, editor = {Hua Wang and Lei Zou and Guangyan Huang and Jing He and Chaoyi Pang and Hao Lan Zhang and Dongyan Zhao and Zhuang Yi}, title = {A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy}, booktitle = {Web Technologies and Applications - APWeb 2012 International Workshops: SenDe, IDP, IEKB, MBC, Kunming, China, April 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7234}, pages = {199--211}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29426-6\_24}, doi = {10.1007/978-3-642-29426-6\_24}, timestamp = {Mon, 06 Nov 2023 18:33:19 +0100}, biburl = {https://dblp.org/rec/conf/apweb/MaWZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangMW12, author = {Ding Wang and Chunguang Ma and Peng Wu}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards}, booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, pages = {114--121}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4\_9}, doi = {10.1007/978-3-642-31540-4\_9}, timestamp = {Fri, 27 Dec 2019 21:29:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/MaWZ12, author = {Chunguang Ma and Ding Wang and Qi{-}Ming Zhang}, editor = {Ramaswamy Ramanujam and Srini Ramaswamy}, title = {Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme}, booktitle = {Distributed Computing and Internet Technology - 8th International Conference, {ICDCIT} 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7154}, pages = {141--152}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28073-3\_13}, doi = {10.1007/978-3-642-28073-3\_13}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/MaWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icica/WangMSW12, author = {Ding Wang and Chunguang Ma and Lan Shi and Yu{-}Heng Wang}, editor = {Baoxiang Liu and Maode Ma and Jincai Chang}, title = {On the Security of an Improved Password Authentication Scheme Based on {ECC}}, booktitle = {Information Computing and Applications - Third International Conference, {ICICA} 2012, Chengde, China, September 14-16, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7473}, pages = {181--188}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34062-8\_24}, doi = {10.1007/978-3-642-34062-8\_24}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icica/WangMSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhaoWZYM12, author = {Sendong Zhao and Ding Wang and Sicheng Zhao and Wu Yang and Chunguang Ma}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Cookie-Proxy: {A} Scheme to Prevent SSLStrip Attack}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {365--372}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_34}, doi = {10.1007/978-3-642-34129-8\_34}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhaoWZYM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/WangMZZ12, author = {Ding Wang and Chunguang Ma and Sendong Zhao and Chang{-}li Zhou}, editor = {James J. Park and Albert Y. Zomaya and Sang{-}Soo Yeo and Sartaj Sahni}, title = {Breaking a Robust Remote User Authentication Scheme Using Smart Cards}, booktitle = {Network and Parallel Computing, 9th {IFIP} International Conference, {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7513}, pages = {110--118}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35606-3\_13}, doi = {10.1007/978-3-642-35606-3\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/WangMZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangMGC12, author = {Ding Wang and Chunguang Ma and De{-}li Gu and Zhen{-}shan Cui}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {462--475}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_35}, doi = {10.1007/978-3-642-34601-9\_35}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/WangMGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/WangMMC12, author = {Ding Wang and Ying Mei and Chunguang Ma and Zhen{-}shan Cui}, editor = {Fu Lee Wang and Jingsheng Lei and Zhiguo Gong and Xiangfeng Luo}, title = {Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing}, booktitle = {Web Information Systems and Mining - International Conference, {WISM} 2012, Chengdu, China, October 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7529}, pages = {246--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33469-6\_34}, doi = {10.1007/978-3-642-33469-6\_34}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wism/WangMMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangM12, author = {Ding Wang and Chunguang Ma}, title = {On the Security of an Improved Password Authentication Scheme Based on {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2012}, url = {http://eprint.iacr.org/2012/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangM12a, author = {Ding Wang and Chunguang Ma}, title = {Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2012}, url = {http://eprint.iacr.org/2012/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangMGC12, author = {Ding Wang and Chunguang Ma and De{-}li Gu and Zhen{-}shan Cui}, title = {Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2012}, url = {http://eprint.iacr.org/2012/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangMGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangM12b, author = {Ding Wang and Chunguang Ma}, title = {On the (in)security of some smart-card-based password authentication schemes for {WSN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2012}, url = {http://eprint.iacr.org/2012/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangM12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaGW10, author = {Chunguang Ma and Guining Geng and Huiqiang Wang}, title = {A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks}, journal = {J. Networks}, volume = {5}, number = {4}, pages = {500--507}, year = {2010}, url = {https://doi.org/10.4304/jnw.5.4.500-507}, doi = {10.4304/JNW.5.4.500-507}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaGW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/LvWZM09, author = {Hongwu Lv and Huiqiang Wang and Qian Zhao and Chunguang Ma}, title = {Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of {PEPA}}, booktitle = {Eighth {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009}, pages = {84--89}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DASC.2009.98}, doi = {10.1109/DASC.2009.98}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/LvWZM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/MaLLW09, author = {Chunguang Ma and Xiangjun Lin and Hongwu Lv and Huiqiang Wang}, title = {{ABSR:} An Agent Based Self-Recovery Model for Wireless Sensor Network}, booktitle = {Eighth {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009}, pages = {400--404}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DASC.2009.97}, doi = {10.1109/DASC.2009.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/MaLLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangZM08, author = {Lingling Wang and Guoyin Zhang and Chunguang Ma}, title = {ID-based deniable ring authentication with constant-size signature}, journal = {Frontiers Comput. Sci. China}, volume = {2}, number = {1}, pages = {106--112}, year = {2008}, url = {https://doi.org/10.1007/s11704-008-0003-1}, doi = {10.1007/S11704-008-0003-1}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/WangZM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/MaWWZ07, author = {Chunguang Ma and Peng Wu and Lingling Wang and Guoyin Zhang}, title = {A Novel Method to Authenticate Transitively Closed Undirected Graph}, booktitle = {Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences {(IMSCCS} 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, {USA}}, pages = {537--542}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IMSCCS.2007.23}, doi = {10.1109/IMSCCS.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/MaWWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/MaSWG07, author = {Chunguang Ma and Zhiguo Shang and Huiqiang Wang and Guining Geng}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, title = {An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4864}, pages = {854--865}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77024-4\_77}, doi = {10.1007/978-3-540-77024-4\_77}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/MaSWG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/MaWG06, author = {Chunguang Ma and Peng Wu and Guochang Gu}, editor = {Heng Tao Shen and Jinbao Li and Minglu Li and Jun Ni and Wei Wang}, title = {A New Method for the Design of Stateless Transitive Signature Schemes}, booktitle = {Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3842}, pages = {897--904}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11610496\_124}, doi = {10.1007/11610496\_124}, timestamp = {Tue, 26 Nov 2019 08:50:25 +0100}, biburl = {https://dblp.org/rec/conf/apweb/MaWG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.