BibTeX records: Chunguang Ma

download as .bib file

@article{DBLP:journals/lgrs/ChenMZL24,
  author       = {Xu Chen and
                  Chunguang Ma and
                  Chaofan Zhao and
                  Yong Luo},
  title        = {{UAV} Classification Based on Deep Learning Fusion of Multidimensional
                  {UAV} Micro-Doppler Image Features},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {21},
  pages        = {1--5},
  year         = {2024},
  url          = {https://doi.org/10.1109/LGRS.2024.3371171},
  doi          = {10.1109/LGRS.2024.3371171},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lgrs/ChenMZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Li0MGS21,
  author       = {Zengpeng Li and
                  Vishal Sharma and
                  Chunguang Ma and
                  Chunpeng Ge and
                  Willy Susilo},
  title        = {Ciphertext-policy attribute-based proxy re-encryption via constrained
                  PRFs},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-019-2856-8},
  doi          = {10.1007/S11432-019-2856-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/Li0MGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/LiMW21,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Ding Wang},
  title        = {Leakage Resilient Leveled {\textdollar}{\textbackslash}mathsf \{FHE\}{\textdollar}FHE
                  on Multiple Bits Message},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {7},
  number       = {5},
  pages        = {845--858},
  year         = {2021},
  url          = {https://doi.org/10.1109/TBDATA.2017.2726554},
  doi          = {10.1109/TBDATA.2017.2726554},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/LiMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SongMZZ20,
  author       = {Lei Song and
                  Chunguang Ma and
                  Guoyin Zhang and
                  Yun Zhang},
  title        = {Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {143233--143240},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3014264},
  doi          = {10.1109/ACCESS.2020.3014264},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SongMZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/LiMG20,
  author       = {Juyan Li and
                  Chunguang Ma and
                  Zhen Gu},
  title        = {Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices
                  in the Auxiliary-Input Setting},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {31},
  number       = {5},
  pages        = {551--567},
  year         = {2020},
  url          = {https://doi.org/10.1142/s0129054120500252},
  doi          = {10.1142/S0129054120500252},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/LiMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/OuyangMZD20,
  author       = {Weiping Ouyang and
                  Chunguang Ma and
                  Guoyin Zhang and
                  Keming Diao},
  title        = {Achieving Message-Encapsulated Leveled {FHE} for IoT Privacy Protection},
  journal      = {Mob. Inf. Syst.},
  volume       = {2020},
  pages        = {8862920:1--8862920:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8862920},
  doi          = {10.1155/2020/8862920},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mis/OuyangMZD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiMW20,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Ding Wang},
  title        = {Achieving Multi-Hop {PRE} via Branching Program},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {1},
  pages        = {45--58},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2017.2764082},
  doi          = {10.1109/TCC.2017.2764082},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/LiMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangLZM20,
  author       = {Lingling Wang and
                  Xiaodong Lin and
                  Eugene V. Zima and
                  Chunguang Ma},
  title        = {Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing
                  Based on Blockchain},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {3},
  pages        = {2411--2423},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2964526},
  doi          = {10.1109/TVT.2020.2964526},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/WangLZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/MaBWC20,
  author       = {Chunguang Ma and
                  Hongjun Bei and
                  Chuner Wang and
                  Guihua Chen},
  title        = {Accelerated Depreciation Tax Credit and Corporate Financialization
                  Based on the {PSM-DID} Model},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {6622900:1--6622900:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/6622900},
  doi          = {10.1155/2020/6622900},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/MaBWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangLQM20,
  author       = {Lingling Wang and
                  Xiaodong Lin and
                  Lijun Qu and
                  Chunguang Ma},
  title        = {Ring Selection for Ring Signature-Based Privacy Protection in VANETs},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149247},
  doi          = {10.1109/ICC40277.2020.9149247},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangLQM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiMZY19,
  author       = {Juyan Li and
                  Chunguang Ma and
                  Lei Zhang and
                  Qi Yuan},
  title        = {Unidirectional {FHPRE} Scheme from Lattice for Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {592--600},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p592-600.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiMZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lgrs/GuoTZJHM19,
  author       = {Jiyu Guo and
                  Jisheng Tong and
                  Qing Zhao and
                  Jiao Jiao and
                  Jianjian Huo and
                  Chunguang Ma},
  title        = {An Ultrawide Band Antipodal Vivaldi Antenna for Airborne {GPR} Application},
  journal      = {{IEEE} Geosci. Remote. Sens. Lett.},
  volume       = {16},
  number       = {10},
  pages        = {1560--1564},
  year         = {2019},
  url          = {https://doi.org/10.1109/LGRS.2019.2905013},
  doi          = {10.1109/LGRS.2019.2905013},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lgrs/GuoTZJHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/LiMZ19,
  author       = {Juyan Li and
                  Chunguang Ma and
                  Kejia Zhang},
  title        = {A Novel Lattice-Based {CP-ABPRE} Scheme for Cloud Sharing},
  journal      = {Symmetry},
  volume       = {11},
  number       = {10},
  pages        = {1262},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11101262},
  doi          = {10.3390/SYM11101262},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/LiMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/HuoZZLMGX19,
  author       = {Jianjian Huo and
                  Qing Zhao and
                  Binzhong Zhou and
                  Lanbo Liu and
                  Chunguang Ma and
                  Jiyu Guo and
                  Longhao Xie},
  title        = {Energy Flow Domain Reverse-Time Migration for Borehole Radar},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {57},
  number       = {9},
  pages        = {7221--7231},
  year         = {2019},
  url          = {https://doi.org/10.1109/TGRS.2019.2912318},
  doi          = {10.1109/TGRS.2019.2912318},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/HuoZZLMGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/SongMWZ19,
  author       = {Lei Song and
                  Chunguang Ma and
                  Peng Wu and
                  Yun Zhang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {{PPD-DL:} Privacy-Preserving Decentralized Deep Learning},
  booktitle    = {Artificial Intelligence and Security - 5th International Conference,
                  {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11632},
  pages        = {273--282},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24274-9\_24},
  doi          = {10.1007/978-3-030-24274-9\_24},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/SongMWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/LiMZ19,
  author       = {Juyan Li and
                  Chunguang Ma and
                  Kejia Zhang},
  editor       = {Weizhi Meng and
                  Steven Furnell},
  title        = {A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption
                  for Cloud Sharing},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 5th International
                  Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1095},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0758-8\_3},
  doi          = {10.1007/978-981-15-0758-8\_3},
  timestamp    = {Mon, 22 Feb 2021 16:00:52 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/LiMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiMZ18,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Hong{-}Sheng Zhou},
  title        = {Multi-key {FHE} for multi-bit messages},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {2},
  pages        = {029101:1--029101:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9206-y},
  doi          = {10.1007/S11432-017-9206-Y},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangKMZS18,
  author       = {Ke{-}Jia Zhang and
                  Leong{-}Chuan Kwek and
                  Chun{-}Guang Ma and
                  Long Zhang and
                  Hong{-}Wei Sun},
  title        = {Security analysis with improved design of post-confirmation mechanism
                  for quantum sealed-bid auction with single photons},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {2},
  pages        = {38},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-017-1808-3},
  doi          = {10.1007/S11128-017-1808-3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangKMZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YuanMYB18,
  author       = {Qi Yuan and
                  Chunguang Ma and
                  Haitao Yu and
                  Xuefen Bian},
  title        = {A Key Pre-Distribution Scheme Based on \emph{{\(\mathrm{\mu}\)}}-PBIBD
                  for Enhancing Resilience in Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {18},
  number       = {5},
  pages        = {1539},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18051539},
  doi          = {10.3390/S18051539},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/YuanMYB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eleot/LiWZMMLS18,
  author       = {Jingmei Li and
                  Yanxia Wu and
                  Guoyin Zhang and
                  Chaoguang Men and
                  Chunguang Ma and
                  Xiang Li and
                  Changting Shi},
  editor       = {Shuai Liu and
                  Matt Glowatz and
                  Marco Zappatore and
                  Honghao Gao and
                  Bing Jia and
                  Alberto Bucciero},
  title        = {Application of {WINDLX} Simulator in Teaching Practice to Solve the
                  Structural and Control Related in the Pipeline},
  booktitle    = {e-Learning, e-Education, and Online Training - 4th International Conference,
                  eLEOT 2018, Shanghai, China, April 5-7, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {243},
  pages        = {47--52},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93719-9\_7},
  doi          = {10.1007/978-3-319-93719-9\_7},
  timestamp    = {Tue, 05 Feb 2019 13:46:07 +0100},
  biburl       = {https://dblp.org/rec/conf/eleot/LiWZMMLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiMW17,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Ding Wang},
  title        = {Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via
                  Branching Program},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {16214--16228},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2740720},
  doi          = {10.1109/ACCESS.2017.2740720},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/MaLO17,
  author       = {Chunguang Ma and
                  Juyan Li and
                  Weiping Ouyang},
  title        = {Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption
                  for Secure Big Data Computing in Cloud Environment},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {28},
  number       = {6},
  pages        = {645--660},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0129054117400111},
  doi          = {10.1142/S0129054117400111},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/MaLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/YaoMWDY17,
  author       = {Jiansheng Yao and
                  Chunguang Ma and
                  Peng Wu and
                  Gang Du and
                  Qi Yuan},
  title        = {An Opportunistic Network Coding Routing for Opportunistic Networks},
  journal      = {Int. J. Parallel Program.},
  volume       = {45},
  number       = {1},
  pages        = {157--171},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10766-015-0392-3},
  doi          = {10.1007/S10766-015-0392-3},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/YaoMWDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiMWD17,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Ding Wang and
                  Gang Du},
  title        = {Toward single-server private information retrieval protocol via learning
                  with errors},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {34},
  pages        = {280--284},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2016.11.003},
  doi          = {10.1016/J.JISA.2016.11.003},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiMWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/MaZYZ17,
  author       = {Chunguang Ma and
                  Lei Zhang and
                  Songtao Yang and
                  Xiaodong Zheng},
  title        = {Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based
                  Services},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {26},
  number       = {7},
  pages        = {1750119:1--1750119:25},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0218126617501195},
  doi          = {10.1142/S0218126617501195},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/MaZYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MaLD17,
  author       = {Chunguang Ma and
                  Juyan Li and
                  Gang Du},
  title        = {A Flexible Fully Homomorphic Encryption},
  journal      = {Wirel. Pers. Commun.},
  volume       = {95},
  number       = {2},
  pages        = {761--772},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3796-5},
  doi          = {10.1007/S11277-016-3796-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MaLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ZhangMYZ17,
  author       = {Lei Zhang and
                  Chunguang Ma and
                  Songtao Yang and
                  Xiaodong Zheng},
  title        = {Probability Indistinguishable: {A} Query and Location Correlation
                  Attack Resistance Scheme},
  journal      = {Wirel. Pers. Commun.},
  volume       = {97},
  number       = {4},
  pages        = {6167--6187},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4833-8},
  doi          = {10.1007/S11277-017-4833-8},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ZhangMYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/DuMLW17,
  author       = {Gang Du and
                  Chunguang Ma and
                  Zengpeng Li and
                  Ding Wang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan
                  Scheme},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {256--267},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_21},
  doi          = {10.1007/978-3-319-68542-7\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/DuMLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/ZhangMYL17,
  author       = {Lei Zhang and
                  Chunguang Ma and
                  Songtao Yang and
                  Zengpeng Li},
  editor       = {Antonio A. F. Loureiro and
                  Hsiao{-}Chun Wu and
                  F. Richard Yu},
  title        = {An Uncertain Continuous Collaborative Users Finding Algorithm for
                  Location Privacy Protection},
  booktitle    = {Proceedings of the 20th {ACM} International Conference on Modelling,
                  Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2017,
                  Miami, FL, USA, November 21 - 25, 2017},
  pages        = {215--218},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3127540.3127572},
  doi          = {10.1145/3127540.3127572},
  timestamp    = {Thu, 21 Mar 2019 15:01:06 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/ZhangMYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiMWZZZ17,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Ding Wang and
                  Minghao Zhao and
                  Qian Zhao and
                  Lu Zhou},
  title        = {Toward Proxy Re-encryption From Learning with Errors in the Exponent},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {683--690},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.300},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiMWZZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LinWMDM16,
  author       = {Yun Lin and
                  Can Wang and
                  Chunguang Ma and
                  Zheng Dou and
                  Xuefei Ma},
  title        = {A new combination method for multisensor conflict information},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {7},
  pages        = {2874--2890},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-016-1681-3},
  doi          = {10.1007/S11227-016-1681-3},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LinWMDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiMMD16,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Eduardo Morais and
                  Gang Du},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Multi-bit Leveled Homomorphic Encryption via {\textbackslash}mathsf
                  Dual.LWE -Based},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {221--242},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_14},
  doi          = {10.1007/978-3-319-54705-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiMMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhuZFM16,
  author       = {Haitao Zhu and
                  Lei Zhang and
                  Weimiao Feng and
                  Chunguang Ma},
  title        = {A Users Collaborative Scheme for Location and Query Privacy},
  booktitle    = {22nd {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
  pages        = {383--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICPADS.2016.0059},
  doi          = {10.1109/ICPADS.2016.0059},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ZhuZFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/LiMDO16,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Gang Du and
                  Weiping Ouyang},
  title        = {Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching},
  booktitle    = {22nd {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
  pages        = {1169--1174},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICPADS.2016.0154},
  doi          = {10.1109/ICPADS.2016.0154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/LiMDO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/MaLO16,
  author       = {Chunguang Ma and
                  Juyan Li and
                  Weiping Ouyang},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {A Homomorphic Proxy Re-encryption from Lattices},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {353--372},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_21},
  doi          = {10.1007/978-3-319-47422-9\_21},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/MaLO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiGM16,
  author       = {Zengpeng Li and
                  Steven D. Galbraith and
                  Chunguang Ma},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Preventing Adaptive Key Recovery Attacks on the {GSW} Levelled Homomorphic
                  Encryption Scheme},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {373--383},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_22},
  doi          = {10.1007/978-3-319-47422-9\_22},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LiGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGM16,
  author       = {Zengpeng Li and
                  Steven D. Galbraith and
                  Chunguang Ma},
  title        = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters
                  Leveled Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/MaZY15,
  author       = {Chunguang Ma and
                  Chang{-}li Zhou and
                  Songtao Yang},
  title        = {A Voronoi-Based Location Privacy-Preserving Method for Continuous
                  Query in {LBS}},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {326953:1--326953:17},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/326953},
  doi          = {10.1155/2015/326953},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/MaZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/YuanML15,
  author       = {Qi Yuan and
                  Chunguang Ma and
                  Junyu Lin},
  editor       = {Hongzhi Wang and
                  Haoliang Qi and
                  Wanxiang Che and
                  Zhaowen Qiu and
                  Leilei Kong and
                  Zhongyuan Han and
                  Junyu Lin and
                  Zeguang Lu},
  title        = {Fine-Grained Access Control for Big Data Based on {CP-ABE} in Cloud
                  Computing},
  booktitle    = {Intelligent Computation in Big Data Era - International Conference
                  of Young Computer Scientists, Engineers and Educators, {ICYCSEE} 2015,
                  Harbin, China, January 10-12, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {503},
  pages        = {344--352},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46248-5\_42},
  doi          = {10.1007/978-3-662-46248-5\_42},
  timestamp    = {Wed, 06 Jan 2021 14:57:34 +0100},
  biburl       = {https://dblp.org/rec/conf/icycsee/YuanML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/ZhouMY15,
  author       = {Chang{-}li Zhou and
                  Chunguang Ma and
                  Songtao Yang},
  editor       = {Hongzhi Wang and
                  Haoliang Qi and
                  Wanxiang Che and
                  Zhaowen Qiu and
                  Leilei Kong and
                  Zhongyuan Han and
                  Junyu Lin and
                  Zeguang Lu},
  title        = {An Improved Fine-Grained Encryption Method for Unstructured Big Data},
  booktitle    = {Intelligent Computation in Big Data Era - International Conference
                  of Young Computer Scientists, Engineers and Educators, {ICYCSEE} 2015,
                  Harbin, China, January 10-12, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {503},
  pages        = {361--369},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46248-5\_44},
  doi          = {10.1007/978-3-662-46248-5\_44},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icycsee/ZhouMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/MaWZ14,
  author       = {Chunguang Ma and
                  Ding Wang and
                  Sendong Zhao},
  title        = {Security flaws in two improved remote user authentication schemes
                  using smart cards},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {10},
  pages        = {2215--2227},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2468},
  doi          = {10.1002/DAC.2468},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/MaWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/ZhouMYWL14,
  author       = {Chang{-}li Zhou and
                  Chunguang Ma and
                  Songtao Yang and
                  Peng Wu and
                  Linlin Liu},
  editor       = {Ching{-}Hsien Hsu and
                  Xuanhua Shi and
                  Valentina Salapura},
  title        = {A Location Privacy Preserving Method Based on Sensitive Diversity
                  for {LBS}},
  booktitle    = {Network and Parallel Computing - 11th {IFIP} {WG} 10.3 International
                  Conference, {NPC} 2014, Ilan, Taiwan, September 18-20, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8707},
  pages        = {409--422},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44917-2\_34},
  doi          = {10.1007/978-3-662-44917-2\_34},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/ZhouMYWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/WangM13,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {Cryptanalysis of a remote user authentication scheme for mobile client-server
                  environment based on {ECC}},
  journal      = {Inf. Fusion},
  volume       = {14},
  number       = {4},
  pages        = {498--503},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.inffus.2012.12.002},
  doi          = {10.1016/J.INFFUS.2012.12.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/WangM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMZZ13,
  author       = {Ding Wang and
                  Chunguang Ma and
                  Qi{-}Ming Zhang and
                  Sendong Zhao},
  title        = {Secure Password-based Remote User Authentication Scheme Against Smart
                  Card Security Breach},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {148--155},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.148-155},
  doi          = {10.4304/JNW.8.1.148-155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangMZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/MaWWZ12,
  author       = {Chunguang Ma and
                  Jiuru Wang and
                  Peng Wu and
                  Hua Zhang},
  title        = {Identity Authentication and Key Agreement Integrated Key Management
                  Protocol for Heterogeneous Sensor Networks},
  journal      = {J. Comput.},
  volume       = {7},
  number       = {8},
  pages        = {1847--1852},
  year         = {2012},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=120\&\#38;id=2312},
  doi          = {10.4304/JCP.7.8.1847-1852},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/MaWWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/MaWZW12,
  author       = {Chunguang Ma and
                  Ding Wang and
                  Ping Zhao and
                  Yu{-}Heng Wang},
  editor       = {Hua Wang and
                  Lei Zou and
                  Guangyan Huang and
                  Jing He and
                  Chaoyi Pang and
                  Hao Lan Zhang and
                  Dongyan Zhao and
                  Zhuang Yi},
  title        = {A New Dynamic ID-Based Remote User Authentication Scheme with Forward
                  Secrecy},
  booktitle    = {Web Technologies and Applications - APWeb 2012 International Workshops:
                  SenDe, IDP, IEKB, MBC, Kunming, China, April 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7234},
  pages        = {199--211},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29426-6\_24},
  doi          = {10.1007/978-3-642-29426-6\_24},
  timestamp    = {Mon, 06 Nov 2023 18:33:19 +0100},
  biburl       = {https://dblp.org/rec/conf/apweb/MaWZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangMW12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  Peng Wu},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Secure Password-Based Remote User Authentication Scheme with Non-tamper
                  Resistant Smart Cards},
  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  pages        = {114--121},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4\_9},
  doi          = {10.1007/978-3-642-31540-4\_9},
  timestamp    = {Fri, 27 Dec 2019 21:29:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/MaWZ12,
  author       = {Chunguang Ma and
                  Ding Wang and
                  Qi{-}Ming Zhang},
  editor       = {Ramaswamy Ramanujam and
                  Srini Ramaswamy},
  title        = {Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication
                  Scheme},
  booktitle    = {Distributed Computing and Internet Technology - 8th International
                  Conference, {ICDCIT} 2012, Bhubaneswar, India, February 2-4, 2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7154},
  pages        = {141--152},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28073-3\_13},
  doi          = {10.1007/978-3-642-28073-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/MaWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icica/WangMSW12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  Lan Shi and
                  Yu{-}Heng Wang},
  editor       = {Baoxiang Liu and
                  Maode Ma and
                  Jincai Chang},
  title        = {On the Security of an Improved Password Authentication Scheme Based
                  on {ECC}},
  booktitle    = {Information Computing and Applications - Third International Conference,
                  {ICICA} 2012, Chengde, China, September 14-16, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7473},
  pages        = {181--188},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34062-8\_24},
  doi          = {10.1007/978-3-642-34062-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icica/WangMSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhaoWZYM12,
  author       = {Sendong Zhao and
                  Ding Wang and
                  Sicheng Zhao and
                  Wu Yang and
                  Chunguang Ma},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Cookie-Proxy: {A} Scheme to Prevent SSLStrip Attack},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {365--372},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_34},
  doi          = {10.1007/978-3-642-34129-8\_34},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhaoWZYM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/WangMZZ12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  Sendong Zhao and
                  Chang{-}li Zhou},
  editor       = {James J. Park and
                  Albert Y. Zomaya and
                  Sang{-}Soo Yeo and
                  Sartaj Sahni},
  title        = {Breaking a Robust Remote User Authentication Scheme Using Smart Cards},
  booktitle    = {Network and Parallel Computing, 9th {IFIP} International Conference,
                  {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7513},
  pages        = {110--118},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35606-3\_13},
  doi          = {10.1007/978-3-642-35606-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/WangMZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangMGC12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  De{-}li Gu and
                  Zhen{-}shan Cui},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes
                  for Multi-server Architecture},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {462--475},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_35},
  doi          = {10.1007/978-3-642-34601-9\_35},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WangMGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wism/WangMMC12,
  author       = {Ding Wang and
                  Ying Mei and
                  Chunguang Ma and
                  Zhen{-}shan Cui},
  editor       = {Fu Lee Wang and
                  Jingsheng Lei and
                  Zhiguo Gong and
                  Xiangfeng Luo},
  title        = {Comments on an Advanced Dynamic ID-Based Authentication Scheme for
                  Cloud Computing},
  booktitle    = {Web Information Systems and Mining - International Conference, {WISM}
                  2012, Chengdu, China, October 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7529},
  pages        = {246--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33469-6\_34},
  doi          = {10.1007/978-3-642-33469-6\_34},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wism/WangMMC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangM12,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {On the Security of an Improved Password Authentication Scheme Based
                  on {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangM12a,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {Robust Smart Card based Password Authentication Scheme against Smart
                  Card Loss Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangM12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangMGC12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  De{-}li Gu and
                  Zhen{-}shan Cui},
  title        = {Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes
                  for Multi-Server Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangMGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangM12b,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {On the (in)security of some smart-card-based password authentication
                  schemes for {WSN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangM12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaGW10,
  author       = {Chunguang Ma and
                  Guining Geng and
                  Huiqiang Wang},
  title        = {A Location-aware and Secret-share Based Dynamic Key Management Scheme
                  for Heterogeneous Sensor Networks},
  journal      = {J. Networks},
  volume       = {5},
  number       = {4},
  pages        = {500--507},
  year         = {2010},
  url          = {https://doi.org/10.4304/jnw.5.4.500-507},
  doi          = {10.4304/JNW.5.4.500-507},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaGW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/LvWZM09,
  author       = {Hongwu Lv and
                  Huiqiang Wang and
                  Qian Zhao and
                  Chunguang Ma},
  title        = {Modeling and Analysis of Self-Reflection Based on Continuous State-Space
                  Approximation of {PEPA}},
  booktitle    = {Eighth {IEEE} International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009},
  pages        = {84--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DASC.2009.98},
  doi          = {10.1109/DASC.2009.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/LvWZM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/MaLLW09,
  author       = {Chunguang Ma and
                  Xiangjun Lin and
                  Hongwu Lv and
                  Huiqiang Wang},
  title        = {{ABSR:} An Agent Based Self-Recovery Model for Wireless Sensor Network},
  booktitle    = {Eighth {IEEE} International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009},
  pages        = {400--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DASC.2009.97},
  doi          = {10.1109/DASC.2009.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/MaLLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangZM08,
  author       = {Lingling Wang and
                  Guoyin Zhang and
                  Chunguang Ma},
  title        = {ID-based deniable ring authentication with constant-size signature},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {2},
  number       = {1},
  pages        = {106--112},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11704-008-0003-1},
  doi          = {10.1007/S11704-008-0003-1},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangZM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/MaWWZ07,
  author       = {Chunguang Ma and
                  Peng Wu and
                  Lingling Wang and
                  Guoyin Zhang},
  title        = {A Novel Method to Authenticate Transitively Closed Undirected Graph},
  booktitle    = {Proceeding of the Second International Multi-Symposium of Computer
                  and Computational Sciences {(IMSCCS} 2007), August 13-15, 2007, The
                  University of Iowa, Iowa City, Iowa, {USA}},
  pages        = {537--542},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IMSCCS.2007.23},
  doi          = {10.1109/IMSCCS.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/MaWWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/MaSWG07,
  author       = {Chunguang Ma and
                  Zhiguo Shang and
                  Huiqiang Wang and
                  Guining Geng},
  editor       = {Hongke Zhang and
                  Stephan Olariu and
                  Jiannong Cao and
                  David B. Johnson},
  title        = {An Improved Key Management Scheme for Heterogeneity Wireless Sensor
                  Networks},
  booktitle    = {Mobile Ad-Hoc and Sensor Networks, Third International Conference,
                  {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4864},
  pages        = {854--865},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77024-4\_77},
  doi          = {10.1007/978-3-540-77024-4\_77},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/MaSWG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/MaWG06,
  author       = {Chunguang Ma and
                  Peng Wu and
                  Guochang Gu},
  editor       = {Heng Tao Shen and
                  Jinbao Li and
                  Minglu Li and
                  Jun Ni and
                  Wei Wang},
  title        = {A New Method for the Design of Stateless Transitive Signature Schemes},
  booktitle    = {Advanced Web and Network Technologies, and Applications, APWeb 2006
                  International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China,
                  January 16-18, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3842},
  pages        = {897--904},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11610496\_124},
  doi          = {10.1007/11610496\_124},
  timestamp    = {Tue, 26 Nov 2019 08:50:25 +0100},
  biburl       = {https://dblp.org/rec/conf/apweb/MaWG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics