BibTeX records: Qiaoyan Wen

download as .bib file

@article{DBLP:journals/corr/abs-2403-09318,
  author       = {Sheng{-}Yao Wu and
                  Runze Li and
                  Yan{-}Qi Song and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen and
                  Fei Gao},
  title        = {A Hierarchical Fused Quantum Fuzzy Neural Network for Image Classification},
  journal      = {CoRR},
  volume       = {abs/2403.09318},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.09318},
  doi          = {10.48550/ARXIV.2403.09318},
  eprinttype    = {arXiv},
  eprint       = {2403.09318},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-09318.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/CaiWDQGW23,
  author       = {Bin{-}Bin Cai and
                  Yusen Wu and
                  Jing Dong and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Qiao{-}Yan Wen},
  title        = {Quantum Attacks on 1K-AES and {PRINCE}},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {5},
  pages        = {1102--1110},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxab216},
  doi          = {10.1093/COMJNL/BXAB216},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/CaiWDQGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangZGWCW23,
  author       = {Hua Zhang and
                  Xin Zhang and
                  Ziqing Guo and
                  Huawei Wang and
                  Dong Cui and
                  Qiaoyan Wen},
  title        = {Secure and Efficiently Searchable IoT Communication Data Management
                  Model: Using Blockchain as a New Tool},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {14},
  pages        = {11985--11999},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2021.3121482},
  doi          = {10.1109/JIOT.2021.3121482},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangZGWCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCGZZW23,
  author       = {Wenmin Li and
                  Yang Chen and
                  Fei Gao and
                  Shuo Zhang and
                  Hua Zhang and
                  Qiaoyan Wen},
  title        = {Privacy Protection Data Retrieval Scheme With Inverted Index for IoT
                  Based on Blockchain},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {14},
  pages        = {12090--12101},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2021.3128528},
  doi          = {10.1109/JIOT.2021.3128528},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCGZZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DuWZG23,
  author       = {Hongzhen Du and
                  Qiaoyan Wen and
                  Shanshan Zhang and
                  Mingchu Gao},
  title        = {An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption
                  for VANETs},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {20},
  pages        = {17881--17892},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3279896},
  doi          = {10.1109/JIOT.2023.3279896},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DuWZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SunWCQWG23,
  author       = {Hong{-}Wei Sun and
                  Chun{-}Yan Wei and
                  Bin{-}Bin Cai and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen and
                  Fei Gao},
  title        = {Improved BV-based quantum attack on block ciphers},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-022-03752-x},
  doi          = {10.1007/S11128-022-03752-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/SunWCQWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangWQGW23,
  author       = {Xue Zhang and
                  Chunyan Wei and
                  Sujuan Qin and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {Practical efficient 1-out-of-n quantum oblivious transfer protocol},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {2},
  pages        = {99},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-022-03817-x},
  doi          = {10.1007/S11128-022-03817-X},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangWQGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiLPQGW23,
  author       = {Yong{-}Mei Li and
                  Hai{-}Ling Liu and
                  Shijie Pan and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Qiao{-}Yan Wen},
  title        = {Quantum discriminative canonical correlation analysis},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {4},
  pages        = {163},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-023-03909-2},
  doi          = {10.1007/S11128-023-03909-2},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiLPQGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhangZGWLG23,
  author       = {Hua Zhang and
                  Shaohua Zhao and
                  Ziqing Guo and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Fei Gao},
  title        = {Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid
                  Clouds},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {308--323},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3092358},
  doi          = {10.1109/TCC.2021.3092358},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhangZGWLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGQW23,
  author       = {Zhenqiang Li and
                  Fei Gao and
                  Su{-}Juan Qin and
                  Qiaoyan Wen},
  title        = {New record in the number of qubits for a quantum implementation of
                  {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/018},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGQW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunCQWG23,
  author       = {Hong{-}Wei Sun and
                  Bin{-}Bin Cai and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen and
                  Fei Gao},
  title        = {Quantum Attacks on Beyond-Birthday-Bound MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/025},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunCQWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunCQWG23a,
  author       = {Hong{-}Wei Sun and
                  Bin{-}Bin Cai and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen and
                  Fei Gao},
  title        = {Quantum Attacks on Type-1 Generalized Feistel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/776},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunCQWG23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YuNZLWLG22,
  author       = {Ping Yu and
                  Wei Ni and
                  Hua Zhang and
                  Ren Ping Liu and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Fei Gao},
  title        = {Secure and Differentiated Fog-Assisted Data Access for Internet of
                  Things},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {8},
  pages        = {1948--1963},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab031},
  doi          = {10.1093/COMJNL/BXAB031},
  timestamp    = {Wed, 14 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YuNZLWLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhaoZZLGW22,
  author       = {Shaohua Zhao and
                  Hua Zhang and
                  Xin Zhang and
                  Wenmin Li and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {Forward privacy multikeyword ranked search over encrypted database},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {7356--7378},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22884},
  doi          = {10.1002/INT.22884},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhaoZZLGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/WangLYZXW22,
  author       = {Huawei Wang and
                  Yiwei Liu and
                  Peng Yin and
                  Hua Zhang and
                  Xin Xu and
                  Qiaoyan Wen},
  title        = {Label specificity attack: Change your label as {I} want},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {7767--7786},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22902},
  doi          = {10.1002/INT.22902},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/WangLYZXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/GongGLZJW22,
  author       = {Yunping Gong and
                  Fei Gao and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {A rORAM scheme with logarithmic bandwidth and logarithmic locality},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {8068--8091},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22929},
  doi          = {10.1002/INT.22929},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/GongGLZJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/GaoZYLGW22,
  author       = {Haoran Gao and
                  Hua Zhang and
                  Xingguo Yang and
                  Wenmin Li and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {Generating natural adversarial examples with universal perturbations
                  for text classification},
  journal      = {Neurocomputing},
  volume       = {471},
  pages        = {175--182},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2021.10.089},
  doi          = {10.1016/J.NEUCOM.2021.10.089},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/GaoZYLGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GuoLWW22,
  author       = {Fen{-}Zhuo Guo and
                  Ze{-}Tian Lv and
                  Shi{-}Hui Wei and
                  Qiao{-}Yan Wen},
  title        = {Effects of measurement dependence on 1-parameter family of Bell tests},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {1},
  pages        = {28},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-021-03300-z},
  doi          = {10.1007/S11128-021-03300-Z},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/GuoLWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiTZLJW22,
  author       = {Yongsheng Li and
                  Tengfei Tu and
                  Hua Zhang and
                  JiShuai Li and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {Sound Can Help Us See More Clearly},
  journal      = {Sensors},
  volume       = {22},
  number       = {2},
  pages        = {599},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22020599},
  doi          = {10.3390/S22020599},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiTZLJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiTLQSW22,
  author       = {JiShuai Li and
                  Tengfei Tu and
                  Yongsheng Li and
                  Su{-}Juan Qin and
                  Yijie Shi and
                  Qiaoyan Wen},
  title        = {DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined
                  Networks},
  journal      = {Sensors},
  volume       = {22},
  number       = {3},
  pages        = {1061},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22031061},
  doi          = {10.3390/S22031061},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiTLQSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LinGZJLW22,
  author       = {Hao Lin and
                  Fei Gao and
                  Hua Zhang and
                  Zhengping Jin and
                  Wenmin Li and
                  Qiaoyan Wen},
  title        = {Public Key Encryption With Equality Test Supporting Flexible Designated
                  Authorization in Cloud Storage},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {1},
  pages        = {1460--1470},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2021.3106701},
  doi          = {10.1109/JSYST.2021.3106701},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LinGZJLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/YuNLZZW22,
  author       = {Ping Yu and
                  Wei Ni and
                  Ren Ping Liu and
                  Zhaoxin Zhang and
                  Hua Zhang and
                  Qiaoyan Wen},
  title        = {Efficient Encrypted Range Query on Cloud Platforms},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {6},
  number       = {3},
  pages        = {27:1--27:23},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548657},
  doi          = {10.1145/3548657},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/YuNLZZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ChenLGWZW22,
  author       = {Yang Chen and
                  Wenmin Li and
                  Fei Gao and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Huawei Wang},
  title        = {Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud
                  Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {724--735},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2019.2959306},
  doi          = {10.1109/TSC.2019.2959306},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/ChenLGWZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/GuoQGZLJW22,
  author       = {Wei Guo and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Hua Zhang and
                  Wenmin Li and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {Dynamic Proof of Data Possession and Replication With Tree Sharing
                  and Batch Verification in the Cloud},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {1813--1824},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3022812},
  doi          = {10.1109/TSC.2020.3022812},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/GuoQGZLJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ChenTZW022,
  author       = {Miao Chen and
                  Tengfei Tu and
                  Hua Zhang and
                  Qiaoyan Wen and
                  Weihang Wang},
  title        = {Jasmine: {A} Static Analysis Framework for Spring Core Technologies},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {60:1--60:13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3556910},
  doi          = {10.1145/3551349.3556910},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/ChenTZW022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LinZGSWGS21,
  author       = {Hao Lin and
                  Zhen Zhao and
                  Fei Gao and
                  Willy Susilo and
                  Qiaoyan Wen and
                  Fuchun Guo and
                  Yijie Shi},
  title        = {Lightweight Public Key Encryption With Equality Test Supporting Partial
                  Authorization in Cloud Storage},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {8},
  pages        = {1226--1238},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa144},
  doi          = {10.1093/COMJNL/BXAA144},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LinZGSWGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiuGW21,
  author       = {Li Liu and
                  Fen{-}Zhuo Guo and
                  Qiao{-}Yan Wen},
  title        = {Practical decoy-state quantum private queries against joint-measurement
                  attack under weak coherent pulse sources},
  journal      = {Quantum Inf. Process.},
  volume       = {20},
  number       = {12},
  pages        = {392},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11128-021-03329-0},
  doi          = {10.1007/S11128-021-03329-0},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/LiuGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuNYZLW21,
  author       = {Ping Yu and
                  Wei Ni and
                  Guangsheng Yu and
                  Hua Zhang and
                  Ren Ping Liu and
                  Qiaoyan Wen},
  title        = {Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6638453:1--6638453:14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6638453},
  doi          = {10.1155/2021/6638453},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuNYZLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YuGW21,
  author       = {Chao{-}Hua Yu and
                  Fei Gao and
                  Qiao{-}Yan Wen},
  title        = {An Improved Quantum Algorithm for Ridge Regression},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {33},
  number       = {3},
  pages        = {858--866},
  year         = {2021},
  url          = {https://doi.org/10.1109/TKDE.2019.2937491},
  doi          = {10.1109/TKDE.2019.2937491},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/YuGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhangGZW21,
  author       = {Hua Zhang and
                  Ziqing Guo and
                  Shaohua Zhao and
                  Qiaoyan Wen},
  title        = {Privacy-Preserving Linear Region Search Service},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {207--221},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSC.2017.2777970},
  doi          = {10.1109/TSC.2017.2777970},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhangGZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LinZYWSGW21,
  author       = {Hao Lin and
                  Hua Zhang and
                  Hanbing Yan and
                  Huawei Wang and
                  Yijie Shi and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {A Secure Online Treatment Blockchain Service},
  journal      = {Wirel. Pers. Commun.},
  volume       = {117},
  number       = {3},
  pages        = {1773--1795},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-020-07945-4},
  doi          = {10.1007/S11277-020-07945-4},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/LinZYWSGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangJLJLJW20,
  author       = {Hua Zhang and
                  Xueqi Jin and
                  Ying Li and
                  Zhengwei Jiang and
                  Ye Liang and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {A Multi-Step Attack Detection Model Based on Alerts of Smart Grid
                  Monitoring System},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {1031--1047},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2961517},
  doi          = {10.1109/ACCESS.2019.2961517},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangJLJLJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QinZGWWS20,
  author       = {Jiawei Qin and
                  Hua Zhang and
                  Jing Guo and
                  Senmiao Wang and
                  Qiaoyan Wen and
                  Yijie Shi},
  title        = {Vulnerability Detection on Android Apps-Inspired by Case Study on
                  Vulnerability Related With Web Functions},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {106437--106451},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2998043},
  doi          = {10.1109/ACCESS.2020.2998043},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QinZGWWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunZQQSW20,
  author       = {Caijun Sun and
                  Hua Zhang and
                  Su{-}Juan Qin and
                  Jiawei Qin and
                  Yijie Shi and
                  Qiaoyan Wen},
  title        = {DroidPDF: The Obfuscation Resilient Packer Detection Framework for
                  Android Apps},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {167460--167474},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3010588},
  doi          = {10.1109/ACCESS.2020.3010588},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SunZQQSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/DuWZG20,
  author       = {Hongzhen Du and
                  Qiaoyan Wen and
                  Shanshan Zhang and
                  Mingchu Gao},
  title        = {A new provably secure certificateless signature scheme for Internet
                  of Things},
  journal      = {Ad Hoc Networks},
  volume       = {100},
  pages        = {102074},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.adhoc.2020.102074},
  doi          = {10.1016/J.ADHOC.2020.102074},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/DuWZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenLGLZW20,
  author       = {Yang Chen and
                  Wenmin Li and
                  Fei Gao and
                  Kaitai Liang and
                  Hua Zhang and
                  Qiaoyan Wen},
  title        = {Practical Attribute-Based Conjunctive Keyword Search Scheme},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {8},
  pages        = {1203--1215},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz140},
  doi          = {10.1093/COMJNL/BXZ140},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChenLGLZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GuoQLGJWS20,
  author       = {Wei Guo and
                  Su{-}Juan Qin and
                  Jun Lu and
                  Fei Gao and
                  Zhengping Jin and
                  Qiaoyan Wen and
                  Daniele Sgandurra},
  title        = {Improved Proofs Of Retrievability And Replication For Data Availability
                  In Cloud Storage},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {8},
  pages        = {1216--1230},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz151},
  doi          = {10.1093/COMJNL/BXZ151},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GuoQLGJWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiLGYZJW20,
  author       = {Zhidan Li and
                  Wenmin Li and
                  Fei Gao and
                  Ping Yu and
                  Hua Zhang and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for
                  Location-Based Services},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {12},
  pages        = {1886--1903},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxaa043},
  doi          = {10.1093/COMJNL/BXAA043},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiLGYZJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JiangGLLW20,
  author       = {Peng Jiang and
                  Fuchun Guo and
                  Kaitai Liang and
                  Jianchang Lai and
                  Qiaoyan Wen},
  title        = {Searchain: Blockchain-based private keyword search in decentralized
                  storage},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {107},
  pages        = {781--792},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2017.08.036},
  doi          = {10.1016/J.FUTURE.2017.08.036},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/JiangGLLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiJCLW20,
  author       = {Xiaoqi Li and
                  Peng Jiang and
                  Ting Chen and
                  Xiapu Luo and
                  Qiaoyan Wen},
  title        = {A survey on the security of blockchain systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {107},
  pages        = {841--853},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2017.08.020},
  doi          = {10.1016/J.FUTURE.2017.08.020},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiJCLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/WeiCWQGW20,
  author       = {Chun{-}Yan Wei and
                  Xiao{-}Qiu Cai and
                  Tian{-}Yin Wang and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Qiao{-}Yan Wen},
  title        = {Error Tolerance Bound in QKD-Based Quantum Private Query},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {38},
  number       = {3},
  pages        = {517--527},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSAC.2020.2968998},
  doi          = {10.1109/JSAC.2020.2968998},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/WeiCWQGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LiWHQGW20,
  author       = {Xinhui Li and
                  Yukun Wang and
                  Yunguang Han and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {Self-Testing of Symmetric Three-Qubit States},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {38},
  number       = {3},
  pages        = {589--597},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSAC.2020.2968994},
  doi          = {10.1109/JSAC.2020.2968994},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LiWHQGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GuoWLZJ20,
  author       = {Dianli Guo and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {Adaptively secure broadcast encryption with authenticated content
                  distributors},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {11-12},
  pages        = {7889--7910},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08574-1},
  doi          = {10.1007/S11042-019-08574-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/GuoWLZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/CuiGLSZWP20,
  author       = {Yuanbo Cui and
                  Fei Gao and
                  Wenmin Li and
                  Yijie Shi and
                  Hua Zhang and
                  Qiaoyan Wen and
                  Emmanouil Panaousis},
  title        = {Cache-Based Privacy Preserving Solution for Location and Content Protection
                  in Location-Based Services},
  journal      = {Sensors},
  volume       = {20},
  number       = {16},
  pages        = {4651},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20164651},
  doi          = {10.3390/S20164651},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/CuiGLSZWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangWLZJ20,
  author       = {Shuo Zhang and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A Multi-User Public Key Encryption with Multi-Keyword Search out of
                  Bilinear Pairings},
  journal      = {Sensors},
  volume       = {20},
  number       = {23},
  pages        = {6962},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20236962},
  doi          = {10.3390/S20236962},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangWLZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoQGZLJW20,
  author       = {Wei Guo and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Hua Zhang and
                  Wenmin Li and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {Comments on "Provable Multicopy Dynamic Data Possession in Cloud
                  Computing Systems"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2584--2586},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2970591},
  doi          = {10.1109/TIFS.2020.2970591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoQGZLJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhangQTGGW20,
  author       = {Hua Zhang and
                  Boqin Qin and
                  Tengfei Tu and
                  Ziqing Guo and
                  Fei Gao and
                  Qiaoyan Wen},
  title        = {An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing
                  for Real-Time Substation Communications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {1},
  pages        = {658--668},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2948113},
  doi          = {10.1109/TII.2019.2948113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhangQTGGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ZhangLWZJ20,
  author       = {Shuo Zhang and
                  Wenmin Li and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A Flexible {KP-ABE} Suit for Mobile User Realizing Decryption Outsourcing
                  and Attribute Revocation},
  journal      = {Wirel. Pers. Commun.},
  volume       = {114},
  number       = {4},
  pages        = {2783--2800},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-020-07503-y},
  doi          = {10.1007/S11277-020-07503-Y},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ZhangLWZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cncert/2020,
  editor       = {Wei Lu and
                  Qiaoyan Wen and
                  Yuqing Zhang and
                  Bo Lang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li and
                  Li Ding and
                  Ruiguang Li and
                  Yu Zhou},
  title        = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing,
                  China, August 12, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1299},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4922-3},
  doi          = {10.1007/978-981-33-4922-3},
  isbn         = {978-981-33-4921-6},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiLJZW19,
  author       = {Zhidan Li and
                  Wenmin Li and
                  Zhengping Jin and
                  Hua Zhang and
                  Qiaoyan Wen},
  title        = {An Efficient {ABE} Scheme With Verifiable Outsourced Encryption and
                  Decryption},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {29023--29037},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2890565},
  doi          = {10.1109/ACCESS.2018.2890565},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiLJZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DuWZ19,
  author       = {Hongzhen Du and
                  Qiaoyan Wen and
                  Shanshan Zhang},
  title        = {An Efficient Certificateless Aggregate Signature Scheme Without Pairings
                  for Healthcare Wireless Sensor Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {42683--42693},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2907298},
  doi          = {10.1109/ACCESS.2019.2907298},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DuWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangGWZ19,
  author       = {Huawei Wang and
                  Dianli Guo and
                  Qiaoyan Wen and
                  Hua Zhang},
  title        = {A Robust Authentication Scheme for Multiple Servers Architecture},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {111222--111231},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2932181},
  doi          = {10.1109/ACCESS.2019.2932181},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangGWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangGWZ19a,
  author       = {Huawei Wang and
                  Dianli Guo and
                  Qiaoyan Wen and
                  Hua Zhang},
  title        = {Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {161340--161349},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2948851},
  doi          = {10.1109/ACCESS.2019.2948851},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangGWZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenLGYLZW19,
  author       = {Yang Chen and
                  Wenmin Li and
                  Fei Gao and
                  Wei Yin and
                  Kaitai Liang and
                  Hua Zhang and
                  Qiaoyan Wen},
  title        = {Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1748--1760},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz052},
  doi          = {10.1093/COMJNL/BXZ052},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChenLGYLZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GuoZQGJLW19,
  author       = {Wei Guo and
                  Hua Zhang and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Zhengping Jin and
                  Wenmin Li and
                  Qiaoyan Wen},
  title        = {Outsourced dynamic provable data possession with batch update for
                  secure cloud storage},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {95},
  pages        = {309--322},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.01.009},
  doi          = {10.1016/J.FUTURE.2019.01.009},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/GuoZQGJLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLWCYL19,
  author       = {Zhidan Li and
                  Wenmin Li and
                  Qiaoyan Wen and
                  Jiageng Chen and
                  Wei Yin and
                  Kaitai Liang},
  title        = {An efficient blind filter: Location privacy protection and the access
                  control in FinTech},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {100},
  pages        = {797--810},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.04.026},
  doi          = {10.1016/J.FUTURE.2019.04.026},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiLWCYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GuoWJZL19,
  author       = {Dianli Guo and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Hua Zhang and
                  Wenmin Li},
  title        = {Authenticated public key broadcast encryption with short ciphertexts},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {16},
  pages        = {23399--23414},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7598-0},
  doi          = {10.1007/S11042-019-7598-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/GuoWJZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GuoLWW19,
  author       = {Fen{-}Zhuo Guo and
                  Li Liu and
                  Ankang Wang and
                  Qiao{-}Yan Wen},
  title        = {Practical covert quantum key distribution with decoy-state method},
  journal      = {Quantum Inf. Process.},
  volume       = {18},
  number       = {4},
  pages        = {95},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11128-019-2181-1},
  doi          = {10.1007/S11128-019-2181-1},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/GuoLWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiGCW19,
  author       = {Dandan Li and
                  Fei Gao and
                  Ya Cao and
                  Qiao{-}Yan Wen},
  title        = {The critical detection efficiency for closing the detection loophole
                  of some modified Bell inequalities},
  journal      = {Quantum Inf. Process.},
  volume       = {18},
  number       = {4},
  pages        = {123},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11128-019-2238-1},
  doi          = {10.1007/S11128-019-2238-1},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiGCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiGZW19,
  author       = {Lv{-}Jun Li and
                  Fei Gao and
                  Zhi{-}Chao Zhang and
                  Qiao{-}Yan Wen},
  title        = {Using entanglement more efficiently in distinguishing orthogonal product
                  states by {LOCC}},
  journal      = {Quantum Inf. Process.},
  volume       = {18},
  number       = {11},
  pages        = {330},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11128-019-2441-0},
  doi          = {10.1007/S11128-019-2441-0},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiGZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangGZW19,
  author       = {Huawei Wang and
                  Dianli Guo and
                  Hua Zhang and
                  Qiaoyan Wen},
  title        = {Robust Multiple Servers Architecture Based Authentication Scheme Preserving
                  Anonymity},
  journal      = {Sensors},
  volume       = {19},
  number       = {14},
  pages        = {3144},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19143144},
  doi          = {10.3390/S19143144},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/WangGZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/LuWYLJPC19,
  author       = {Xiuhua Lu and
                  Qiaoyan Wen and
                  Wei Yin and
                  Kaitai Liang and
                  Zhengping Jin and
                  Emmanouil Panaousis and
                  Jiageng Chen},
  title        = {Quantum-Resistant Identity-Based Signature with Message Recovery and
                  Proxy Delegation},
  journal      = {Symmetry},
  volume       = {11},
  number       = {2},
  pages        = {272},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11020272},
  doi          = {10.3390/SYM11020272},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/LuWYLJPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/YuWNLSZJ19,
  author       = {Ping Yu and
                  Qiaoyan Wen and
                  Wei Ni and
                  Wenmin Li and
                  Caijun Sun and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {Decentralized, Revocable and Verifiable Attribute-Based Encryption
                  in Hybrid Cloud System},
  journal      = {Wirel. Pers. Commun.},
  volume       = {106},
  number       = {2},
  pages        = {719--738},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11277-019-06187-3},
  doi          = {10.1007/S11277-019-06187-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/YuWNLSZJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-10857,
  author       = {Yusen Wu and
                  Chao{-}Hua Yu and
                  Su{-}Juan Qin and
                  Qiaoyan Wen and
                  Fei Gao},
  title        = {Bayesian machine learning for Boltzmann machine in quantum-enhanced
                  feature spaces},
  journal      = {CoRR},
  volume       = {abs/1912.10857},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.10857},
  eprinttype    = {arXiv},
  eprint       = {1912.10857},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-10857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLGYZWL19,
  author       = {Zhidan Li and
                  Wenmin Li and
                  Fei Gao and
                  Wei Yin and
                  Hua Zhang and
                  Qiaoyan Wen and
                  Kaitai Liang},
  title        = {Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword
                  Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1314},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1314},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLGYZWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YinWLZJ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {An Anti-Quantum Transaction Authentication Approach in Blockchain},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {5393--5401},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2788411},
  doi          = {10.1109/ACCESS.2017.2788411},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YinWLZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuYWJL18,
  author       = {Xiuhua Lu and
                  Wei Yin and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Wenmin Li},
  title        = {A Lattice-Based Unordered Aggregate Signature Scheme Based on the
                  Intersection Method},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {33986--33994},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2847411},
  doi          = {10.1109/ACCESS.2018.2847411},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LuYWJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenWLZJ18,
  author       = {Yang Chen and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {Generic Construction of Outsourced Attribute-Based Encryption Without
                  Key Escrow},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {58955--58966},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2875070},
  doi          = {10.1109/ACCESS.2018.2875070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChenWLZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YinWLZCYZ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Kaitai Liang and
                  Zhenfei Zhang and
                  Liqun Chen and
                  Hanbing Yan and
                  Hua Zhang},
  title        = {Delegation of Decryption Rights With Revocability From Learning With
                  Errors},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {61163--61175},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2875069},
  doi          = {10.1109/ACCESS.2018.2875069},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YinWLZCYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DuWZ18,
  author       = {Hongzhen Du and
                  Qiaoyan Wen and
                  Shanshan Zhang},
  title        = {A Provably-Secure Outsourced Revocable Certificateless Signature Scheme
                  Without Bilinear Pairings},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {73846--73855},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2880875},
  doi          = {10.1109/ACCESS.2018.2880875},
  timestamp    = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DuWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/GuoZSWL18,
  author       = {Ziqing Guo and
                  Hua Zhang and
                  Caijun Sun and
                  Qiaoyan Wen and
                  Wenmin Li},
  title        = {Secure multi-keyword ranked search over encrypted cloud data for multiple
                  data owners},
  journal      = {J. Syst. Softw.},
  volume       = {137},
  pages        = {380--395},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jss.2017.12.008},
  doi          = {10.1016/J.JSS.2017.12.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/GuoZSWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiGQW18,
  author       = {Dan{-}dan Li and
                  Fei Gao and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen},
  title        = {Perfect quantum multiple-unicast network coding protocol},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {1},
  pages        = {13},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-017-1781-x},
  doi          = {10.1007/S11128-017-1781-X},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiGQW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/QinWLGW18,
  author       = {Su{-}Juan Qin and
                  Yukun Wang and
                  Runze Li and
                  Fei Gao and
                  Qiao{-}Yan Wen},
  title        = {The randomness in 2 {\(\rightarrow\)} 1 quantum random access code
                  without a shared reference frame},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {10},
  pages        = {276},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-2040-5},
  doi          = {10.1007/S11128-018-2040-5},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/QinWLGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LuYWLCC18,
  author       = {Xiuhua Lu and
                  Wei Yin and
                  Qiaoyan Wen and
                  Kaitai Liang and
                  Liqun Chen and
                  Jiageng Chen},
  title        = {Message Integration Authentication in the Internet-of-Things via Lattice-Based
                  Batch Signatures},
  journal      = {Sensors},
  volume       = {18},
  number       = {11},
  pages        = {4056},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18114056},
  doi          = {10.3390/S18114056},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LuYWLCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiWLH18,
  author       = {Wenmin Li and
                  Qiaoyan Wen and
                  Xuelei Li and
                  Debiao He},
  title        = {Attribute-based fuzzy identity access control in multicloud computing
                  environments},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {12},
  pages        = {4071--4082},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-017-2616-5},
  doi          = {10.1007/S00500-017-2616-5},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiWLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/RaoTZWX18,
  author       = {Lu Rao and
                  Tengfei Tu and
                  Hua Zhang and
                  Qiaoyan Wen and
                  Jia Xiao},
  title        = {Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration
                  for Remote Storage Security},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {4186243:1--4186243:19},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/4186243},
  doi          = {10.1155/2018/4186243},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/RaoTZWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiZSWC18,
  author       = {Wenmin Li and
                  Shuo Zhang and
                  Qi Su and
                  Qiaoyan Wen and
                  Yang Chen},
  title        = {An Anonymous Authentication Protocol Based on Cloud for Telemedical
                  Systems},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {8131367:1--8131367:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8131367},
  doi          = {10.1155/2018/8131367},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiZSWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YinWLZJ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A New Insight - Proxy Re-encryption Under {LWE} with Strong Anti-collusion},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {559--577},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_36},
  doi          = {10.1007/978-3-319-99807-7\_36},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YinWLZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-06993,
  author       = {Xiaoqi Li and
                  Peng Jiang and
                  Ting Chen and
                  Xiapu Luo and
                  Qiaoyan Wen},
  title        = {A Survey on the Security of Blockchain Systems},
  journal      = {CoRR},
  volume       = {abs/1802.06993},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.06993},
  eprinttype    = {arXiv},
  eprint       = {1802.06993},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-06993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-08603,
  author       = {Ziqing Guo and
                  Hua Zhang and
                  Xin Zhang and
                  Zhengping Jin and
                  Qiaoyan Wen},
  title        = {Secure and Efficiently Searchable IoT Communication Data Management
                  Model: Using Blockchain as a new tool},
  journal      = {CoRR},
  volume       = {abs/1812.08603},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.08603},
  eprinttype    = {arXiv},
  eprint       = {1812.08603},
  timestamp    = {Thu, 03 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-08603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YinWLZCYZ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Kaitai Liang and
                  Zhenfei Zhang and
                  Liqun Chen and
                  Hanbing Yan and
                  Hua Zhang},
  title        = {Delegation of Decryption Rights with Revocability from Learning with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/777},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YinWLZCYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangMGW17,
  author       = {Peng Jiang and
                  Yi Mu and
                  Fuchun Guo and
                  Qiaoyan Wen},
  title        = {Secure-channel free keyword search with authorization in manager-centric
                  databases},
  journal      = {Comput. Secur.},
  volume       = {69},
  pages        = {50--64},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.11.015},
  doi          = {10.1016/J.COSE.2016.11.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangMGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijar/ZhuXW17,
  author       = {Ping Zhu and
                  Huiyang Xie and
                  Qiaoyan Wen},
  title        = {Rough approximations based on bisimulations},
  journal      = {Int. J. Approx. Reason.},
  volume       = {81},
  pages        = {49--62},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijar.2016.11.007},
  doi          = {10.1016/J.IJAR.2016.11.007},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijar/ZhuXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/YinWL0Z17,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Ping Zheng},
  title        = {Identity Based Proxy Re-encryption Scheme under {LWE}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {12},
  pages        = {6116--6132},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.12.023},
  doi          = {10.3837/TIIS.2017.12.023},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/YinWL0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/JiangMGW17,
  author       = {Peng Jiang and
                  Yi Mu and
                  Fuchun Guo and
                  Qiao{-}Yan Wen},
  title        = {Private Keyword-Search for Database Systems Against Insider Attacks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {32},
  number       = {3},
  pages        = {599--617},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11390-017-1745-8},
  doi          = {10.1007/S11390-017-1745-8},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/JiangMGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiLWZZ17,
  author       = {Wenmin Li and
                  Xuelei Li and
                  Qiao{-}Yan Wen and
                  Shuo Zhang and
                  Hua Zhang},
  title        = {Flexible {CP-ABE} Based Access Control on Encrypted Data for Mobile
                  Users in Hybrid Cloud System},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {32},
  number       = {5},
  pages        = {974--990},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11390-017-1776-1},
  doi          = {10.1007/S11390-017-1776-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LiLWZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XuW0QZ17,
  author       = {Guang{-}Bao Xu and
                  Qiao{-}Yan Wen and
                  Fei Gao and
                  Su{-}Juan Qin and
                  Huijuan Zuo},
  title        = {Local indistinguishability of multipartite orthogonal product bases},
  journal      = {Quantum Inf. Process.},
  volume       = {16},
  number       = {11},
  pages        = {276},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11128-017-1725-5},
  doi          = {10.1007/S11128-017-1725-5},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XuW0QZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TuR0WX17,
  author       = {Tengfei Tu and
                  Lu Rao and
                  Hua Zhang and
                  Qiaoyan Wen and
                  Jia Xiao},
  title        = {Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage
                  in Cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {4603237:1--4603237:17},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/4603237},
  doi          = {10.1155/2017/4603237},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TuR0WX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhuXW17,
  author       = {Ping Zhu and
                  Huiyang Xie and
                  Qiaoyan Wen},
  title        = {A unified view of consistent functions},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {9},
  pages        = {2189--2199},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2133-y},
  doi          = {10.1007/S00500-016-2133-Y},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/ZhuXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/XuWLSH17,
  author       = {Jie Xu and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Jian Shen and
                  Debiao He},
  title        = {Succinct multi-authority attribute-based access control for circuits
                  with authenticated outsourcing},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {18},
  pages        = {5265--5279},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2244-5},
  doi          = {10.1007/S00500-016-2244-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/XuWLSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/FanQW17,
  author       = {Ya{-}Jun Fan and
                  Xue{-}Song Qiu and
                  Qiao{-}Yan Wen},
  editor       = {Weiming Shen and
                  Pedro Antunes and
                  Nguyen Hoang Thuan and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Jianming Yong},
  title        = {A privacy-preserving authenticated key agreement protocol with smart
                  cards for mobile emergency services},
  booktitle    = {21st {IEEE} International Conference on Computer Supported Cooperative
                  Work in Design, {CSCWD} 2017, Wellington, New Zealand, April 26-28,
                  2017},
  pages        = {227--232},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSCWD.2017.8066699},
  doi          = {10.1109/CSCWD.2017.8066699},
  timestamp    = {Fri, 28 Oct 2022 20:56:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/FanQW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/SunWL16,
  author       = {Haiyan Sun and
                  Qiaoyan Wen and
                  Wenmin Li},
  title        = {A strongly secure pairing-free certificateless authenticated key agreement
                  protocol under the {CDH} assumption},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {3},
  pages        = {32109:1--32109:16},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-015-5303-0},
  doi          = {10.1007/S11432-015-5303-0},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/SunWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/JiangMGWW16,
  author       = {Peng Jiang and
                  Yi Mu and
                  Fuchun Guo and
                  Xiaofen Wang and
                  Qiaoyan Wen},
  title        = {Online/Offline Ciphertext Retrieval on Resource Constrained Devices},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {7},
  pages        = {955--969},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv099},
  doi          = {10.1093/COMJNL/BXV099},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/JiangMGWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWZL16,
  author       = {Rui Wang and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Xuelei Li},
  title        = {A Novel Protocol-Feature Attack against Tor's Hidden Service},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {4},
  pages        = {839--849},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015ICP0001},
  doi          = {10.1587/TRANSINF.2015ICP0001},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWZQL16,
  author       = {Rui Wang and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Su{-}Juan Qin and
                  Wenmin Li},
  title        = {Transparent Discovery of Hidden Service},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {11},
  pages        = {2817--2820},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8100},
  doi          = {10.1587/TRANSINF.2016EDL8100},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWZQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiCWZ16,
  author       = {Dandan Li and
                  Zuling Chang and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {Linear complexity of generalised cyclotomic quaternary sequences of
                  length 2\emph{p} \({}^{\mbox{ \emph{m}+1}}\) \emph{q} \({}^{\mbox{
                  \emph{n}+1}}\)},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {104--111},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0006},
  doi          = {10.1049/IET-IFS.2015.0006},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiCWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/CaoGYZW16,
  author       = {Tian{-}Qing Cao and
                  Fei Gao and
                  Ying{-}Hui Yang and
                  Zhi{-}Chao Zhang and
                  Qiao{-}Yan Wen},
  title        = {Determination of locally perfect discrimination for two-qubit unitary
                  operations},
  journal      = {Quantum Inf. Process.},
  volume       = {15},
  number       = {1},
  pages        = {529--549},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11128-015-1175-x},
  doi          = {10.1007/S11128-015-1175-X},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/CaoGYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/GuoWL0J16,
  author       = {Dianli Guo and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {Adaptively Secure Broadcast Encryption With Constant Ciphertexts},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {62},
  number       = {3},
  pages        = {709--715},
  year         = {2016},
  url          = {https://doi.org/10.1109/TBC.2016.2550759},
  doi          = {10.1109/TBC.2016.2550759},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbc/GuoWL0J16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/XuWLJ16,
  author       = {Jie Xu and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Zhengping Jin},
  title        = {Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
                  Delegation in Cloud Computing},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {1},
  pages        = {119--129},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2392752},
  doi          = {10.1109/TPDS.2015.2392752},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/XuWLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiWL16,
  author       = {Xuelei Li and
                  Qiaoyan Wen and
                  Wenmin Li},
  title        = {A Three-Factor Based Remote User Authentication Scheme: Strengthening
                  Systematic Security and Personal Privacy for Wireless Communications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {86},
  number       = {3},
  pages        = {1593--1610},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-015-3008-8},
  doi          = {10.1007/S11277-015-3008-8},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangMGW16,
  author       = {Peng Jiang and
                  Yi Mu and
                  Fuchun Guo and
                  Qiaoyan Wen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Public Key Encryption with Authorized Keyword Search},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_11},
  doi          = {10.1007/978-3-319-40367-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangMGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuGHLW15,
  author       = {Bin Liu and
                  Fei Gao and
                  Wei Huang and
                  Dan Li and
                  Qiaoyan Wen},
  title        = {Controlling the key by choosing the detection bits in quantum cryptographic
                  protocols},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {11},
  pages        = {1--11},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5413-8},
  doi          = {10.1007/S11432-015-5413-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuGHLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/JiangWLJZ15,
  author       = {Peng Jiang and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Zhengping Jin and
                  Hua Zhang},
  title        = {An anonymous and efficient remote biometrics user authentication scheme
                  in a multi server environment},
  journal      = {Frontiers Comput. Sci.},
  volume       = {9},
  number       = {1},
  pages        = {142--156},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11704-014-3125-7},
  doi          = {10.1007/S11704-014-3125-7},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/JiangWLJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiWZJ15,
  author       = {Dandan Li and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Liying Jiang},
  title        = {Linear Complexity of Generalized Cyclotomic Binary Sequences with
                  Period 2\emph{p}\({}^{\mbox{\emph{m}+1}}\)\emph{q}\({}^{\mbox{\emph{n}+1}}\)},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {6},
  pages        = {1244--1254},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.1244},
  doi          = {10.1587/TRANSFUN.E98.A.1244},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiWZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChengW15,
  author       = {Lin Cheng and
                  Qiaoyan Wen},
  title        = {Cryptanalysis and improvement of a certificateless partially blind
                  signature},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {380--386},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0293},
  doi          = {10.1049/IET-IFS.2014.0293},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChengW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/ChengW15,
  author       = {Lin Cheng and
                  Qiaoyan Wen},
  title        = {Provably secure and efficient certificateless signature in the standard
                  model},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {7},
  number       = {2/3},
  pages        = {287--301},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICT.2015.068405},
  doi          = {10.1504/IJICT.2015.068405},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/ChengW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChengW15,
  author       = {Lin Cheng and
                  Qiaoyan Wen},
  title        = {An Improved Certificateless Signcryption in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {229--237},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p229-237.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChengW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChengW15a,
  author       = {Lin Cheng and
                  Qiaoyan Wen},
  title        = {An Improved Certificateless Signcryption in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {597--606},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p597-606.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChengW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChengWJZZ15,
  author       = {Lin Cheng and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Hua Zhang and
                  Liming Zhou},
  title        = {Cryptanalysis and improvement of a certificateless aggregate signature
                  scheme},
  journal      = {Inf. Sci.},
  volume       = {295},
  pages        = {337--346},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2014.09.065},
  doi          = {10.1016/J.INS.2014.09.065},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChengWJZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/GuoWLZJ15,
  author       = {Dianli Guo and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {An Improved Biometrics-Based Authentication Scheme for Telecare Medical
                  Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {3},
  pages        = {20},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0194-6},
  doi          = {10.1007/S10916-015-0194-6},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/GuoWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/GuoWLZJ15a,
  author       = {Dianli Guo and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A Novel Authentication Scheme Using Self-certified Public Keys for
                  Telecare Medical Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {6},
  pages        = {62:1--62:8},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0245-z},
  doi          = {10.1007/S10916-015-0245-Z},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/GuoWLZJ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/YangGTCZW15,
  author       = {Ying{-}Hui Yang and
                  Fei Gao and
                  Guo{-}Jing Tian and
                  Tian{-}Qing Cao and
                  Huijuan Zuo and
                  Qiao{-}Yan Wen},
  title        = {Bound on local unambiguous discrimination between multipartite quantum
                  states},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {2},
  pages        = {731--737},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-014-0870-3},
  doi          = {10.1007/S11128-014-0870-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/YangGTCZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiuTWG15,
  author       = {Feng Liu and
                  Guo{-}Jing Tian and
                  Qiao{-}Yan Wen and
                  Fei Gao},
  title        = {General bounds for quantum discord and discord distance},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {4},
  pages        = {1333--1341},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-0944-x},
  doi          = {10.1007/S11128-015-0944-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiuTWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/CaoGZYW15,
  author       = {Tian{-}Qing Cao and
                  Fei Gao and
                  Zhi{-}Chao Zhang and
                  Ying{-}Hui Yang and
                  Qiao{-}Yan Wen},
  title        = {Perfect discrimination of projective measurements with the rank of
                  all projectors being one},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {7},
  pages        = {2645--2656},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-0992-2},
  doi          = {10.1007/S11128-015-0992-2},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/CaoGZYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangGQZW15,
  author       = {Zhi{-}Chao Zhang and
                  Fei Gao and
                  Su{-}Juan Qin and
                  Huijuan Zuo and
                  Qiao{-}Yan Wen},
  title        = {Local distinguishability of maximally entangled states in canonical
                  form},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {10},
  pages        = {3961--3969},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-1092-z},
  doi          = {10.1007/S11128-015-1092-Z},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangGQZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunW15,
  author       = {Yi Sun and
                  Qiaoyan Wen},
  title        = {A general two-party bi-input private function evaluation protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2536--2544},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1197},
  doi          = {10.1002/SEC.1197},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunWZJ15,
  author       = {Haiyan Sun and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A strongly secure identity-based authenticated key agreement protocol
                  without pairings under the {GDH} assumption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3167--3179},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1241},
  doi          = {10.1002/SEC.1241},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunWZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GuoWLZJ15,
  author       = {Dianli Guo and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic {ID}
                  Authenticated Key Agreement Scheme'},
  journal      = {Wirel. Pers. Commun.},
  volume       = {83},
  number       = {1},
  pages        = {35--48},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-015-2378-2},
  doi          = {10.1007/S11277-015-2378-2},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GuoWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmmm/SunWZL14,
  author       = {Yi Sun and
                  Qiaoyan Wen and
                  Yudong Zhang and
                  Wenmin Li},
  title        = {Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure
                  Two-Party Computation in Wireless Sensor Networks},
  journal      = {Comput. Math. Methods Medicine},
  volume       = {2014},
  pages        = {214841:1--214841:9},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/214841},
  doi          = {10.1155/2014/214841},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmmm/SunWZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ChengWJZ14,
  author       = {Lin Cheng and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Hua Zhang},
  title        = {Cryptanalysis and improvement of a certificateless encryption scheme
                  in the standard model},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {1},
  pages        = {163--173},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-013-3090-6},
  doi          = {10.1007/S11704-013-3090-6},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ChengWJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LuWJWY14,
  author       = {Xiuhua Lu and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Licheng Wang and
                  Chunli Yang},
  title        = {A lattice-based signcryption scheme without random oracles},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {4},
  pages        = {667--675},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-014-3163-1},
  doi          = {10.1007/S11704-014-3163-1},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LuWJWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/ZhuXW14,
  author       = {Ping Zhu and
                  Huiyang Xie and
                  Qiaoyan Wen},
  title        = {A Unified Definition of Consistent Functions},
  journal      = {Fundam. Informaticae},
  volume       = {135},
  number       = {3},
  pages        = {331--340},
  year         = {2014},
  url          = {https://doi.org/10.3233/FI-2014-1125},
  doi          = {10.3233/FI-2014-1125},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fuin/ZhuXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiWZC14,
  author       = {Dan{-}dan Li and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Zuling Chang},
  title        = {Linear Complexity of Generalized Cyclotomic Quaternary Sequences with
                  Period \emph{pq}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {5},
  pages        = {1153--1158},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1153},
  doi          = {10.1587/TRANSFUN.E97.A.1153},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiWZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DuW14,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Security analysis of two certificateless short signature schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {230--233},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0080},
  doi          = {10.1049/IET-IFS.2013.0080},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DuWZP14,
  author       = {Jiao Du and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Shanqi Pang},
  title        = {Constructions of resilient rotation symmetric boolean functions on
                  given number of variables},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {265--272},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0090},
  doi          = {10.1049/IET-IFS.2013.0090},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DuWZP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhouW14,
  author       = {Liming Zhou and
                  Qiaoyan Wen},
  title        = {Energy Efficient Source Location Privacy Protecting Scheme in Wireless
                  Sensor Networks Using Ant Colony Optimization},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/920510},
  doi          = {10.1155/2014/920510},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhouW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/DuW14,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Certificateless proxy multi-signature},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {21--30},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.043},
  doi          = {10.1016/J.INS.2014.02.043},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/DuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LuWLWZ14,
  author       = {Xiuhua Lu and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Licheng Wang and
                  Hua Zhang},
  title        = {A Fuzzy Identity-Based Signcryption Scheme from Lattices},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {11},
  pages        = {4203--4225},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.11.031},
  doi          = {10.3837/TIIS.2014.11.031},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/LuWLWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/XuZWJZH14,
  author       = {Xin Xu and
                  Ping Zhu and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Hua Zhang and
                  Lian He},
  title        = {A Secure and Efficient Authentication and Key Agreement Scheme Based
                  on {ECC} for Telecare Medicine Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {38},
  number       = {1},
  pages        = {9994},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10916-013-9994-8},
  doi          = {10.1007/S10916-013-9994-8},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/XuZWJZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/LiWLZJ14,
  author       = {Xuelei Li and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {Secure Privacy-Preserving Biometric Authentication Scheme for Telecare
                  Medicine Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {38},
  number       = {11},
  pages        = {139},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10916-014-0139-5},
  doi          = {10.1007/S10916-014-0139-5},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/LiWLZJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiWQGS14,
  author       = {Yan{-}Bing Li and
                  Qiaoyan Wen and
                  Su{-}Juan Qin and
                  Fen{-}Zhuo Guo and
                  Ying Sun},
  title        = {Practical quantum all-or-nothing oblivious transfer protocol},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {1},
  pages        = {131--139},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0550-8},
  doi          = {10.1007/S11128-013-0550-8},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiWQGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiWLQY14,
  author       = {Yan{-}Bing Li and
                  Qiaoyan Wen and
                  Zi{-}Chen Li and
                  Su{-}Juan Qin and
                  Ya{-}Tao Yang},
  title        = {Cheat sensitive quantum bit commitment via pre- and post-selected
                  quantum states},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {1},
  pages        = {141--149},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0566-0},
  doi          = {10.1007/S11128-013-0566-0},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiWLQY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HuangWLGS14,
  author       = {Wei Huang and
                  Qiaoyan Wen and
                  Bin Liu and
                  Fei Gao and
                  Ying Sun},
  title        = {Quantum key agreement with {EPR} pairs and single-particle measurements},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {3},
  pages        = {649--663},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0680-z},
  doi          = {10.1007/S11128-013-0680-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/HuangWLGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangWGTC14,
  author       = {Zhi{-}Chao Zhang and
                  Qiaoyan Wen and
                  Fei Gao and
                  Guo{-}Jing Tian and
                  Tian{-}Qing Cao},
  title        = {One-way {LOCC} indistinguishability of maximally entangled states},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {3},
  pages        = {795--804},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0691-9},
  doi          = {10.1007/S11128-013-0691-9},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangWGTC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/YangMGW14,
  author       = {Qian Yang and
                  Jia{-}Jun Ma and
                  Fen{-}Zhuo Guo and
                  Qiaoyan Wen},
  title        = {Semi-loss-tolerant strong quantum coin-flipping protocol using quantum
                  non-demolition measurement},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {7},
  pages        = {1537--1544},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0747-5},
  doi          = {10.1007/S11128-014-0747-5},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/YangMGW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HuangWLSG14,
  author       = {Wei Huang and
                  Qiaoyan Wen and
                  Bin Liu and
                  Qi Su and
                  Fei Gao},
  title        = {Cryptanalysis of a multi-party quantum key agreement protocol with
                  single particles},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {7},
  pages        = {1651--1657},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0758-2},
  doi          = {10.1007/S11128-014-0758-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/HuangWLSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XuWGQ14,
  author       = {Guang{-}Bao Xu and
                  Qiaoyan Wen and
                  Fei Gao and
                  Su{-}Juan Qin},
  title        = {Novel multiparty quantum key agreement protocol with {GHZ} states},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {12},
  pages        = {2587--2594},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0816-9},
  doi          = {10.1007/S11128-014-0816-9},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XuWGQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/YuW14,
  author       = {Xiaojun Yu and
                  Qiaoyan Wen},
  title        = {{MF-PDP:} Multi-function provable data possession scheme in cloud
                  computing},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2014, Shenzhen, China, November 27-29, 2014},
  pages        = {597--603},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CCIS.2014.7175805},
  doi          = {10.1109/CCIS.2014.7175805},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/YuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GaoLHW14,
  author       = {Fei Gao and
                  Bin Liu and
                  Wei Huang and
                  Qiao{-}Yan Wen},
  title        = {Post-processing of the oblivious key in quantum private queries},
  journal      = {CoRR},
  volume       = {abs/1406.0589},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.0589},
  eprinttype    = {arXiv},
  eprint       = {1406.0589},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GaoLHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuW14,
  author       = {Xiaojun Yu and
                  Qiaoyan Wen},
  title        = {A Multi-Function Provable Data Possession Scheme in Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/606},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/SunWZJ13,
  author       = {Haiyan Sun and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A novel pairing-free certificateless authenticated key agreement protocol
                  with provable security},
  journal      = {Frontiers Comput. Sci.},
  volume       = {7},
  number       = {4},
  pages        = {544--557},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11704-013-2305-1},
  doi          = {10.1007/S11704-013-2305-1},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/SunWZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWZ13,
  author       = {Huijuan Wang and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {The Properties of the FCSR-Based Self-Shrinking Sequence},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {2},
  pages        = {626--634},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.626},
  doi          = {10.1587/TRANSFUN.E96.A.626},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoWZ13,
  author       = {Lu Zhao and
                  Qiao{-}Yan Wen and
                  Jie Zhang},
  title        = {On the Linear Complexity of a Class of Quaternary Sequences with Low
                  Autocorrelation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {5},
  pages        = {997--1000},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.997},
  doi          = {10.1587/TRANSFUN.E96.A.997},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DuWZP13,
  author       = {Jiao Du and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Shanqi Pang},
  title        = {Construction and Counting of 1-Resilient Rotation Symmetric Boolean
                  Functions on \emph{pq} Variables},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {7},
  pages        = {1653--1656},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1653},
  doi          = {10.1587/TRANSFUN.E96.A.1653},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DuWZP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DuWZL13,
  author       = {Jiao Du and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Xin Liao},
  title        = {New Construction of Symmetric Orthogonal Arrays of Strength \emph{t}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {9},
  pages        = {1901--1904},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1901},
  doi          = {10.1587/TRANSFUN.E96.A.1901},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DuWZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiaoWS013,
  author       = {Xin Liao and
                  Qiaoyan Wen and
                  Ting{-}Ting Song and
                  Jie Zhang},
  title        = {Quantum Steganography with High Efficiency with Noisy Depolarizing
                  Channels},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {10},
  pages        = {2039--2044},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.2039},
  doi          = {10.1587/TRANSFUN.E96.A.2039},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiaoWS013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MaW0Z13,
  author       = {Xiuwen Ma and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Huijuan Zuo},
  title        = {New Perfect Gaussian Integer Sequences of Period \emph{pq}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {11},
  pages        = {2290--2293},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.2290},
  doi          = {10.1587/TRANSFUN.E96.A.2290},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MaW0Z13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiaoW013,
  author       = {Xin Liao and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {Improving the Adaptive Steganographic Methods Based on Modulus Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {12},
  pages        = {2731--2734},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.2731},
  doi          = {10.1587/TRANSFUN.E96.A.2731},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiaoW013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiWZJ13,
  author       = {Xuelei Li and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {An improved authentication with key agreement scheme on elliptic curve
                  cryptosystem for global mobility networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {5},
  pages        = {311--324},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1827},
  doi          = {10.1002/NEM.1827},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiWZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/WangWZ13,
  author       = {Huijuan Wang and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {{GLS:} New class of generalized Legendre sequences with optimal arithmetic
                  cross-correlation},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {47},
  number       = {4},
  pages        = {371--388},
  year         = {2013},
  url          = {https://doi.org/10.1051/ita/2013043},
  doi          = {10.1051/ITA/2013043},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/WangWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/SunWZJ13,
  author       = {Haiyan Sun and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement
                  Protocol for Low-Power Devices},
  journal      = {Inf. Technol. Control.},
  volume       = {42},
  number       = {2},
  pages        = {191--204},
  year         = {2013},
  url          = {https://doi.org/10.5755/j01.itc.42.2.1689},
  doi          = {10.5755/J01.ITC.42.2.1689},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/SunWZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/ZhuW13,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Operations on Soft Sets Revisited},
  journal      = {J. Appl. Math.},
  volume       = {2013},
  pages        = {105752:1--105752:7},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/105752},
  doi          = {10.1155/2013/105752},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jam/ZhuW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/GuoWSJZ13,
  author       = {Rui Guo and
                  Qiaoyan Wen and
                  Huixian Shi and
                  Zhengping Jin and
                  Hua Zhang},
  title        = {An Efficient and Provably-Secure Certificateless Public Key Encryption
                  Scheme for Telecare Medicine Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {37},
  number       = {5},
  pages        = {9965},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10916-013-9965-0},
  doi          = {10.1007/S10916-013-9965-0},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/GuoWSJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GaoLZWC13,
  author       = {Fei Gao and
                  Bin Liu and
                  Wei{-}Wei Zhang and
                  Qiao{-}Yan Wen and
                  Hui Chen},
  title        = {Is quantum key distribution suitable for steganography?},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {1},
  pages        = {625--630},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0408-5},
  doi          = {10.1007/S11128-012-0408-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/GaoLZWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangGLWC13,
  author       = {Wei{-}Wei Zhang and
                  Fei Gao and
                  Bin Liu and
                  Qiao{-}Yan Wen and
                  Hui Chen},
  title        = {A watermark strategy for quantum images based on quantum fourier transform},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {2},
  pages        = {793--803},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0423-6},
  doi          = {10.1007/S11128-012-0423-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangGLWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiuGJHZW13,
  author       = {Bin Liu and
                  Fei Gao and
                  Heng{-}Yue Jia and
                  Wei Huang and
                  Wei{-}Wei Zhang and
                  Qiao{-}Yan Wen},
  title        = {Efficient quantum private comparison employing single photons and
                  collective detection},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {2},
  pages        = {887--897},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0439-y},
  doi          = {10.1007/S11128-012-0439-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiuGJHZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiZGHWC13,
  author       = {Dan Li and
                  Jie Zhang and
                  Fen{-}Zhuo Guo and
                  Wei Huang and
                  Qiao{-}Yan Wen and
                  Hui Chen},
  title        = {Discrete-time interacting quantum walks and quantum Hash schemes},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {3},
  pages        = {1501--1513},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0421-8},
  doi          = {10.1007/S11128-012-0421-8},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiZGHWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiuGHW13,
  author       = {Bin Liu and
                  Fei Gao and
                  Wei Huang and
                  Qiao{-}Yan Wen},
  title        = {Multiparty quantum key agreement with single particles},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {4},
  pages        = {1797--1805},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0492-6},
  doi          = {10.1007/S11128-012-0492-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiuGHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/Li0MZW13,
  author       = {Dan Li and
                  Jie Zhang and
                  Xiuwen Ma and
                  Wei{-}Wei Zhang and
                  Qiao{-}Yan Wen},
  title        = {Analysis of the two-particle controlled interacting quantum walks},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {6},
  pages        = {2167--2176},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0516-2},
  doi          = {10.1007/S11128-012-0516-2},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/Li0MZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GuoGQ0W13,
  author       = {Fen{-}Zhuo Guo and
                  Fei Gao and
                  Su{-}Juan Qin and
                  Jie Zhang and
                  Qiao{-}Yan Wen},
  title        = {Quantum private comparison protocol based on entanglement swapping
                  of (d)-level Bell states},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {8},
  pages        = {2793--2802},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-013-0536-6},
  doi          = {10.1007/S11128-013-0536-6},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/GuoGQ0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SongWQZS13,
  author       = {Ting{-}Ting Song and
                  Qiao{-}Yan Wen and
                  Su{-}Juan Qin and
                  Wei{-}Wei Zhang and
                  Ying Sun},
  title        = {The general theory of three-party quantum secret sharing protocols
                  over phase-damping channels},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {10},
  pages        = {3291--3304},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-013-0600-2},
  doi          = {10.1007/S11128-013-0600-2},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/SongWQZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/WangWZ13,
  author       = {Hao Wang and
                  Qiaoyan Wen and
                  Zhao Zhang},
  title        = {Improvement of Peach Platform to Support GUI-Based Protocol State
                  Modeling},
  booktitle    = {2013 {IEEE} International Conference on Green Computing and Communications
                  (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom), Beijing, China, August 20-23,
                  2013},
  pages        = {1094--1097},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.188},
  doi          = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.188},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/greencom/WangWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ChengJWZ13,
  author       = {Lin Cheng and
                  Zhengping Jin and
                  Qiaoyan Wen and
                  Hua Zhang},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {A novel privacy preserving keyword searching for cloud storage},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {77--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596039},
  doi          = {10.1109/PST.2013.6596039},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ChengJWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-5091,
  author       = {Haiyan Sun and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin and
                  Wenmin Li},
  title        = {Cryptanalysis and improvement of two certificateless three-party authenticated
                  key agreement protocols},
  journal      = {CoRR},
  volume       = {abs/1301.5091},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.5091},
  eprinttype    = {arXiv},
  eprint       = {1301.5091},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-5091.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengWJZZ13,
  author       = {Lin Cheng and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Hua Zhang and
                  Liming Zhou},
  title        = {On the security of a certificateless aggregate signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengWJZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengWJZ13,
  author       = {Lin Cheng and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Hua Zhang},
  title        = {On the security of a certi cateless signature scheme in the standard
                  model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengWJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/LiWSJW12,
  author       = {Wenmin Li and
                  Qiaoyan Wen and
                  Qi Su and
                  Zhengping Jin and
                  Yanjiong Wang},
  title        = {An Anonymous Password-Authenticated and Key Exchange Protocol for
                  Roaming Services in Wireless Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {16},
  number       = {1-3},
  pages        = {29--44},
  year         = {2012},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-16-number-1-3-2012/ahswn-16-1-3-p-29-44/},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/LiWSJW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangSDW12,
  author       = {Jie Zhang and
                  ShouChao Song and
                  Jiao Du and
                  Qiaoyan Wen},
  title        = {On the construction of multi-output Boolean functions with optimal
                  algebraic immunity},
  journal      = {Sci. China Inf. Sci.},
  volume       = {55},
  number       = {7},
  pages        = {1617--1623},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11432-012-4597-4},
  doi          = {10.1007/S11432-012-4597-4},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangSDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiWSJ12,
  author       = {Wenmin Li and
                  Qiaoyan Wen and
                  Qi Su and
                  Zhengping Jin},
  title        = {An efficient and secure mobile payment protocol for restricted connectivity
                  scenarios in vehicular ad hoc network},
  journal      = {Comput. Commun.},
  volume       = {35},
  number       = {2},
  pages        = {188--195},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comcom.2011.09.003},
  doi          = {10.1016/J.COMCOM.2011.09.003},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiWSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LiaoWZZ12,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen and
                  Ze{-}li Zhao and
                  Jie Zhang},
  title        = {A Novel Steganographic Method with Four-Pixel Differencing and Modulus
                  Function},
  journal      = {Fundam. Informaticae},
  volume       = {118},
  number       = {3},
  pages        = {281--289},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-714},
  doi          = {10.3233/FI-2012-714},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/LiaoWZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoWZJ12,
  author       = {Lu Zhao and
                  Qiao{-}Yan Wen and
                  Jie Zhang and
                  Zhengping Jin},
  title        = {On the 2-Adic Complexity of Periodic Binary Sequences},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {367--371},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.367},
  doi          = {10.1587/TRANSFUN.E95.A.367},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoWZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiaoWZ12,
  author       = {Xin Liao and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {A Novel Steganographic Method with Four-Pixel Differencing and Exploiting
                  Modification Direction},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {7},
  pages        = {1189--1192},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.1189},
  doi          = {10.1587/TRANSFUN.E95.A.1189},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiaoWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZuoWMZ12,
  author       = {Huijuan Zuo and
                  Qiaoyan Wen and
                  Xiuwen Ma and
                  Jie Zhang},
  title        = {A General Construction of Low Correlation Zone Sequence Sets Based
                  on Finite Fields and Balanced Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {10},
  pages        = {1792--1795},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.1792},
  doi          = {10.1587/TRANSFUN.E95.A.1792},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZuoWMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangQWZ12,
  author       = {Xuan Zhang and
                  Jing Qin and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {A General Construction of Sequences with Good Autocorrelation over
                  the 16-QAM Constellation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {10},
  pages        = {1801--1805},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.1801},
  doi          = {10.1587/TRANSFUN.E95.A.1801},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangQWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijar/ZhuW12,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Entropy and co-entropy of a covering approximation space},
  journal      = {Int. J. Approx. Reason.},
  volume       = {53},
  number       = {4},
  pages        = {528--540},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijar.2011.12.004},
  doi          = {10.1016/J.IJAR.2011.12.004},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijar/ZhuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhuW12b,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Information-theoretic measures associated with rough set approximations},
  journal      = {Inf. Sci.},
  volume       = {212},
  pages        = {33--43},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.05.014},
  doi          = {10.1016/J.INS.2012.05.014},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhuW12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/ZhaoW12,
  author       = {Lu Zhao and
                  Qiao{-}Yan Wen},
  title        = {On the joint 2-adic complexity of binary multisequences},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {46},
  number       = {3},
  pages        = {401--412},
  year         = {2012},
  url          = {https://doi.org/10.1051/ita/2012011},
  doi          = {10.1051/ITA/2012011},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/ZhaoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZJZW12,
  author       = {Min Zhang and
                  Jie Zhang and
                  Zhengping Jin and
                  Hua Zhang and
                  Qiao{-}Yan Wen},
  title        = {A Light-Weight Rainbow Signature Scheme for {WSN}},
  journal      = {J. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1272--1279},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.8.1272-1279},
  doi          = {10.4304/JNW.7.8.1272-1279},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZJZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/MaGYLW12,
  author       = {Jia{-}Jun Ma and
                  Fen{-}Zhuo Guo and
                  Qian Yang and
                  Yan{-}Bing Li and
                  Qiao{-}Yan Wen},
  title        = {Semi-loss-tolerant strong coin flipping protocol using {EPR} pairs},
  journal      = {Quantum Inf. Comput.},
  volume       = {12},
  number       = {5-6},
  pages        = {490--501},
  year         = {2012},
  url          = {https://doi.org/10.26421/QIC12.5-6-9},
  doi          = {10.26421/QIC12.5-6-9},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/MaGYLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SunGYLW12,
  author       = {Ying Sun and
                  Fei Gao and
                  Zheng Yuan and
                  Yan{-}Bing Li and
                  Qiao{-}Yan Wen},
  title        = {Splitting a quantum secret without the assistance of entanglements},
  journal      = {Quantum Inf. Process.},
  volume       = {11},
  number       = {6},
  pages        = {1741--1750},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11128-011-0328-9},
  doi          = {10.1007/S11128-011-0328-9},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/SunGYLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/WangWSZ12,
  author       = {Zhaoxing Wang and
                  Qiaoyan Wen and
                  Yi Sun and
                  Hua Zhang},
  title        = {A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless
                  Sensor Networks},
  booktitle    = {12th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012},
  pages        = {921--925},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIT.2012.190},
  doi          = {10.1109/CIT.2012.190},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/WangWSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/QianW12,
  author       = {Han Qian and
                  Qiaoyan Wen},
  title        = {A cloud-based system for enhancing security of Android devices},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {245--249},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664405},
  doi          = {10.1109/CCIS.2012.6664405},
  timestamp    = {Sun, 08 Aug 2021 01:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/QianW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/YuW12,
  author       = {Yang Yu and
                  Qiaoyan Wen},
  title        = {The design of the cloud mobile {OA} system},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {250--254},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664406},
  doi          = {10.1109/CCIS.2012.6664406},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/YuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/ZhangW12,
  author       = {Zhaohai Zhang and
                  Qiaoyan Wen},
  title        = {An authorization model for multi-tenancy services in cloud},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {260--263},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664408},
  doi          = {10.1109/CCIS.2012.6664408},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/ZhangW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/LiSW12a,
  author       = {Xiaowei Li and
                  Hongxiang Sun and
                  Qiaoyan Wen},
  title        = {An approach for secure-communication between {XEN} virtual machines},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {283--286},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664413},
  doi          = {10.1109/CCIS.2012.6664413},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/LiSW12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/ChenW12a,
  author       = {Wei Chen and
                  Qiaoyan Wen},
  title        = {An architecture for dynamic management and monitoring of virtual machines},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {444--448},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664445},
  doi          = {10.1109/CCIS.2012.6664445},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/ChenW12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/ChenWL12,
  author       = {Wei Chen and
                  Qiaoyan Wen and
                  Bohou Li},
  title        = {A propagation model of passive social network worm},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {524--528},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664229},
  doi          = {10.1109/CCIS.2012.6664229},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/ChenWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/HeMWM12,
  author       = {Haiguo He and
                  Jiao Mo and
                  Qiaoyan Wen and
                  Zishan Meng},
  title        = {Node information in {WSN} from the business perspective},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {1028--1031},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664537},
  doi          = {10.1109/CCIS.2012.6664537},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/HeMWM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CuiW12,
  author       = {Jie Cui and
                  Qiaoyan Wen},
  title        = {Analysis on Operating Mechanism of SecurityKISS},
  booktitle    = {Eighth International Conference on Computational Intelligence and
                  Security, {CIS} 2012, Guangzhou, China, November 17-18, 2012},
  pages        = {666--669},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIS.2012.153},
  doi          = {10.1109/CIS.2012.153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CuiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/FanW12,
  author       = {Ya{-}Jun Fan and
                  Qiao{-}Yan Wen},
  editor       = {Liang Gao and
                  Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Jianming Yong and
                  Wenfeng Li and
                  Weidong Li},
  title        = {A smart card-based secure software distribution scheme for mobile
                  application market},
  booktitle    = {{IEEE} 16th International Conference on Computer Supported Cooperative
                  Work in Design, {CSCWD} 2012, May 23-25, 2012, Wuhan, China},
  pages        = {244--250},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSCWD.2012.6221825},
  doi          = {10.1109/CSCWD.2012.6221825},
  timestamp    = {Mon, 10 Oct 2022 09:54:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/FanW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdma/ZhangWT12,
  author       = {Zhao Zhang and
                  Qiao{-}Yan Wen and
                  Wen Tang},
  title        = {Mining Protocol State Machines by Interactive Grammar Inference},
  booktitle    = {Third International Conference on Digital Manufacturing {\&} Automation,
                  {ICDMA} 2012, Guilin, China, July 31 - Aug. 2, 2012},
  pages        = {524--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDMA.2012.125},
  doi          = {10.1109/ICDMA.2012.125},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdma/ZhangWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/WangWWZ12,
  author       = {Zhaoxing Wang and
                  Qiaoyan Wen and
                  Teng Wang and
                  Hua Zhang},
  title        = {A Fault Detection Method for Wireless Sensor Networks Based on Credible
                  Sensor Nodes Set},
  booktitle    = {Ninth {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2012, Hangzhou, China, September 9-11, 2012},
  pages        = {260--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICEBE.2012.49},
  doi          = {10.1109/ICEBE.2012.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/WangWWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnidc/WuHZW12,
  author       = {Yanfang Wu and
                  Zheng Huang and
                  Jie Zhang and
                  Qiaoyan Wen},
  title        = {A lattice-based digital signature from the Ring-LWE},
  booktitle    = {3rd {IEEE} International Conference on Network Infrastructure and
                  Digital Content, {IC-NIDC} 2012, Beijing, China, September 21-23,
                  2012},
  pages        = {646--651},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNIDC.2012.6418835},
  doi          = {10.1109/ICNIDC.2012.6418835},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icnidc/WuHZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-2857,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Operations on soft sets revisited},
  journal      = {CoRR},
  volume       = {abs/1205.2857},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.2857},
  eprinttype    = {arXiv},
  eprint       = {1205.2857},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-2857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZhuW11,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Affine braid groups: a better platform than braid groups for cryptology?},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {22},
  number       = {5-6},
  pages        = {375--391},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00200-011-0157-1},
  doi          = {10.1007/S00200-011-0157-1},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZhuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/ZhuW11,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Homomorphisms between fuzzy information systems revisited},
  journal      = {Appl. Math. Lett.},
  volume       = {24},
  number       = {9},
  pages        = {1548--1553},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.aml.2011.03.044},
  doi          = {10.1016/J.AML.2011.03.044},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/appml/ZhuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JinW11,
  author       = {Zhengping Jin and
                  Qiaoyan Wen},
  title        = {Certificateless multi-proxy signature},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {344--352},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.06.013},
  doi          = {10.1016/J.COMCOM.2010.06.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/JinW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangWZ11,
  author       = {Xuan Zhang and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {A General Construction of {ZCZ} Sequence Set with Large Family Size
                  and Long Period},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {420--423},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.420},
  doi          = {10.1587/TRANSFUN.E94.A.420},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MaWZ11,
  author       = {Xiuwen Ma and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {New Constructions of Binary Sequences with Optimal Autocorrelation
                  Magnitude Based on Interleaving Technique},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {8},
  pages        = {1760--1763},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1760},
  doi          = {10.1587/TRANSFUN.E94.A.1760},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MaWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWZ11,
  author       = {Huijuan Wang and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {2-Adic Complexity of Self-Shrinking Sequence},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {11},
  pages        = {2462--2465},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.2462},
  doi          = {10.1587/TRANSFUN.E94.A.2462},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MaWZZ11,
  author       = {Xiuwen Ma and
                  Qiaoyan Wen and
                  Jie Zhang and
                  Xuan Zhang},
  title        = {New Constructions of Binary Sequences with Good Autocorrelation Based
                  on Interleaving Technique},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {12},
  pages        = {2874--2878},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.2874},
  doi          = {10.1587/TRANSFUN.E94.A.2874},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MaWZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgs/ZhuW11,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {A note on communicating between information systems based on including
                  degrees},
  journal      = {Int. J. Gen. Syst.},
  volume       = {40},
  number       = {8},
  pages        = {837--840},
  year         = {2011},
  url          = {https://doi.org/10.1080/03081079.2011.611805},
  doi          = {10.1080/03081079.2011.611805},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijgs/ZhuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LiaoWZ11,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen and
                  Jie Zhang},
  title        = {A steganographic method for digital images with four-pixel differencing
                  and modified {LSB} substitution},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {22},
  number       = {1},
  pages        = {1--8},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jvcir.2010.08.007},
  doi          = {10.1016/J.JVCIR.2010.08.007},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/LiaoWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/SongZQGW11,
  author       = {Ting{-}Ting Song and
                  Jie Zhang and
                  Su{-}Juan Qin and
                  Fei Gao and
                  Qiao{-}Yan Wen},
  title        = {Finite-key analysis for quantum key distribution with decoy states},
  journal      = {Quantum Inf. Comput.},
  volume       = {11},
  number       = {5{\&}6},
  pages        = {374--389},
  year         = {2011},
  url          = {https://doi.org/10.26421/QIC11.5-6-2},
  doi          = {10.26421/QIC11.5-6-2},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/SongZQGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/WangW11,
  author       = {Tian{-}Yin Wang and
                  Qiao{-}Yan Wen},
  title        = {Security of a kind of quantum secret sharing with single photons},
  journal      = {Quantum Inf. Comput.},
  volume       = {11},
  number       = {5{\&}6},
  pages        = {434--443},
  year         = {2011},
  url          = {https://doi.org/10.26421/QIC11.5-6-5},
  doi          = {10.26421/QIC11.5-6-5},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/WangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/YangTCW11,
  author       = {Yu{-}Guang Yang and
                  Yi{-}Wei Teng and
                  Hai{-}Ping Chai and
                  Qiao{-}Yan Wen},
  title        = {Revisiting the security of secure direct communication based on ping-pong
                  protocol[Quantum Inf. Process. 8, 347 {(2009)]}},
  journal      = {Quantum Inf. Process.},
  volume       = {10},
  number       = {3},
  pages        = {317--323},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11128-010-0199-5},
  doi          = {10.1007/S11128-010-0199-5},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/YangTCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/LiW11,
  author       = {Xiaobiao Li and
                  Qiaoyan Wen},
  title        = {A revocation scheme for the cloud computing environment},
  booktitle    = {2011 {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2011, Beijing, China, September 15-17, 2011},
  pages        = {254--258},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CCIS.2011.6045070},
  doi          = {10.1109/CCIS.2011.6045070},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/LiW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csise/ShiWL11,
  author       = {Sha Shi and
                  Qiaoyan Wen and
                  Mingzhu Li},
  editor       = {David Jin and
                  Sally Lin},
  title        = {Research on Mobile Electronically Published Materials Protection},
  booktitle    = {Advances in Computer Science, Intelligent System and Environment [Proceedings
                  of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {104},
  pages        = {125--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23777-5\_21},
  doi          = {10.1007/978-3-642-23777-5\_21},
  timestamp    = {Fri, 19 May 2017 01:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/csise/ShiWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csise/YanW11,
  author       = {Tao Yan and
                  Qiaoyan Wen},
  editor       = {David Jin and
                  Sally Lin},
  title        = {Building the Internet of Things Using a Mobile {RFID} Security Protocol
                  Based on Information Technology},
  booktitle    = {Advances in Computer Science, Intelligent System and Environment [Proceedings
                  of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {104},
  pages        = {143--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23777-5\_24},
  doi          = {10.1007/978-3-642-23777-5\_24},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csise/YanW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csise/ZhouWY11,
  author       = {Huixiang Zhou and
                  Qiaoyan Wen and
                  Xiaojun Yu},
  editor       = {David Jin and
                  Sally Lin},
  title        = {A Productive Time Length-Based Method for Multi-tenancy-Oriented Service
                  Usage Metering and Billing},
  booktitle    = {Advances in Computer Science, Intelligent System and Environment [Proceedings
                  of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {104},
  pages        = {163--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23777-5\_27},
  doi          = {10.1007/978-3-642-23777-5\_27},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csise/ZhouWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csise/ZhangSWS11,
  author       = {Xiaolan Zhang and
                  Hongxiang Sun and
                  Qiaoyan Wen and
                  Shi Sha},
  editor       = {David Jin and
                  Sally Lin},
  title        = {Study on the Technology of the Secure Computation in the Different
                  Adversarial Models},
  booktitle    = {Advances in Computer Science, Intelligent System and Environment [Proceedings
                  of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {104},
  pages        = {473--478},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23777-5\_77},
  doi          = {10.1007/978-3-642-23777-5\_77},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csise/ZhangSWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LiaoWS11,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen and
                  Sha Shi},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Distributed Steganography},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {153--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.20},
  doi          = {10.1109/IIHMSP.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LiaoWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptc/SunSWZ11,
  author       = {Yi Sun and
                  Hongxiang Sun and
                  Qiaoyan Wen and
                  Hua Zhang},
  title        = {A Deterministic Protocol for Rational Secret Sharing in Asynchronous
                  Model},
  booktitle    = {2nd International Symposium on Intelligence Information Processing
                  and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011},
  pages        = {5--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IPTC.2011.9},
  doi          = {10.1109/IPTC.2011.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iptc/SunSWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-0079,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Information-theoretic measures associated with rough set approximations},
  journal      = {CoRR},
  volume       = {abs/1102.0079},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.0079},
  eprinttype    = {arXiv},
  eprint       = {1102.0079},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-0079.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-0649,
  author       = {Min Zhang and
                  Jie Zhang and
                  Qiao{-}Yan Wen and
                  Zhengping Jin and
                  Hua Zhang},
  title        = {Analysis and improvement of a strongly secure certificateless key
                  exchange protocol without pairing},
  journal      = {CoRR},
  volume       = {abs/1112.0649},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.0649},
  eprinttype    = {arXiv},
  eprint       = {1112.0649},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-0649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/JinWD10,
  author       = {Zhengping Jin and
                  Qiaoyan Wen and
                  Hongzhen Du},
  title        = {An improved semantically-secure identity-based signcryption scheme
                  in the standard model},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {3},
  pages        = {545--552},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.12.009},
  doi          = {10.1016/J.COMPELECENG.2009.12.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/JinWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangWZ10,
  author       = {Xuan Zhang and
                  Qiaoyan Wen and
                  Jie Zhang},
  title        = {New General Constructions of {LCZ} Sequence Sets Based on Interleaving
                  Technique and Affine Transformations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {5},
  pages        = {942--949},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.942},
  doi          = {10.1587/TRANSFUN.E93.A.942},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhuW10,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Some improved results on communication between information systems},
  journal      = {Inf. Sci.},
  volume       = {180},
  number       = {18},
  pages        = {3521--3531},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ins.2010.05.028},
  doi          = {10.1016/J.INS.2010.05.028},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhuW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/LiaoWSZ10,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen and
                  Ying Sun and
                  Jie Zhang},
  title        = {Multi-party covert communication with steganography and quantum secret
                  sharing},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {10},
  pages        = {1801--1804},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2010.04.076},
  doi          = {10.1016/J.JSS.2010.04.076},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/LiaoWSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grc/ZhuW10,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  editor       = {Xiaohua Hu and
                  Tsau Young Lin and
                  Vijay V. Raghavan and
                  Jerzy W. Grzymala{-}Busse and
                  Qing Liu and
                  Andrei Z. Broder},
  title        = {Probabilistic Soft Sets},
  booktitle    = {2010 {IEEE} International Conference on Granular Computing, GrC 2010,
                  San Jose, California, USA, 14-16 August 2010},
  pages        = {635--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/GrC.2010.51},
  doi          = {10.1109/GRC.2010.51},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grc/ZhuW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wism/SunSZW10,
  author       = {Yi Sun and
                  Hongxiang Sun and
                  Hua Zhang and
                  Qiao{-}Yan Wen},
  editor       = {Fu Lee Wang and
                  Zhiguo Gong and
                  Xiangfeng Luo and
                  Jingsheng Lei},
  title        = {A Secure Protocol for Point-Segment Position Problem},
  booktitle    = {Web Information Systems and Mining - International Conference, {WISM}
                  2010, Sanya, China, October 23-24, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6318},
  pages        = {212--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16515-3\_27},
  doi          = {10.1007/978-3-642-16515-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wism/SunSZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-0449,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {A note on "communicating between information systems"},
  journal      = {CoRR},
  volume       = {abs/1002.0449},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.0449},
  eprinttype    = {arXiv},
  eprint       = {1002.0449},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-0449.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-0908,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {Homomorphisms between fuzzy information systems revisited},
  journal      = {CoRR},
  volume       = {abs/1002.0908},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.0908},
  eprinttype    = {arXiv},
  eprint       = {1002.0908},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-0908.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-1484,
  author       = {Ping Zhu and
                  Qiaoyan Wen},
  title        = {A note on communicating between information systems based on including
                  degrees},
  journal      = {CoRR},
  volume       = {abs/1008.1484},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.1484},
  eprinttype    = {arXiv},
  eprint       = {1008.1484},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-1484.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinWZ10,
  author       = {Zhengping Jin and
                  Qiaoyan Wen and
                  Hua Zhang},
  title        = {A supplement to Liu et al.'s certificateless signcryption scheme in
                  the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/DuW09,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Efficient and provably-secure certificateless short signature scheme
                  from bilinear pairings},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {2},
  pages        = {390--394},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.05.013},
  doi          = {10.1016/J.CSI.2008.05.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/DuW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangWZL09,
  author       = {Hua Zhang and
                  Qiao{-}Yan Wen and
                  Jie Zhang and
                  Wenmin Li},
  title        = {A constant rounds group key agreement protocol without using hash
                  functions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {457--464},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.720},
  doi          = {10.1002/NEM.720},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangWZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/QinGWZ09,
  author       = {Su{-}Juan Qin and
                  Fei Gao and
                  Qiao{-}Yan Wen and
                  Fu{-}Chen Zhu},
  title        = {Security of quantum secret sharing with two-particle entanglement
                  against individual attacks},
  journal      = {Quantum Inf. Comput.},
  volume       = {9},
  number       = {9{\&}10},
  pages        = {765--772},
  year         = {2009},
  url          = {https://doi.org/10.26421/QIC9.9-10-3},
  doi          = {10.26421/QIC9.9-10-3},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/QinGWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/LiaoW08,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen},
  title        = {Embedding in Two Least Significant Bits with Wet Paper Coding},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {555--558},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.970},
  doi          = {10.1109/CSSE.2008.970},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/LiaoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/LiW08a,
  author       = {Wenmin Li and
                  Qiao{-}Yan Wen},
  title        = {Efficient Verifier-Based Password-Authentication Key Exchange Protocol
                  via Elliptic Curves},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {1003--1006},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.1129},
  doi          = {10.1109/CSSE.2008.1129},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/LiW08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isecs/ZhangWC08,
  author       = {Qing Zhang and
                  Qiaoyan Wen and
                  Gengli Chen},
  editor       = {Fei Yu and
                  Qi Luo and
                  Yongjun Chen and
                  Zhigang Chen},
  title        = {Efficient Fair Contract Signing Protocol from Bilinear Pairings},
  booktitle    = {Proceedings of The International Symposium on Electronic Commerce
                  and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  pages        = {333--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISECS.2008.115},
  doi          = {10.1109/ISECS.2008.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isecs/ZhangWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinZDW08,
  author       = {Zhengping Jin and
                  Huijuan Zuo and
                  Hongzhen Du and
                  Qiaoyan Wen},
  title        = {An Efficient and Provably-Secure Identity-based Signcryption Scheme
                  for Multiple PKGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinZDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiaoW08,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen},
  title        = {Embedding in Two Least Significant Bits with Wet Paper Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiaoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuQ08,
  author       = {Lu Zhao and
                  Qiao{-}Yan Wen},
  title        = {2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence
                  by Either Inserting or Deleting k Symbols within One Period},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/259},
  timestamp    = {Sat, 06 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuW08,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Attack on Kang et al.'s Identity-Based Strong Designated Verifier
                  Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/GaoQWZ07,
  author       = {Fei Gao and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen and
                  Fu{-}Chen Zhu},
  title        = {A simple participant attack on the br{\'{a}}dler-du{\v{s}}ek
                  protocol},
  journal      = {Quantum Inf. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {329--334},
  year         = {2007},
  url          = {https://doi.org/10.26421/QIC7.4-4},
  doi          = {10.26421/QIC7.4-4},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/GaoQWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DuW07,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {725--729},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.168},
  doi          = {10.1109/CIS.2007.168},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/LiLWY07,
  author       = {Yu{-}Ying Li and
                  Lixiang Li and
                  Qiaoyan Wen and
                  Yixian Yang},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {Integer Programming via Chaotic Ant Swarm},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 4},
  pages        = {489--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.444},
  doi          = {10.1109/ICNC.2007.444},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/LiLWY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/ZhangWZ07,
  author       = {Xiufeng Zhang and
                  Qiaoyan Wen and
                  Fu{-}Chen Zhu},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {Object-Oriented Quantum Cryptography Simulation Model},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 4},
  pages        = {599--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.509},
  doi          = {10.1109/ICNC.2007.509},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/ZhangWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuW07,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Efficient and Provably-Secure Certificateless Short Signature Scheme
                  from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KeZW06,
  author       = {Pinhui Ke and
                  Jie Zhang and
                  Qiaoyan Wen},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Results on Almost Resilient Functions},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {421--432},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_29},
  doi          = {10.1007/11767480\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KeZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TongZW06,
  author       = {Xin Tong and
                  Jie Zhang and
                  Qiao{-}Yan Wen},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {New Constructions of Large Binary Sequences Family with Low Correlation},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_4},
  doi          = {10.1007/11937807\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TongZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/YuanWWZ06,
  author       = {Zheng Yuan and
                  Qiaoyan Wen and
                  Wenling Wu and
                  Qing Zhang},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {An \emph{ID}-Based Watermarking Scheme for Java Programs},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {848--857},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_85},
  doi          = {10.1007/11807964\_85},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/YuanWWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/LiLWY06,
  author       = {Yu{-}Ying Li and
                  Lixiang Li and
                  Qiao{-}Yan Wen and
                  Yixian Yang},
  editor       = {Licheng Jiao and
                  Lipo Wang and
                  Xinbo Gao and
                  Jing Liu and
                  Feng Wu},
  title        = {Data Fitting Via Chaotic Ant Swarm},
  booktitle    = {Advances in Natural Computation, Second International Conference,
                  {ICNC} 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4222},
  pages        = {180--183},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11881223\_23},
  doi          = {10.1007/11881223\_23},
  timestamp    = {Mon, 19 Apr 2021 14:35:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/LiLWY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuWL05,
  author       = {Tailin Liu and
                  Qiaoyan Wen and
                  Zihui Liu},
  title        = {Construction of nonbinary quantum cyclic codes by using graph method},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {48},
  number       = {6},
  pages        = {693--702},
  year         = {2005},
  url          = {https://doi.org/10.1360/04yf0368},
  doi          = {10.1360/04YF0368},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuWL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KeLW05,
  author       = {Pinhui Ke and
                  Tailin Liu and
                  Qiao{-}Yan Wen},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {Constructions of Almost Resilient Functions},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {236--246},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_20},
  doi          = {10.1007/11599371\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KeLW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenWW05,
  author       = {Fengtong Wen and
                  Wenling Wu and
                  Qiaoyan Wen},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Error Oracle Attacks on Several Modes of Operation},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {62--67},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_9},
  doi          = {10.1007/11596981\_9},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/GaoQWZ05,
  author       = {Fei Gao and
                  Su{-}Juan Qin and
                  Qiao{-}Yan Wen and
                  Fu{-}Chen Zhu},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {An Effective Attack on the Quantum Key Distribution Protocol Based
                  on Quantum Encryption},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {302--312},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_26},
  doi          = {10.1007/11599548\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/GaoQWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KeZW05,
  author       = {Pinhui Ke and
                  Jie Zhang and
                  Qiaoyan Wen},
  title        = {Further Constructions of Almost Resilient Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KeZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics