Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Qiaoyan Wen
@article{DBLP:journals/corr/abs-2403-09318, author = {Sheng{-}Yao Wu and Runze Li and Yan{-}Qi Song and Su{-}Juan Qin and Qiao{-}Yan Wen and Fei Gao}, title = {A Hierarchical Fused Quantum Fuzzy Neural Network for Image Classification}, journal = {CoRR}, volume = {abs/2403.09318}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.09318}, doi = {10.48550/ARXIV.2403.09318}, eprinttype = {arXiv}, eprint = {2403.09318}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-09318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CaiWDQGW23, author = {Bin{-}Bin Cai and Yusen Wu and Jing Dong and Su{-}Juan Qin and Fei Gao and Qiao{-}Yan Wen}, title = {Quantum Attacks on 1K-AES and {PRINCE}}, journal = {Comput. J.}, volume = {66}, number = {5}, pages = {1102--1110}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab216}, doi = {10.1093/COMJNL/BXAB216}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CaiWDQGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangZGWCW23, author = {Hua Zhang and Xin Zhang and Ziqing Guo and Huawei Wang and Dong Cui and Qiaoyan Wen}, title = {Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {14}, pages = {11985--11999}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2021.3121482}, doi = {10.1109/JIOT.2021.3121482}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangZGWCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiCGZZW23, author = {Wenmin Li and Yang Chen and Fei Gao and Shuo Zhang and Hua Zhang and Qiaoyan Wen}, title = {Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {14}, pages = {12090--12101}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2021.3128528}, doi = {10.1109/JIOT.2021.3128528}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiCGZZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DuWZG23, author = {Hongzhen Du and Qiaoyan Wen and Shanshan Zhang and Mingchu Gao}, title = {An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption for VANETs}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {20}, pages = {17881--17892}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3279896}, doi = {10.1109/JIOT.2023.3279896}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DuWZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SunWCQWG23, author = {Hong{-}Wei Sun and Chun{-}Yan Wei and Bin{-}Bin Cai and Su{-}Juan Qin and Qiao{-}Yan Wen and Fei Gao}, title = {Improved BV-based quantum attack on block ciphers}, journal = {Quantum Inf. Process.}, volume = {22}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.1007/s11128-022-03752-x}, doi = {10.1007/S11128-022-03752-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/SunWCQWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangWQGW23, author = {Xue Zhang and Chunyan Wei and Sujuan Qin and Fei Gao and Qiaoyan Wen}, title = {Practical efficient 1-out-of-n quantum oblivious transfer protocol}, journal = {Quantum Inf. Process.}, volume = {22}, number = {2}, pages = {99}, year = {2023}, url = {https://doi.org/10.1007/s11128-022-03817-x}, doi = {10.1007/S11128-022-03817-X}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangWQGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiLPQGW23, author = {Yong{-}Mei Li and Hai{-}Ling Liu and Shijie Pan and Su{-}Juan Qin and Fei Gao and Qiao{-}Yan Wen}, title = {Quantum discriminative canonical correlation analysis}, journal = {Quantum Inf. Process.}, volume = {22}, number = {4}, pages = {163}, year = {2023}, url = {https://doi.org/10.1007/s11128-023-03909-2}, doi = {10.1007/S11128-023-03909-2}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiLPQGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhangZGWLG23, author = {Hua Zhang and Shaohua Zhao and Ziqing Guo and Qiaoyan Wen and Wenmin Li and Fei Gao}, title = {Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {308--323}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3092358}, doi = {10.1109/TCC.2021.3092358}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhangZGWLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGQW23, author = {Zhenqiang Li and Fei Gao and Su{-}Juan Qin and Qiaoyan Wen}, title = {New record in the number of qubits for a quantum implementation of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2023}, url = {https://eprint.iacr.org/2023/018}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiGQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunCQWG23, author = {Hong{-}Wei Sun and Bin{-}Bin Cai and Su{-}Juan Qin and Qiao{-}Yan Wen and Fei Gao}, title = {Quantum Attacks on Beyond-Birthday-Bound MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2023}, url = {https://eprint.iacr.org/2023/025}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunCQWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunCQWG23a, author = {Hong{-}Wei Sun and Bin{-}Bin Cai and Su{-}Juan Qin and Qiao{-}Yan Wen and Fei Gao}, title = {Quantum Attacks on Type-1 Generalized Feistel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2023}, url = {https://eprint.iacr.org/2023/776}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunCQWG23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YuNZLWLG22, author = {Ping Yu and Wei Ni and Hua Zhang and Ren Ping Liu and Qiaoyan Wen and Wenmin Li and Fei Gao}, title = {Secure and Differentiated Fog-Assisted Data Access for Internet of Things}, journal = {Comput. J.}, volume = {65}, number = {8}, pages = {1948--1963}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab031}, doi = {10.1093/COMJNL/BXAB031}, timestamp = {Wed, 14 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YuNZLWLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhaoZZLGW22, author = {Shaohua Zhao and Hua Zhang and Xin Zhang and Wenmin Li and Fei Gao and Qiaoyan Wen}, title = {Forward privacy multikeyword ranked search over encrypted database}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7356--7378}, year = {2022}, url = {https://doi.org/10.1002/int.22884}, doi = {10.1002/INT.22884}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ZhaoZZLGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/WangLYZXW22, author = {Huawei Wang and Yiwei Liu and Peng Yin and Hua Zhang and Xin Xu and Qiaoyan Wen}, title = {Label specificity attack: Change your label as {I} want}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7767--7786}, year = {2022}, url = {https://doi.org/10.1002/int.22902}, doi = {10.1002/INT.22902}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/WangLYZXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/GongGLZJW22, author = {Yunping Gong and Fei Gao and Wenmin Li and Hua Zhang and Zhengping Jin and Qiaoyan Wen}, title = {A rORAM scheme with logarithmic bandwidth and logarithmic locality}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {8068--8091}, year = {2022}, url = {https://doi.org/10.1002/int.22929}, doi = {10.1002/INT.22929}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/GongGLZJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/GaoZYLGW22, author = {Haoran Gao and Hua Zhang and Xingguo Yang and Wenmin Li and Fei Gao and Qiaoyan Wen}, title = {Generating natural adversarial examples with universal perturbations for text classification}, journal = {Neurocomputing}, volume = {471}, pages = {175--182}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2021.10.089}, doi = {10.1016/J.NEUCOM.2021.10.089}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/GaoZYLGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GuoLWW22, author = {Fen{-}Zhuo Guo and Ze{-}Tian Lv and Shi{-}Hui Wei and Qiao{-}Yan Wen}, title = {Effects of measurement dependence on 1-parameter family of Bell tests}, journal = {Quantum Inf. Process.}, volume = {21}, number = {1}, pages = {28}, year = {2022}, url = {https://doi.org/10.1007/s11128-021-03300-z}, doi = {10.1007/S11128-021-03300-Z}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/GuoLWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiTZLJW22, author = {Yongsheng Li and Tengfei Tu and Hua Zhang and JiShuai Li and Zhengping Jin and Qiaoyan Wen}, title = {Sound Can Help Us See More Clearly}, journal = {Sensors}, volume = {22}, number = {2}, pages = {599}, year = {2022}, url = {https://doi.org/10.3390/s22020599}, doi = {10.3390/S22020599}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiTZLJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiTLQSW22, author = {JiShuai Li and Tengfei Tu and Yongsheng Li and Su{-}Juan Qin and Yijie Shi and Qiaoyan Wen}, title = {DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Networks}, journal = {Sensors}, volume = {22}, number = {3}, pages = {1061}, year = {2022}, url = {https://doi.org/10.3390/s22031061}, doi = {10.3390/S22031061}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiTLQSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LinGZJLW22, author = {Hao Lin and Fei Gao and Hua Zhang and Zhengping Jin and Wenmin Li and Qiaoyan Wen}, title = {Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {1}, pages = {1460--1470}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2021.3106701}, doi = {10.1109/JSYST.2021.3106701}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LinGZJLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/YuNLZZW22, author = {Ping Yu and Wei Ni and Ren Ping Liu and Zhaoxin Zhang and Hua Zhang and Qiaoyan Wen}, title = {Efficient Encrypted Range Query on Cloud Platforms}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {6}, number = {3}, pages = {27:1--27:23}, year = {2022}, url = {https://doi.org/10.1145/3548657}, doi = {10.1145/3548657}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/YuNLZZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChenLGWZW22, author = {Yang Chen and Wenmin Li and Fei Gao and Qiaoyan Wen and Hua Zhang and Huawei Wang}, title = {Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {2}, pages = {724--735}, year = {2022}, url = {https://doi.org/10.1109/TSC.2019.2959306}, doi = {10.1109/TSC.2019.2959306}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/ChenLGWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/GuoQGZLJW22, author = {Wei Guo and Su{-}Juan Qin and Fei Gao and Hua Zhang and Wenmin Li and Zhengping Jin and Qiaoyan Wen}, title = {Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {4}, pages = {1813--1824}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3022812}, doi = {10.1109/TSC.2020.3022812}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/GuoQGZLJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ChenTZW022, author = {Miao Chen and Tengfei Tu and Hua Zhang and Qiaoyan Wen and Weihang Wang}, title = {Jasmine: {A} Static Analysis Framework for Spring Core Technologies}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {60:1--60:13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3556910}, doi = {10.1145/3551349.3556910}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ChenTZW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LinZGSWGS21, author = {Hao Lin and Zhen Zhao and Fei Gao and Willy Susilo and Qiaoyan Wen and Fuchun Guo and Yijie Shi}, title = {Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage}, journal = {Comput. J.}, volume = {64}, number = {8}, pages = {1226--1238}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa144}, doi = {10.1093/COMJNL/BXAA144}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LinZGSWGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiuGW21, author = {Li Liu and Fen{-}Zhuo Guo and Qiao{-}Yan Wen}, title = {Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources}, journal = {Quantum Inf. Process.}, volume = {20}, number = {12}, pages = {392}, year = {2021}, url = {https://doi.org/10.1007/s11128-021-03329-0}, doi = {10.1007/S11128-021-03329-0}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/LiuGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuNYZLW21, author = {Ping Yu and Wei Ni and Guangsheng Yu and Hua Zhang and Ren Ping Liu and Qiaoyan Wen}, title = {Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6638453:1--6638453:14}, year = {2021}, url = {https://doi.org/10.1155/2021/6638453}, doi = {10.1155/2021/6638453}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuNYZLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/YuGW21, author = {Chao{-}Hua Yu and Fei Gao and Qiao{-}Yan Wen}, title = {An Improved Quantum Algorithm for Ridge Regression}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {33}, number = {3}, pages = {858--866}, year = {2021}, url = {https://doi.org/10.1109/TKDE.2019.2937491}, doi = {10.1109/TKDE.2019.2937491}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/YuGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhangGZW21, author = {Hua Zhang and Ziqing Guo and Shaohua Zhao and Qiaoyan Wen}, title = {Privacy-Preserving Linear Region Search Service}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {1}, pages = {207--221}, year = {2021}, url = {https://doi.org/10.1109/TSC.2017.2777970}, doi = {10.1109/TSC.2017.2777970}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ZhangGZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LinZYWSGW21, author = {Hao Lin and Hua Zhang and Hanbing Yan and Huawei Wang and Yijie Shi and Fei Gao and Qiaoyan Wen}, title = {A Secure Online Treatment Blockchain Service}, journal = {Wirel. Pers. Commun.}, volume = {117}, number = {3}, pages = {1773--1795}, year = {2021}, url = {https://doi.org/10.1007/s11277-020-07945-4}, doi = {10.1007/S11277-020-07945-4}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/LinZYWSGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangJLJLJW20, author = {Hua Zhang and Xueqi Jin and Ying Li and Zhengwei Jiang and Ye Liang and Zhengping Jin and Qiaoyan Wen}, title = {A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System}, journal = {{IEEE} Access}, volume = {8}, pages = {1031--1047}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2961517}, doi = {10.1109/ACCESS.2019.2961517}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangJLJLJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QinZGWWS20, author = {Jiawei Qin and Hua Zhang and Jing Guo and Senmiao Wang and Qiaoyan Wen and Yijie Shi}, title = {Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions}, journal = {{IEEE} Access}, volume = {8}, pages = {106437--106451}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2998043}, doi = {10.1109/ACCESS.2020.2998043}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QinZGWWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunZQQSW20, author = {Caijun Sun and Hua Zhang and Su{-}Juan Qin and Jiawei Qin and Yijie Shi and Qiaoyan Wen}, title = {DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps}, journal = {{IEEE} Access}, volume = {8}, pages = {167460--167474}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3010588}, doi = {10.1109/ACCESS.2020.3010588}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SunZQQSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/DuWZG20, author = {Hongzhen Du and Qiaoyan Wen and Shanshan Zhang and Mingchu Gao}, title = {A new provably secure certificateless signature scheme for Internet of Things}, journal = {Ad Hoc Networks}, volume = {100}, pages = {102074}, year = {2020}, url = {https://doi.org/10.1016/j.adhoc.2020.102074}, doi = {10.1016/J.ADHOC.2020.102074}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/DuWZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLGLZW20, author = {Yang Chen and Wenmin Li and Fei Gao and Kaitai Liang and Hua Zhang and Qiaoyan Wen}, title = {Practical Attribute-Based Conjunctive Keyword Search Scheme}, journal = {Comput. J.}, volume = {63}, number = {8}, pages = {1203--1215}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz140}, doi = {10.1093/COMJNL/BXZ140}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLGLZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GuoQLGJWS20, author = {Wei Guo and Su{-}Juan Qin and Jun Lu and Fei Gao and Zhengping Jin and Qiaoyan Wen and Daniele Sgandurra}, title = {Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage}, journal = {Comput. J.}, volume = {63}, number = {8}, pages = {1216--1230}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz151}, doi = {10.1093/COMJNL/BXZ151}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GuoQLGJWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiLGYZJW20, author = {Zhidan Li and Wenmin Li and Fei Gao and Ping Yu and Hua Zhang and Zhengping Jin and Qiaoyan Wen}, title = {New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services}, journal = {Comput. J.}, volume = {63}, number = {12}, pages = {1886--1903}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxaa043}, doi = {10.1093/COMJNL/BXAA043}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiLGYZJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JiangGLLW20, author = {Peng Jiang and Fuchun Guo and Kaitai Liang and Jianchang Lai and Qiaoyan Wen}, title = {Searchain: Blockchain-based private keyword search in decentralized storage}, journal = {Future Gener. Comput. Syst.}, volume = {107}, pages = {781--792}, year = {2020}, url = {https://doi.org/10.1016/j.future.2017.08.036}, doi = {10.1016/J.FUTURE.2017.08.036}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/JiangGLLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiJCLW20, author = {Xiaoqi Li and Peng Jiang and Ting Chen and Xiapu Luo and Qiaoyan Wen}, title = {A survey on the security of blockchain systems}, journal = {Future Gener. Comput. Syst.}, volume = {107}, pages = {841--853}, year = {2020}, url = {https://doi.org/10.1016/j.future.2017.08.020}, doi = {10.1016/J.FUTURE.2017.08.020}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiJCLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/WeiCWQGW20, author = {Chun{-}Yan Wei and Xiao{-}Qiu Cai and Tian{-}Yin Wang and Su{-}Juan Qin and Fei Gao and Qiao{-}Yan Wen}, title = {Error Tolerance Bound in QKD-Based Quantum Private Query}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {38}, number = {3}, pages = {517--527}, year = {2020}, url = {https://doi.org/10.1109/JSAC.2020.2968998}, doi = {10.1109/JSAC.2020.2968998}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/WeiCWQGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LiWHQGW20, author = {Xinhui Li and Yukun Wang and Yunguang Han and Su{-}Juan Qin and Fei Gao and Qiaoyan Wen}, title = {Self-Testing of Symmetric Three-Qubit States}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {38}, number = {3}, pages = {589--597}, year = {2020}, url = {https://doi.org/10.1109/JSAC.2020.2968994}, doi = {10.1109/JSAC.2020.2968994}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LiWHQGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/GuoWLZJ20, author = {Dianli Guo and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {Adaptively secure broadcast encryption with authenticated content distributors}, journal = {Multim. Tools Appl.}, volume = {79}, number = {11-12}, pages = {7889--7910}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08574-1}, doi = {10.1007/S11042-019-08574-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/GuoWLZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/CuiGLSZWP20, author = {Yuanbo Cui and Fei Gao and Wenmin Li and Yijie Shi and Hua Zhang and Qiaoyan Wen and Emmanouil Panaousis}, title = {Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services}, journal = {Sensors}, volume = {20}, number = {16}, pages = {4651}, year = {2020}, url = {https://doi.org/10.3390/s20164651}, doi = {10.3390/S20164651}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/CuiGLSZWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangWLZJ20, author = {Shuo Zhang and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings}, journal = {Sensors}, volume = {20}, number = {23}, pages = {6962}, year = {2020}, url = {https://doi.org/10.3390/s20236962}, doi = {10.3390/S20236962}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZhangWLZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoQGZLJW20, author = {Wei Guo and Su{-}Juan Qin and Fei Gao and Hua Zhang and Wenmin Li and Zhengping Jin and Qiaoyan Wen}, title = {Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2584--2586}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2970591}, doi = {10.1109/TIFS.2020.2970591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoQGZLJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangQTGGW20, author = {Hua Zhang and Boqin Qin and Tengfei Tu and Ziqing Guo and Fei Gao and Qiaoyan Wen}, title = {An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {1}, pages = {658--668}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2948113}, doi = {10.1109/TII.2019.2948113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhangQTGGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ZhangLWZJ20, author = {Shuo Zhang and Wenmin Li and Qiaoyan Wen and Hua Zhang and Zhengping Jin}, title = {A Flexible {KP-ABE} Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation}, journal = {Wirel. Pers. Commun.}, volume = {114}, number = {4}, pages = {2783--2800}, year = {2020}, url = {https://doi.org/10.1007/s11277-020-07503-y}, doi = {10.1007/S11277-020-07503-Y}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ZhangLWZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cncert/2020, editor = {Wei Lu and Qiaoyan Wen and Yuqing Zhang and Bo Lang and Weiping Wen and Hanbing Yan and Chao Li and Li Ding and Ruiguang Li and Yu Zhou}, title = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing, China, August 12, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1299}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4922-3}, doi = {10.1007/978-981-33-4922-3}, isbn = {978-981-33-4921-6}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiLJZW19, author = {Zhidan Li and Wenmin Li and Zhengping Jin and Hua Zhang and Qiaoyan Wen}, title = {An Efficient {ABE} Scheme With Verifiable Outsourced Encryption and Decryption}, journal = {{IEEE} Access}, volume = {7}, pages = {29023--29037}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2890565}, doi = {10.1109/ACCESS.2018.2890565}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiLJZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DuWZ19, author = {Hongzhen Du and Qiaoyan Wen and Shanshan Zhang}, title = {An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network}, journal = {{IEEE} Access}, volume = {7}, pages = {42683--42693}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2907298}, doi = {10.1109/ACCESS.2019.2907298}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DuWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangGWZ19, author = {Huawei Wang and Dianli Guo and Qiaoyan Wen and Hua Zhang}, title = {A Robust Authentication Scheme for Multiple Servers Architecture}, journal = {{IEEE} Access}, volume = {7}, pages = {111222--111231}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2932181}, doi = {10.1109/ACCESS.2019.2932181}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangGWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangGWZ19a, author = {Huawei Wang and Dianli Guo and Qiaoyan Wen and Hua Zhang}, title = {Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture}, journal = {{IEEE} Access}, volume = {7}, pages = {161340--161349}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2948851}, doi = {10.1109/ACCESS.2019.2948851}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangGWZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChenLGYLZW19, author = {Yang Chen and Wenmin Li and Fei Gao and Wei Yin and Kaitai Liang and Hua Zhang and Qiaoyan Wen}, title = {Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1748--1760}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz052}, doi = {10.1093/COMJNL/BXZ052}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChenLGYLZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GuoZQGJLW19, author = {Wei Guo and Hua Zhang and Su{-}Juan Qin and Fei Gao and Zhengping Jin and Wenmin Li and Qiaoyan Wen}, title = {Outsourced dynamic provable data possession with batch update for secure cloud storage}, journal = {Future Gener. Comput. Syst.}, volume = {95}, pages = {309--322}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.01.009}, doi = {10.1016/J.FUTURE.2019.01.009}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/GuoZQGJLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiLWCYL19, author = {Zhidan Li and Wenmin Li and Qiaoyan Wen and Jiageng Chen and Wei Yin and Kaitai Liang}, title = {An efficient blind filter: Location privacy protection and the access control in FinTech}, journal = {Future Gener. Comput. Syst.}, volume = {100}, pages = {797--810}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.04.026}, doi = {10.1016/J.FUTURE.2019.04.026}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiLWCYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/GuoWJZL19, author = {Dianli Guo and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Wenmin Li}, title = {Authenticated public key broadcast encryption with short ciphertexts}, journal = {Multim. Tools Appl.}, volume = {78}, number = {16}, pages = {23399--23414}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7598-0}, doi = {10.1007/S11042-019-7598-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/GuoWJZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GuoLWW19, author = {Fen{-}Zhuo Guo and Li Liu and Ankang Wang and Qiao{-}Yan Wen}, title = {Practical covert quantum key distribution with decoy-state method}, journal = {Quantum Inf. Process.}, volume = {18}, number = {4}, pages = {95}, year = {2019}, url = {https://doi.org/10.1007/s11128-019-2181-1}, doi = {10.1007/S11128-019-2181-1}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/GuoLWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiGCW19, author = {Dandan Li and Fei Gao and Ya Cao and Qiao{-}Yan Wen}, title = {The critical detection efficiency for closing the detection loophole of some modified Bell inequalities}, journal = {Quantum Inf. Process.}, volume = {18}, number = {4}, pages = {123}, year = {2019}, url = {https://doi.org/10.1007/s11128-019-2238-1}, doi = {10.1007/S11128-019-2238-1}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiGCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiGZW19, author = {Lv{-}Jun Li and Fei Gao and Zhi{-}Chao Zhang and Qiao{-}Yan Wen}, title = {Using entanglement more efficiently in distinguishing orthogonal product states by {LOCC}}, journal = {Quantum Inf. Process.}, volume = {18}, number = {11}, pages = {330}, year = {2019}, url = {https://doi.org/10.1007/s11128-019-2441-0}, doi = {10.1007/S11128-019-2441-0}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiGZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangGZW19, author = {Huawei Wang and Dianli Guo and Hua Zhang and Qiaoyan Wen}, title = {Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity}, journal = {Sensors}, volume = {19}, number = {14}, pages = {3144}, year = {2019}, url = {https://doi.org/10.3390/s19143144}, doi = {10.3390/S19143144}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/WangGZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LuWYLJPC19, author = {Xiuhua Lu and Qiaoyan Wen and Wei Yin and Kaitai Liang and Zhengping Jin and Emmanouil Panaousis and Jiageng Chen}, title = {Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation}, journal = {Symmetry}, volume = {11}, number = {2}, pages = {272}, year = {2019}, url = {https://doi.org/10.3390/sym11020272}, doi = {10.3390/SYM11020272}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/LuWYLJPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/YuWNLSZJ19, author = {Ping Yu and Qiaoyan Wen and Wei Ni and Wenmin Li and Caijun Sun and Hua Zhang and Zhengping Jin}, title = {Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System}, journal = {Wirel. Pers. Commun.}, volume = {106}, number = {2}, pages = {719--738}, year = {2019}, url = {https://doi.org/10.1007/s11277-019-06187-3}, doi = {10.1007/S11277-019-06187-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/YuWNLSZJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-10857, author = {Yusen Wu and Chao{-}Hua Yu and Su{-}Juan Qin and Qiaoyan Wen and Fei Gao}, title = {Bayesian machine learning for Boltzmann machine in quantum-enhanced feature spaces}, journal = {CoRR}, volume = {abs/1912.10857}, year = {2019}, url = {http://arxiv.org/abs/1912.10857}, eprinttype = {arXiv}, eprint = {1912.10857}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-10857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLGYZWL19, author = {Zhidan Li and Wenmin Li and Fei Gao and Wei Yin and Hua Zhang and Qiaoyan Wen and Kaitai Liang}, title = {Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1314}, year = {2019}, url = {https://eprint.iacr.org/2019/1314}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLGYZWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YinWLZJ18, author = {Wei Yin and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {An Anti-Quantum Transaction Authentication Approach in Blockchain}, journal = {{IEEE} Access}, volume = {6}, pages = {5393--5401}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2788411}, doi = {10.1109/ACCESS.2017.2788411}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YinWLZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuYWJL18, author = {Xiuhua Lu and Wei Yin and Qiaoyan Wen and Zhengping Jin and Wenmin Li}, title = {A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method}, journal = {{IEEE} Access}, volume = {6}, pages = {33986--33994}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2847411}, doi = {10.1109/ACCESS.2018.2847411}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LuYWJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenWLZJ18, author = {Yang Chen and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow}, journal = {{IEEE} Access}, volume = {6}, pages = {58955--58966}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2875070}, doi = {10.1109/ACCESS.2018.2875070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChenWLZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YinWLZCYZ18, author = {Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang}, title = {Delegation of Decryption Rights With Revocability From Learning With Errors}, journal = {{IEEE} Access}, volume = {6}, pages = {61163--61175}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2875069}, doi = {10.1109/ACCESS.2018.2875069}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YinWLZCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DuWZ18, author = {Hongzhen Du and Qiaoyan Wen and Shanshan Zhang}, title = {A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings}, journal = {{IEEE} Access}, volume = {6}, pages = {73846--73855}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2880875}, doi = {10.1109/ACCESS.2018.2880875}, timestamp = {Fri, 18 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DuWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/GuoZSWL18, author = {Ziqing Guo and Hua Zhang and Caijun Sun and Qiaoyan Wen and Wenmin Li}, title = {Secure multi-keyword ranked search over encrypted cloud data for multiple data owners}, journal = {J. Syst. Softw.}, volume = {137}, pages = {380--395}, year = {2018}, url = {https://doi.org/10.1016/j.jss.2017.12.008}, doi = {10.1016/J.JSS.2017.12.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/GuoZSWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiGQW18, author = {Dan{-}dan Li and Fei Gao and Su{-}Juan Qin and Qiao{-}Yan Wen}, title = {Perfect quantum multiple-unicast network coding protocol}, journal = {Quantum Inf. Process.}, volume = {17}, number = {1}, pages = {13}, year = {2018}, url = {https://doi.org/10.1007/s11128-017-1781-x}, doi = {10.1007/S11128-017-1781-X}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiGQW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/QinWLGW18, author = {Su{-}Juan Qin and Yukun Wang and Runze Li and Fei Gao and Qiao{-}Yan Wen}, title = {The randomness in 2 {\(\rightarrow\)} 1 quantum random access code without a shared reference frame}, journal = {Quantum Inf. Process.}, volume = {17}, number = {10}, pages = {276}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-2040-5}, doi = {10.1007/S11128-018-2040-5}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/QinWLGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LuYWLCC18, author = {Xiuhua Lu and Wei Yin and Qiaoyan Wen and Kaitai Liang and Liqun Chen and Jiageng Chen}, title = {Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures}, journal = {Sensors}, volume = {18}, number = {11}, pages = {4056}, year = {2018}, url = {https://doi.org/10.3390/s18114056}, doi = {10.3390/S18114056}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LuYWLCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiWLH18, author = {Wenmin Li and Qiaoyan Wen and Xuelei Li and Debiao He}, title = {Attribute-based fuzzy identity access control in multicloud computing environments}, journal = {Soft Comput.}, volume = {22}, number = {12}, pages = {4071--4082}, year = {2018}, url = {https://doi.org/10.1007/s00500-017-2616-5}, doi = {10.1007/S00500-017-2616-5}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiWLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/RaoTZWX18, author = {Lu Rao and Tengfei Tu and Hua Zhang and Qiaoyan Wen and Jia Xiao}, title = {Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {4186243:1--4186243:19}, year = {2018}, url = {https://doi.org/10.1155/2018/4186243}, doi = {10.1155/2018/4186243}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/RaoTZWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiZSWC18, author = {Wenmin Li and Shuo Zhang and Qi Su and Qiaoyan Wen and Yang Chen}, title = {An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {8131367:1--8131367:12}, year = {2018}, url = {https://doi.org/10.1155/2018/8131367}, doi = {10.1155/2018/8131367}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LiZSWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YinWLZJ18, author = {Wei Yin and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {A New Insight - Proxy Re-encryption Under {LWE} with Strong Anti-collusion}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {559--577}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_36}, doi = {10.1007/978-3-319-99807-7\_36}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YinWLZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-06993, author = {Xiaoqi Li and Peng Jiang and Ting Chen and Xiapu Luo and Qiaoyan Wen}, title = {A Survey on the Security of Blockchain Systems}, journal = {CoRR}, volume = {abs/1802.06993}, year = {2018}, url = {http://arxiv.org/abs/1802.06993}, eprinttype = {arXiv}, eprint = {1802.06993}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-06993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-08603, author = {Ziqing Guo and Hua Zhang and Xin Zhang and Zhengping Jin and Qiaoyan Wen}, title = {Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool}, journal = {CoRR}, volume = {abs/1812.08603}, year = {2018}, url = {http://arxiv.org/abs/1812.08603}, eprinttype = {arXiv}, eprint = {1812.08603}, timestamp = {Thu, 03 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-08603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YinWLZCYZ18, author = {Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang}, title = {Delegation of Decryption Rights with Revocability from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2018}, url = {https://eprint.iacr.org/2018/777}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YinWLZCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangMGW17, author = {Peng Jiang and Yi Mu and Fuchun Guo and Qiaoyan Wen}, title = {Secure-channel free keyword search with authorization in manager-centric databases}, journal = {Comput. Secur.}, volume = {69}, pages = {50--64}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.11.015}, doi = {10.1016/J.COSE.2016.11.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangMGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijar/ZhuXW17, author = {Ping Zhu and Huiyang Xie and Qiaoyan Wen}, title = {Rough approximations based on bisimulations}, journal = {Int. J. Approx. Reason.}, volume = {81}, pages = {49--62}, year = {2017}, url = {https://doi.org/10.1016/j.ijar.2016.11.007}, doi = {10.1016/J.IJAR.2016.11.007}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijar/ZhuXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YinWL0Z17, author = {Wei Yin and Qiaoyan Wen and Wenmin Li and Hua Zhang and Ping Zheng}, title = {Identity Based Proxy Re-encryption Scheme under {LWE}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {12}, pages = {6116--6132}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.12.023}, doi = {10.3837/TIIS.2017.12.023}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/YinWL0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/JiangMGW17, author = {Peng Jiang and Yi Mu and Fuchun Guo and Qiao{-}Yan Wen}, title = {Private Keyword-Search for Database Systems Against Insider Attacks}, journal = {J. Comput. Sci. Technol.}, volume = {32}, number = {3}, pages = {599--617}, year = {2017}, url = {https://doi.org/10.1007/s11390-017-1745-8}, doi = {10.1007/S11390-017-1745-8}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/JiangMGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiLWZZ17, author = {Wenmin Li and Xuelei Li and Qiao{-}Yan Wen and Shuo Zhang and Hua Zhang}, title = {Flexible {CP-ABE} Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System}, journal = {J. Comput. Sci. Technol.}, volume = {32}, number = {5}, pages = {974--990}, year = {2017}, url = {https://doi.org/10.1007/s11390-017-1776-1}, doi = {10.1007/S11390-017-1776-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LiLWZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/XuW0QZ17, author = {Guang{-}Bao Xu and Qiao{-}Yan Wen and Fei Gao and Su{-}Juan Qin and Huijuan Zuo}, title = {Local indistinguishability of multipartite orthogonal product bases}, journal = {Quantum Inf. Process.}, volume = {16}, number = {11}, pages = {276}, year = {2017}, url = {https://doi.org/10.1007/s11128-017-1725-5}, doi = {10.1007/S11128-017-1725-5}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/XuW0QZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TuR0WX17, author = {Tengfei Tu and Lu Rao and Hua Zhang and Qiaoyan Wen and Jia Xiao}, title = {Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {4603237:1--4603237:17}, year = {2017}, url = {https://doi.org/10.1155/2017/4603237}, doi = {10.1155/2017/4603237}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TuR0WX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhuXW17, author = {Ping Zhu and Huiyang Xie and Qiaoyan Wen}, title = {A unified view of consistent functions}, journal = {Soft Comput.}, volume = {21}, number = {9}, pages = {2189--2199}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2133-y}, doi = {10.1007/S00500-016-2133-Y}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/ZhuXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/XuWLSH17, author = {Jie Xu and Qiaoyan Wen and Wenmin Li and Jian Shen and Debiao He}, title = {Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing}, journal = {Soft Comput.}, volume = {21}, number = {18}, pages = {5265--5279}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2244-5}, doi = {10.1007/S00500-016-2244-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/XuWLSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/FanQW17, author = {Ya{-}Jun Fan and Xue{-}Song Qiu and Qiao{-}Yan Wen}, editor = {Weiming Shen and Pedro Antunes and Nguyen Hoang Thuan and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Jianming Yong}, title = {A privacy-preserving authenticated key agreement protocol with smart cards for mobile emergency services}, booktitle = {21st {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2017, Wellington, New Zealand, April 26-28, 2017}, pages = {227--232}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CSCWD.2017.8066699}, doi = {10.1109/CSCWD.2017.8066699}, timestamp = {Fri, 28 Oct 2022 20:56:41 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/FanQW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/SunWL16, author = {Haiyan Sun and Qiaoyan Wen and Wenmin Li}, title = {A strongly secure pairing-free certificateless authenticated key agreement protocol under the {CDH} assumption}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {3}, pages = {32109:1--32109:16}, year = {2016}, url = {https://doi.org/10.1007/s11432-015-5303-0}, doi = {10.1007/S11432-015-5303-0}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/SunWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JiangMGWW16, author = {Peng Jiang and Yi Mu and Fuchun Guo and Xiaofen Wang and Qiaoyan Wen}, title = {Online/Offline Ciphertext Retrieval on Resource Constrained Devices}, journal = {Comput. J.}, volume = {59}, number = {7}, pages = {955--969}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv099}, doi = {10.1093/COMJNL/BXV099}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JiangMGWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWZL16, author = {Rui Wang and Qiaoyan Wen and Hua Zhang and Xuelei Li}, title = {A Novel Protocol-Feature Attack against Tor's Hidden Service}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {4}, pages = {839--849}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015ICP0001}, doi = {10.1587/TRANSINF.2015ICP0001}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWZQL16, author = {Rui Wang and Qiaoyan Wen and Hua Zhang and Su{-}Juan Qin and Wenmin Li}, title = {Transparent Discovery of Hidden Service}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {11}, pages = {2817--2820}, year = {2016}, url = {https://doi.org/10.1587/transinf.2016EDL8100}, doi = {10.1587/TRANSINF.2016EDL8100}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWZQL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiCWZ16, author = {Dandan Li and Zuling Chang and Qiaoyan Wen and Jie Zhang}, title = {Linear complexity of generalised cyclotomic quaternary sequences of length 2\emph{p} \({}^{\mbox{ \emph{m}+1}}\) \emph{q} \({}^{\mbox{ \emph{n}+1}}\)}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {2}, pages = {104--111}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0006}, doi = {10.1049/IET-IFS.2015.0006}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiCWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/CaoGYZW16, author = {Tian{-}Qing Cao and Fei Gao and Ying{-}Hui Yang and Zhi{-}Chao Zhang and Qiao{-}Yan Wen}, title = {Determination of locally perfect discrimination for two-qubit unitary operations}, journal = {Quantum Inf. Process.}, volume = {15}, number = {1}, pages = {529--549}, year = {2016}, url = {https://doi.org/10.1007/s11128-015-1175-x}, doi = {10.1007/S11128-015-1175-X}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/CaoGYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/GuoWL0J16, author = {Dianli Guo and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {Adaptively Secure Broadcast Encryption With Constant Ciphertexts}, journal = {{IEEE} Trans. Broadcast.}, volume = {62}, number = {3}, pages = {709--715}, year = {2016}, url = {https://doi.org/10.1109/TBC.2016.2550759}, doi = {10.1109/TBC.2016.2550759}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbc/GuoWL0J16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/XuWLJ16, author = {Jie Xu and Qiaoyan Wen and Wenmin Li and Zhengping Jin}, title = {Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {1}, pages = {119--129}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2392752}, doi = {10.1109/TPDS.2015.2392752}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/XuWLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiWL16, author = {Xuelei Li and Qiaoyan Wen and Wenmin Li}, title = {A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications}, journal = {Wirel. Pers. Commun.}, volume = {86}, number = {3}, pages = {1593--1610}, year = {2016}, url = {https://doi.org/10.1007/s11277-015-3008-8}, doi = {10.1007/S11277-015-3008-8}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangMGW16, author = {Peng Jiang and Yi Mu and Fuchun Guo and Qiaoyan Wen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Public Key Encryption with Authorized Keyword Search}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {170--186}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_11}, doi = {10.1007/978-3-319-40367-0\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangMGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuGHLW15, author = {Bin Liu and Fei Gao and Wei Huang and Dan Li and Qiaoyan Wen}, title = {Controlling the key by choosing the detection bits in quantum cryptographic protocols}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {11}, pages = {1--11}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5413-8}, doi = {10.1007/S11432-015-5413-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiuGHLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/JiangWLJZ15, author = {Peng Jiang and Qiaoyan Wen and Wenmin Li and Zhengping Jin and Hua Zhang}, title = {An anonymous and efficient remote biometrics user authentication scheme in a multi server environment}, journal = {Frontiers Comput. Sci.}, volume = {9}, number = {1}, pages = {142--156}, year = {2015}, url = {https://doi.org/10.1007/s11704-014-3125-7}, doi = {10.1007/S11704-014-3125-7}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/JiangWLJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiWZJ15, author = {Dandan Li and Qiaoyan Wen and Jie Zhang and Liying Jiang}, title = {Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2\emph{p}\({}^{\mbox{\emph{m}+1}}\)\emph{q}\({}^{\mbox{\emph{n}+1}}\)}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {6}, pages = {1244--1254}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.1244}, doi = {10.1587/TRANSFUN.E98.A.1244}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiWZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChengW15, author = {Lin Cheng and Qiaoyan Wen}, title = {Cryptanalysis and improvement of a certificateless partially blind signature}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {6}, pages = {380--386}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0293}, doi = {10.1049/IET-IFS.2014.0293}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChengW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/ChengW15, author = {Lin Cheng and Qiaoyan Wen}, title = {Provably secure and efficient certificateless signature in the standard model}, journal = {Int. J. Inf. Commun. Technol.}, volume = {7}, number = {2/3}, pages = {287--301}, year = {2015}, url = {https://doi.org/10.1504/IJICT.2015.068405}, doi = {10.1504/IJICT.2015.068405}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/ChengW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChengW15, author = {Lin Cheng and Qiaoyan Wen}, title = {An Improved Certificateless Signcryption in the Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {229--237}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p229-237.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChengW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChengW15a, author = {Lin Cheng and Qiaoyan Wen}, title = {An Improved Certificateless Signcryption in the Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {597--606}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p597-606.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChengW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChengWJZZ15, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou}, title = {Cryptanalysis and improvement of a certificateless aggregate signature scheme}, journal = {Inf. Sci.}, volume = {295}, pages = {337--346}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2014.09.065}, doi = {10.1016/J.INS.2014.09.065}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChengWJZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/GuoWLZJ15, author = {Dianli Guo and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems}, journal = {J. Medical Syst.}, volume = {39}, number = {3}, pages = {20}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0194-6}, doi = {10.1007/S10916-015-0194-6}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/GuoWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/GuoWLZJ15a, author = {Dianli Guo and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems}, journal = {J. Medical Syst.}, volume = {39}, number = {6}, pages = {62:1--62:8}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0245-z}, doi = {10.1007/S10916-015-0245-Z}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/GuoWLZJ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/YangGTCZW15, author = {Ying{-}Hui Yang and Fei Gao and Guo{-}Jing Tian and Tian{-}Qing Cao and Huijuan Zuo and Qiao{-}Yan Wen}, title = {Bound on local unambiguous discrimination between multipartite quantum states}, journal = {Quantum Inf. Process.}, volume = {14}, number = {2}, pages = {731--737}, year = {2015}, url = {https://doi.org/10.1007/s11128-014-0870-3}, doi = {10.1007/S11128-014-0870-3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/YangGTCZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiuTWG15, author = {Feng Liu and Guo{-}Jing Tian and Qiao{-}Yan Wen and Fei Gao}, title = {General bounds for quantum discord and discord distance}, journal = {Quantum Inf. Process.}, volume = {14}, number = {4}, pages = {1333--1341}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-0944-x}, doi = {10.1007/S11128-015-0944-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiuTWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/CaoGZYW15, author = {Tian{-}Qing Cao and Fei Gao and Zhi{-}Chao Zhang and Ying{-}Hui Yang and Qiao{-}Yan Wen}, title = {Perfect discrimination of projective measurements with the rank of all projectors being one}, journal = {Quantum Inf. Process.}, volume = {14}, number = {7}, pages = {2645--2656}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-0992-2}, doi = {10.1007/S11128-015-0992-2}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/CaoGZYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangGQZW15, author = {Zhi{-}Chao Zhang and Fei Gao and Su{-}Juan Qin and Huijuan Zuo and Qiao{-}Yan Wen}, title = {Local distinguishability of maximally entangled states in canonical form}, journal = {Quantum Inf. Process.}, volume = {14}, number = {10}, pages = {3961--3969}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-1092-z}, doi = {10.1007/S11128-015-1092-Z}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangGQZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunW15, author = {Yi Sun and Qiaoyan Wen}, title = {A general two-party bi-input private function evaluation protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2536--2544}, year = {2015}, url = {https://doi.org/10.1002/sec.1197}, doi = {10.1002/SEC.1197}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunWZJ15, author = {Haiyan Sun and Qiaoyan Wen and Hua Zhang and Zhengping Jin}, title = {A strongly secure identity-based authenticated key agreement protocol without pairings under the {GDH} assumption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3167--3179}, year = {2015}, url = {https://doi.org/10.1002/sec.1241}, doi = {10.1002/SEC.1241}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunWZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GuoWLZJ15, author = {Dianli Guo and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic {ID} Authenticated Key Agreement Scheme'}, journal = {Wirel. Pers. Commun.}, volume = {83}, number = {1}, pages = {35--48}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2378-2}, doi = {10.1007/S11277-015-2378-2}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GuoWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmmm/SunWZL14, author = {Yi Sun and Qiaoyan Wen and Yudong Zhang and Wenmin Li}, title = {Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks}, journal = {Comput. Math. Methods Medicine}, volume = {2014}, pages = {214841:1--214841:9}, year = {2014}, url = {https://doi.org/10.1155/2014/214841}, doi = {10.1155/2014/214841}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmmm/SunWZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ChengWJZ14, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang}, title = {Cryptanalysis and improvement of a certificateless encryption scheme in the standard model}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {1}, pages = {163--173}, year = {2014}, url = {https://doi.org/10.1007/s11704-013-3090-6}, doi = {10.1007/S11704-013-3090-6}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ChengWJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LuWJWY14, author = {Xiuhua Lu and Qiaoyan Wen and Zhengping Jin and Licheng Wang and Chunli Yang}, title = {A lattice-based signcryption scheme without random oracles}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {4}, pages = {667--675}, year = {2014}, url = {https://doi.org/10.1007/s11704-014-3163-1}, doi = {10.1007/S11704-014-3163-1}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LuWJWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/ZhuXW14, author = {Ping Zhu and Huiyang Xie and Qiaoyan Wen}, title = {A Unified Definition of Consistent Functions}, journal = {Fundam. Informaticae}, volume = {135}, number = {3}, pages = {331--340}, year = {2014}, url = {https://doi.org/10.3233/FI-2014-1125}, doi = {10.3233/FI-2014-1125}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fuin/ZhuXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiWZC14, author = {Dan{-}dan Li and Qiaoyan Wen and Jie Zhang and Zuling Chang}, title = {Linear Complexity of Generalized Cyclotomic Quaternary Sequences with Period \emph{pq}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {5}, pages = {1153--1158}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1153}, doi = {10.1587/TRANSFUN.E97.A.1153}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiWZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DuW14, author = {Hongzhen Du and Qiaoyan Wen}, title = {Security analysis of two certificateless short signature schemes}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {4}, pages = {230--233}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2013.0080}, doi = {10.1049/IET-IFS.2013.0080}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DuWZP14, author = {Jiao Du and Qiaoyan Wen and Jie Zhang and Shanqi Pang}, title = {Constructions of resilient rotation symmetric boolean functions on given number of variables}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {5}, pages = {265--272}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2013.0090}, doi = {10.1049/IET-IFS.2013.0090}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DuWZP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhouW14, author = {Liming Zhou and Qiaoyan Wen}, title = {Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/920510}, doi = {10.1155/2014/920510}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhouW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/DuW14, author = {Hongzhen Du and Qiaoyan Wen}, title = {Certificateless proxy multi-signature}, journal = {Inf. Sci.}, volume = {276}, pages = {21--30}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.043}, doi = {10.1016/J.INS.2014.02.043}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/DuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuWLWZ14, author = {Xiuhua Lu and Qiaoyan Wen and Wenmin Li and Licheng Wang and Hua Zhang}, title = {A Fuzzy Identity-Based Signcryption Scheme from Lattices}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {11}, pages = {4203--4225}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.11.031}, doi = {10.3837/TIIS.2014.11.031}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LuWLWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/XuZWJZH14, author = {Xin Xu and Ping Zhu and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Lian He}, title = {A Secure and Efficient Authentication and Key Agreement Scheme Based on {ECC} for Telecare Medicine Information Systems}, journal = {J. Medical Syst.}, volume = {38}, number = {1}, pages = {9994}, year = {2014}, url = {https://doi.org/10.1007/s10916-013-9994-8}, doi = {10.1007/S10916-013-9994-8}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/XuZWJZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/LiWLZJ14, author = {Xuelei Li and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zhengping Jin}, title = {Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems}, journal = {J. Medical Syst.}, volume = {38}, number = {11}, pages = {139}, year = {2014}, url = {https://doi.org/10.1007/s10916-014-0139-5}, doi = {10.1007/S10916-014-0139-5}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/LiWLZJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiWQGS14, author = {Yan{-}Bing Li and Qiaoyan Wen and Su{-}Juan Qin and Fen{-}Zhuo Guo and Ying Sun}, title = {Practical quantum all-or-nothing oblivious transfer protocol}, journal = {Quantum Inf. Process.}, volume = {13}, number = {1}, pages = {131--139}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0550-8}, doi = {10.1007/S11128-013-0550-8}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiWQGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiWLQY14, author = {Yan{-}Bing Li and Qiaoyan Wen and Zi{-}Chen Li and Su{-}Juan Qin and Ya{-}Tao Yang}, title = {Cheat sensitive quantum bit commitment via pre- and post-selected quantum states}, journal = {Quantum Inf. Process.}, volume = {13}, number = {1}, pages = {141--149}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0566-0}, doi = {10.1007/S11128-013-0566-0}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiWLQY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/HuangWLGS14, author = {Wei Huang and Qiaoyan Wen and Bin Liu and Fei Gao and Ying Sun}, title = {Quantum key agreement with {EPR} pairs and single-particle measurements}, journal = {Quantum Inf. Process.}, volume = {13}, number = {3}, pages = {649--663}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0680-z}, doi = {10.1007/S11128-013-0680-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/HuangWLGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangWGTC14, author = {Zhi{-}Chao Zhang and Qiaoyan Wen and Fei Gao and Guo{-}Jing Tian and Tian{-}Qing Cao}, title = {One-way {LOCC} indistinguishability of maximally entangled states}, journal = {Quantum Inf. Process.}, volume = {13}, number = {3}, pages = {795--804}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0691-9}, doi = {10.1007/S11128-013-0691-9}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangWGTC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/YangMGW14, author = {Qian Yang and Jia{-}Jun Ma and Fen{-}Zhuo Guo and Qiaoyan Wen}, title = {Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement}, journal = {Quantum Inf. Process.}, volume = {13}, number = {7}, pages = {1537--1544}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0747-5}, doi = {10.1007/S11128-014-0747-5}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/YangMGW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/HuangWLSG14, author = {Wei Huang and Qiaoyan Wen and Bin Liu and Qi Su and Fei Gao}, title = {Cryptanalysis of a multi-party quantum key agreement protocol with single particles}, journal = {Quantum Inf. Process.}, volume = {13}, number = {7}, pages = {1651--1657}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0758-2}, doi = {10.1007/S11128-014-0758-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/HuangWLSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/XuWGQ14, author = {Guang{-}Bao Xu and Qiaoyan Wen and Fei Gao and Su{-}Juan Qin}, title = {Novel multiparty quantum key agreement protocol with {GHZ} states}, journal = {Quantum Inf. Process.}, volume = {13}, number = {12}, pages = {2587--2594}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0816-9}, doi = {10.1007/S11128-014-0816-9}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/XuWGQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/YuW14, author = {Xiaojun Yu and Qiaoyan Wen}, title = {{MF-PDP:} Multi-function provable data possession scheme in cloud computing}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2014, Shenzhen, China, November 27-29, 2014}, pages = {597--603}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCIS.2014.7175805}, doi = {10.1109/CCIS.2014.7175805}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ccis/YuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GaoLHW14, author = {Fei Gao and Bin Liu and Wei Huang and Qiao{-}Yan Wen}, title = {Post-processing of the oblivious key in quantum private queries}, journal = {CoRR}, volume = {abs/1406.0589}, year = {2014}, url = {http://arxiv.org/abs/1406.0589}, eprinttype = {arXiv}, eprint = {1406.0589}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GaoLHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuW14, author = {Xiaojun Yu and Qiaoyan Wen}, title = {A Multi-Function Provable Data Possession Scheme in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2014}, url = {http://eprint.iacr.org/2014/606}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/SunWZJ13, author = {Haiyan Sun and Qiaoyan Wen and Hua Zhang and Zhengping Jin}, title = {A novel pairing-free certificateless authenticated key agreement protocol with provable security}, journal = {Frontiers Comput. Sci.}, volume = {7}, number = {4}, pages = {544--557}, year = {2013}, url = {https://doi.org/10.1007/s11704-013-2305-1}, doi = {10.1007/S11704-013-2305-1}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/SunWZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWZ13, author = {Huijuan Wang and Qiaoyan Wen and Jie Zhang}, title = {The Properties of the FCSR-Based Self-Shrinking Sequence}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {2}, pages = {626--634}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.626}, doi = {10.1587/TRANSFUN.E96.A.626}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoWZ13, author = {Lu Zhao and Qiao{-}Yan Wen and Jie Zhang}, title = {On the Linear Complexity of a Class of Quaternary Sequences with Low Autocorrelation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {5}, pages = {997--1000}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.997}, doi = {10.1587/TRANSFUN.E96.A.997}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DuWZP13, author = {Jiao Du and Qiaoyan Wen and Jie Zhang and Shanqi Pang}, title = {Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on \emph{pq} Variables}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {7}, pages = {1653--1656}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1653}, doi = {10.1587/TRANSFUN.E96.A.1653}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DuWZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DuWZL13, author = {Jiao Du and Qiaoyan Wen and Jie Zhang and Xin Liao}, title = {New Construction of Symmetric Orthogonal Arrays of Strength \emph{t}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {9}, pages = {1901--1904}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1901}, doi = {10.1587/TRANSFUN.E96.A.1901}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DuWZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiaoWS013, author = {Xin Liao and Qiaoyan Wen and Ting{-}Ting Song and Jie Zhang}, title = {Quantum Steganography with High Efficiency with Noisy Depolarizing Channels}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {10}, pages = {2039--2044}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.2039}, doi = {10.1587/TRANSFUN.E96.A.2039}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiaoWS013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MaW0Z13, author = {Xiuwen Ma and Qiaoyan Wen and Jie Zhang and Huijuan Zuo}, title = {New Perfect Gaussian Integer Sequences of Period \emph{pq}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {11}, pages = {2290--2293}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.2290}, doi = {10.1587/TRANSFUN.E96.A.2290}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MaW0Z13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiaoW013, author = {Xin Liao and Qiaoyan Wen and Jie Zhang}, title = {Improving the Adaptive Steganographic Methods Based on Modulus Function}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {12}, pages = {2731--2734}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.2731}, doi = {10.1587/TRANSFUN.E96.A.2731}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiaoW013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiWZJ13, author = {Xuelei Li and Qiaoyan Wen and Hua Zhang and Zhengping Jin}, title = {An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks}, journal = {Int. J. Netw. Manag.}, volume = {23}, number = {5}, pages = {311--324}, year = {2013}, url = {https://doi.org/10.1002/nem.1827}, doi = {10.1002/NEM.1827}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LiWZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/WangWZ13, author = {Huijuan Wang and Qiaoyan Wen and Jie Zhang}, title = {{GLS:} New class of generalized Legendre sequences with optimal arithmetic cross-correlation}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {47}, number = {4}, pages = {371--388}, year = {2013}, url = {https://doi.org/10.1051/ita/2013043}, doi = {10.1051/ITA/2013043}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/WangWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/SunWZJ13, author = {Haiyan Sun and Qiaoyan Wen and Hua Zhang and Zhengping Jin}, title = {A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices}, journal = {Inf. Technol. Control.}, volume = {42}, number = {2}, pages = {191--204}, year = {2013}, url = {https://doi.org/10.5755/j01.itc.42.2.1689}, doi = {10.5755/J01.ITC.42.2.1689}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/SunWZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jam/ZhuW13, author = {Ping Zhu and Qiaoyan Wen}, title = {Operations on Soft Sets Revisited}, journal = {J. Appl. Math.}, volume = {2013}, pages = {105752:1--105752:7}, year = {2013}, url = {https://doi.org/10.1155/2013/105752}, doi = {10.1155/2013/105752}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jam/ZhuW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/GuoWSJZ13, author = {Rui Guo and Qiaoyan Wen and Huixian Shi and Zhengping Jin and Hua Zhang}, title = {An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems}, journal = {J. Medical Syst.}, volume = {37}, number = {5}, pages = {9965}, year = {2013}, url = {https://doi.org/10.1007/s10916-013-9965-0}, doi = {10.1007/S10916-013-9965-0}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/GuoWSJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GaoLZWC13, author = {Fei Gao and Bin Liu and Wei{-}Wei Zhang and Qiao{-}Yan Wen and Hui Chen}, title = {Is quantum key distribution suitable for steganography?}, journal = {Quantum Inf. Process.}, volume = {12}, number = {1}, pages = {625--630}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0408-5}, doi = {10.1007/S11128-012-0408-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/GaoLZWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangGLWC13, author = {Wei{-}Wei Zhang and Fei Gao and Bin Liu and Qiao{-}Yan Wen and Hui Chen}, title = {A watermark strategy for quantum images based on quantum fourier transform}, journal = {Quantum Inf. Process.}, volume = {12}, number = {2}, pages = {793--803}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0423-6}, doi = {10.1007/S11128-012-0423-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangGLWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiuGJHZW13, author = {Bin Liu and Fei Gao and Heng{-}Yue Jia and Wei Huang and Wei{-}Wei Zhang and Qiao{-}Yan Wen}, title = {Efficient quantum private comparison employing single photons and collective detection}, journal = {Quantum Inf. Process.}, volume = {12}, number = {2}, pages = {887--897}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0439-y}, doi = {10.1007/S11128-012-0439-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiuGJHZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiZGHWC13, author = {Dan Li and Jie Zhang and Fen{-}Zhuo Guo and Wei Huang and Qiao{-}Yan Wen and Hui Chen}, title = {Discrete-time interacting quantum walks and quantum Hash schemes}, journal = {Quantum Inf. Process.}, volume = {12}, number = {3}, pages = {1501--1513}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0421-8}, doi = {10.1007/S11128-012-0421-8}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiZGHWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiuGHW13, author = {Bin Liu and Fei Gao and Wei Huang and Qiao{-}Yan Wen}, title = {Multiparty quantum key agreement with single particles}, journal = {Quantum Inf. Process.}, volume = {12}, number = {4}, pages = {1797--1805}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0492-6}, doi = {10.1007/S11128-012-0492-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiuGHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/Li0MZW13, author = {Dan Li and Jie Zhang and Xiuwen Ma and Wei{-}Wei Zhang and Qiao{-}Yan Wen}, title = {Analysis of the two-particle controlled interacting quantum walks}, journal = {Quantum Inf. Process.}, volume = {12}, number = {6}, pages = {2167--2176}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0516-2}, doi = {10.1007/S11128-012-0516-2}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/Li0MZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GuoGQ0W13, author = {Fen{-}Zhuo Guo and Fei Gao and Su{-}Juan Qin and Jie Zhang and Qiao{-}Yan Wen}, title = {Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states}, journal = {Quantum Inf. Process.}, volume = {12}, number = {8}, pages = {2793--2802}, year = {2013}, url = {https://doi.org/10.1007/s11128-013-0536-6}, doi = {10.1007/S11128-013-0536-6}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/GuoGQ0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SongWQZS13, author = {Ting{-}Ting Song and Qiao{-}Yan Wen and Su{-}Juan Qin and Wei{-}Wei Zhang and Ying Sun}, title = {The general theory of three-party quantum secret sharing protocols over phase-damping channels}, journal = {Quantum Inf. Process.}, volume = {12}, number = {10}, pages = {3291--3304}, year = {2013}, url = {https://doi.org/10.1007/s11128-013-0600-2}, doi = {10.1007/S11128-013-0600-2}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/SongWQZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/WangWZ13, author = {Hao Wang and Qiaoyan Wen and Zhao Zhang}, title = {Improvement of Peach Platform to Support GUI-Based Protocol State Modeling}, booktitle = {2013 {IEEE} International Conference on Green Computing and Communications (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013}, pages = {1094--1097}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.188}, doi = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.188}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/greencom/WangWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ChengJWZ13, author = {Lin Cheng and Zhengping Jin and Qiaoyan Wen and Hua Zhang}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {A novel privacy preserving keyword searching for cloud storage}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {77--81}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596039}, doi = {10.1109/PST.2013.6596039}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ChengJWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-5091, author = {Haiyan Sun and Qiaoyan Wen and Hua Zhang and Zhengping Jin and Wenmin Li}, title = {Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols}, journal = {CoRR}, volume = {abs/1301.5091}, year = {2013}, url = {http://arxiv.org/abs/1301.5091}, eprinttype = {arXiv}, eprint = {1301.5091}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-5091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengWJZZ13, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou}, title = {On the security of a certificateless aggregate signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2013}, url = {http://eprint.iacr.org/2013/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengWJZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengWJZ13, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang}, title = {On the security of a certi cateless signature scheme in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2013}, url = {http://eprint.iacr.org/2013/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengWJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/LiWSJW12, author = {Wenmin Li and Qiaoyan Wen and Qi Su and Zhengping Jin and Yanjiong Wang}, title = {An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {16}, number = {1-3}, pages = {29--44}, year = {2012}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-16-number-1-3-2012/ahswn-16-1-3-p-29-44/}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/LiWSJW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangSDW12, author = {Jie Zhang and ShouChao Song and Jiao Du and Qiaoyan Wen}, title = {On the construction of multi-output Boolean functions with optimal algebraic immunity}, journal = {Sci. China Inf. Sci.}, volume = {55}, number = {7}, pages = {1617--1623}, year = {2012}, url = {https://doi.org/10.1007/s11432-012-4597-4}, doi = {10.1007/S11432-012-4597-4}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangSDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiWSJ12, author = {Wenmin Li and Qiaoyan Wen and Qi Su and Zhengping Jin}, title = {An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network}, journal = {Comput. Commun.}, volume = {35}, number = {2}, pages = {188--195}, year = {2012}, url = {https://doi.org/10.1016/j.comcom.2011.09.003}, doi = {10.1016/J.COMCOM.2011.09.003}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LiWSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/LiaoWZZ12, author = {Xin Liao and Qiao{-}Yan Wen and Ze{-}li Zhao and Jie Zhang}, title = {A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function}, journal = {Fundam. Informaticae}, volume = {118}, number = {3}, pages = {281--289}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-714}, doi = {10.3233/FI-2012-714}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/LiaoWZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoWZJ12, author = {Lu Zhao and Qiao{-}Yan Wen and Jie Zhang and Zhengping Jin}, title = {On the 2-Adic Complexity of Periodic Binary Sequences}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {367--371}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.367}, doi = {10.1587/TRANSFUN.E95.A.367}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoWZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiaoWZ12, author = {Xin Liao and Qiaoyan Wen and Jie Zhang}, title = {A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {7}, pages = {1189--1192}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.1189}, doi = {10.1587/TRANSFUN.E95.A.1189}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiaoWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZuoWMZ12, author = {Huijuan Zuo and Qiaoyan Wen and Xiuwen Ma and Jie Zhang}, title = {A General Construction of Low Correlation Zone Sequence Sets Based on Finite Fields and Balanced Function}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {10}, pages = {1792--1795}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.1792}, doi = {10.1587/TRANSFUN.E95.A.1792}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ZuoWMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangQWZ12, author = {Xuan Zhang and Jing Qin and Qiaoyan Wen and Jie Zhang}, title = {A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {10}, pages = {1801--1805}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.1801}, doi = {10.1587/TRANSFUN.E95.A.1801}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangQWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijar/ZhuW12, author = {Ping Zhu and Qiaoyan Wen}, title = {Entropy and co-entropy of a covering approximation space}, journal = {Int. J. Approx. Reason.}, volume = {53}, number = {4}, pages = {528--540}, year = {2012}, url = {https://doi.org/10.1016/j.ijar.2011.12.004}, doi = {10.1016/J.IJAR.2011.12.004}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijar/ZhuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhuW12b, author = {Ping Zhu and Qiaoyan Wen}, title = {Information-theoretic measures associated with rough set approximations}, journal = {Inf. Sci.}, volume = {212}, pages = {33--43}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.05.014}, doi = {10.1016/J.INS.2012.05.014}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhuW12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/ZhaoW12, author = {Lu Zhao and Qiao{-}Yan Wen}, title = {On the joint 2-adic complexity of binary multisequences}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {46}, number = {3}, pages = {401--412}, year = {2012}, url = {https://doi.org/10.1051/ita/2012011}, doi = {10.1051/ITA/2012011}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/ZhaoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZJZW12, author = {Min Zhang and Jie Zhang and Zhengping Jin and Hua Zhang and Qiao{-}Yan Wen}, title = {A Light-Weight Rainbow Signature Scheme for {WSN}}, journal = {J. Networks}, volume = {7}, number = {8}, pages = {1272--1279}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.8.1272-1279}, doi = {10.4304/JNW.7.8.1272-1279}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZJZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/MaGYLW12, author = {Jia{-}Jun Ma and Fen{-}Zhuo Guo and Qian Yang and Yan{-}Bing Li and Qiao{-}Yan Wen}, title = {Semi-loss-tolerant strong coin flipping protocol using {EPR} pairs}, journal = {Quantum Inf. Comput.}, volume = {12}, number = {5-6}, pages = {490--501}, year = {2012}, url = {https://doi.org/10.26421/QIC12.5-6-9}, doi = {10.26421/QIC12.5-6-9}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/MaGYLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SunGYLW12, author = {Ying Sun and Fei Gao and Zheng Yuan and Yan{-}Bing Li and Qiao{-}Yan Wen}, title = {Splitting a quantum secret without the assistance of entanglements}, journal = {Quantum Inf. Process.}, volume = {11}, number = {6}, pages = {1741--1750}, year = {2012}, url = {https://doi.org/10.1007/s11128-011-0328-9}, doi = {10.1007/S11128-011-0328-9}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/SunGYLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/WangWSZ12, author = {Zhaoxing Wang and Qiaoyan Wen and Yi Sun and Hua Zhang}, title = {A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Computer and Information Technology, {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012}, pages = {921--925}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIT.2012.190}, doi = {10.1109/CIT.2012.190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/WangWSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/QianW12, author = {Han Qian and Qiaoyan Wen}, title = {A cloud-based system for enhancing security of Android devices}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {245--249}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664405}, doi = {10.1109/CCIS.2012.6664405}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/ccis/QianW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/YuW12, author = {Yang Yu and Qiaoyan Wen}, title = {The design of the cloud mobile {OA} system}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {250--254}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664406}, doi = {10.1109/CCIS.2012.6664406}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/YuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/ZhangW12, author = {Zhaohai Zhang and Qiaoyan Wen}, title = {An authorization model for multi-tenancy services in cloud}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {260--263}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664408}, doi = {10.1109/CCIS.2012.6664408}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/ZhangW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/LiSW12a, author = {Xiaowei Li and Hongxiang Sun and Qiaoyan Wen}, title = {An approach for secure-communication between {XEN} virtual machines}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {283--286}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664413}, doi = {10.1109/CCIS.2012.6664413}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/LiSW12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/ChenW12a, author = {Wei Chen and Qiaoyan Wen}, title = {An architecture for dynamic management and monitoring of virtual machines}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {444--448}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664445}, doi = {10.1109/CCIS.2012.6664445}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/ChenW12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/ChenWL12, author = {Wei Chen and Qiaoyan Wen and Bohou Li}, title = {A propagation model of passive social network worm}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {524--528}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664229}, doi = {10.1109/CCIS.2012.6664229}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/ChenWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/HeMWM12, author = {Haiguo He and Jiao Mo and Qiaoyan Wen and Zishan Meng}, title = {Node information in {WSN} from the business perspective}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {1028--1031}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664537}, doi = {10.1109/CCIS.2012.6664537}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/HeMWM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CuiW12, author = {Jie Cui and Qiaoyan Wen}, title = {Analysis on Operating Mechanism of SecurityKISS}, booktitle = {Eighth International Conference on Computational Intelligence and Security, {CIS} 2012, Guangzhou, China, November 17-18, 2012}, pages = {666--669}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIS.2012.153}, doi = {10.1109/CIS.2012.153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CuiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/FanW12, author = {Ya{-}Jun Fan and Qiao{-}Yan Wen}, editor = {Liang Gao and Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Jianming Yong and Wenfeng Li and Weidong Li}, title = {A smart card-based secure software distribution scheme for mobile application market}, booktitle = {{IEEE} 16th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2012, May 23-25, 2012, Wuhan, China}, pages = {244--250}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CSCWD.2012.6221825}, doi = {10.1109/CSCWD.2012.6221825}, timestamp = {Mon, 10 Oct 2022 09:54:55 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/FanW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdma/ZhangWT12, author = {Zhao Zhang and Qiao{-}Yan Wen and Wen Tang}, title = {Mining Protocol State Machines by Interactive Grammar Inference}, booktitle = {Third International Conference on Digital Manufacturing {\&} Automation, {ICDMA} 2012, Guilin, China, July 31 - Aug. 2, 2012}, pages = {524--527}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDMA.2012.125}, doi = {10.1109/ICDMA.2012.125}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdma/ZhangWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/WangWWZ12, author = {Zhaoxing Wang and Qiaoyan Wen and Teng Wang and Hua Zhang}, title = {A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set}, booktitle = {Ninth {IEEE} International Conference on e-Business Engineering, {ICEBE} 2012, Hangzhou, China, September 9-11, 2012}, pages = {260--264}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICEBE.2012.49}, doi = {10.1109/ICEBE.2012.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/WangWWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnidc/WuHZW12, author = {Yanfang Wu and Zheng Huang and Jie Zhang and Qiaoyan Wen}, title = {A lattice-based digital signature from the Ring-LWE}, booktitle = {3rd {IEEE} International Conference on Network Infrastructure and Digital Content, {IC-NIDC} 2012, Beijing, China, September 21-23, 2012}, pages = {646--651}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICNIDC.2012.6418835}, doi = {10.1109/ICNIDC.2012.6418835}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icnidc/WuHZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-2857, author = {Ping Zhu and Qiaoyan Wen}, title = {Operations on soft sets revisited}, journal = {CoRR}, volume = {abs/1205.2857}, year = {2012}, url = {http://arxiv.org/abs/1205.2857}, eprinttype = {arXiv}, eprint = {1205.2857}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-2857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZhuW11, author = {Ping Zhu and Qiaoyan Wen}, title = {Affine braid groups: a better platform than braid groups for cryptology?}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {22}, number = {5-6}, pages = {375--391}, year = {2011}, url = {https://doi.org/10.1007/s00200-011-0157-1}, doi = {10.1007/S00200-011-0157-1}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/ZhuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/ZhuW11, author = {Ping Zhu and Qiaoyan Wen}, title = {Homomorphisms between fuzzy information systems revisited}, journal = {Appl. Math. Lett.}, volume = {24}, number = {9}, pages = {1548--1553}, year = {2011}, url = {https://doi.org/10.1016/j.aml.2011.03.044}, doi = {10.1016/J.AML.2011.03.044}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/appml/ZhuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/JinW11, author = {Zhengping Jin and Qiaoyan Wen}, title = {Certificateless multi-proxy signature}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {344--352}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.06.013}, doi = {10.1016/J.COMCOM.2010.06.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/JinW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangWZ11, author = {Xuan Zhang and Qiaoyan Wen and Jie Zhang}, title = {A General Construction of {ZCZ} Sequence Set with Large Family Size and Long Period}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {420--423}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.420}, doi = {10.1587/TRANSFUN.E94.A.420}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MaWZ11, author = {Xiuwen Ma and Qiaoyan Wen and Jie Zhang}, title = {New Constructions of Binary Sequences with Optimal Autocorrelation Magnitude Based on Interleaving Technique}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {8}, pages = {1760--1763}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1760}, doi = {10.1587/TRANSFUN.E94.A.1760}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MaWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWZ11, author = {Huijuan Wang and Qiaoyan Wen and Jie Zhang}, title = {2-Adic Complexity of Self-Shrinking Sequence}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {11}, pages = {2462--2465}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.2462}, doi = {10.1587/TRANSFUN.E94.A.2462}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MaWZZ11, author = {Xiuwen Ma and Qiaoyan Wen and Jie Zhang and Xuan Zhang}, title = {New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {12}, pages = {2874--2878}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.2874}, doi = {10.1587/TRANSFUN.E94.A.2874}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MaWZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgs/ZhuW11, author = {Ping Zhu and Qiaoyan Wen}, title = {A note on communicating between information systems based on including degrees}, journal = {Int. J. Gen. Syst.}, volume = {40}, number = {8}, pages = {837--840}, year = {2011}, url = {https://doi.org/10.1080/03081079.2011.611805}, doi = {10.1080/03081079.2011.611805}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijgs/ZhuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LiaoWZ11, author = {Xin Liao and Qiao{-}Yan Wen and Jie Zhang}, title = {A steganographic method for digital images with four-pixel differencing and modified {LSB} substitution}, journal = {J. Vis. Commun. Image Represent.}, volume = {22}, number = {1}, pages = {1--8}, year = {2011}, url = {https://doi.org/10.1016/j.jvcir.2010.08.007}, doi = {10.1016/J.JVCIR.2010.08.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/LiaoWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/SongZQGW11, author = {Ting{-}Ting Song and Jie Zhang and Su{-}Juan Qin and Fei Gao and Qiao{-}Yan Wen}, title = {Finite-key analysis for quantum key distribution with decoy states}, journal = {Quantum Inf. Comput.}, volume = {11}, number = {5{\&}6}, pages = {374--389}, year = {2011}, url = {https://doi.org/10.26421/QIC11.5-6-2}, doi = {10.26421/QIC11.5-6-2}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/SongZQGW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/WangW11, author = {Tian{-}Yin Wang and Qiao{-}Yan Wen}, title = {Security of a kind of quantum secret sharing with single photons}, journal = {Quantum Inf. Comput.}, volume = {11}, number = {5{\&}6}, pages = {434--443}, year = {2011}, url = {https://doi.org/10.26421/QIC11.5-6-5}, doi = {10.26421/QIC11.5-6-5}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/WangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/YangTCW11, author = {Yu{-}Guang Yang and Yi{-}Wei Teng and Hai{-}Ping Chai and Qiao{-}Yan Wen}, title = {Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 {(2009)]}}, journal = {Quantum Inf. Process.}, volume = {10}, number = {3}, pages = {317--323}, year = {2011}, url = {https://doi.org/10.1007/s11128-010-0199-5}, doi = {10.1007/S11128-010-0199-5}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/YangTCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/LiW11, author = {Xiaobiao Li and Qiaoyan Wen}, title = {A revocation scheme for the cloud computing environment}, booktitle = {2011 {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2011, Beijing, China, September 15-17, 2011}, pages = {254--258}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CCIS.2011.6045070}, doi = {10.1109/CCIS.2011.6045070}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ccis/LiW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csise/ShiWL11, author = {Sha Shi and Qiaoyan Wen and Mingzhu Li}, editor = {David Jin and Sally Lin}, title = {Research on Mobile Electronically Published Materials Protection}, booktitle = {Advances in Computer Science, Intelligent System and Environment [Proceedings of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]}, series = {Advances in Intelligent and Soft Computing}, volume = {104}, pages = {125--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23777-5\_21}, doi = {10.1007/978-3-642-23777-5\_21}, timestamp = {Fri, 19 May 2017 01:26:02 +0200}, biburl = {https://dblp.org/rec/conf/csise/ShiWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csise/YanW11, author = {Tao Yan and Qiaoyan Wen}, editor = {David Jin and Sally Lin}, title = {Building the Internet of Things Using a Mobile {RFID} Security Protocol Based on Information Technology}, booktitle = {Advances in Computer Science, Intelligent System and Environment [Proceedings of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]}, series = {Advances in Intelligent and Soft Computing}, volume = {104}, pages = {143--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23777-5\_24}, doi = {10.1007/978-3-642-23777-5\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csise/YanW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csise/ZhouWY11, author = {Huixiang Zhou and Qiaoyan Wen and Xiaojun Yu}, editor = {David Jin and Sally Lin}, title = {A Productive Time Length-Based Method for Multi-tenancy-Oriented Service Usage Metering and Billing}, booktitle = {Advances in Computer Science, Intelligent System and Environment [Proceedings of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]}, series = {Advances in Intelligent and Soft Computing}, volume = {104}, pages = {163--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23777-5\_27}, doi = {10.1007/978-3-642-23777-5\_27}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csise/ZhouWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csise/ZhangSWS11, author = {Xiaolan Zhang and Hongxiang Sun and Qiaoyan Wen and Shi Sha}, editor = {David Jin and Sally Lin}, title = {Study on the Technology of the Secure Computation in the Different Adversarial Models}, booktitle = {Advances in Computer Science, Intelligent System and Environment [Proceedings of {CSISE} 2011, Volume 1, September 24-25, 2011, Guangzhou, China]}, series = {Advances in Intelligent and Soft Computing}, volume = {104}, pages = {473--478}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23777-5\_77}, doi = {10.1007/978-3-642-23777-5\_77}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csise/ZhangSWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LiaoWS11, author = {Xin Liao and Qiao{-}Yan Wen and Sha Shi}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {Distributed Steganography}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {153--156}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.20}, doi = {10.1109/IIHMSP.2011.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LiaoWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptc/SunSWZ11, author = {Yi Sun and Hongxiang Sun and Qiaoyan Wen and Hua Zhang}, title = {A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model}, booktitle = {2nd International Symposium on Intelligence Information Processing and Trusted Computing, {IPTC} 2011, Wuhan, China, October 22-23, 2011}, pages = {5--8}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IPTC.2011.9}, doi = {10.1109/IPTC.2011.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptc/SunSWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-0079, author = {Ping Zhu and Qiaoyan Wen}, title = {Information-theoretic measures associated with rough set approximations}, journal = {CoRR}, volume = {abs/1102.0079}, year = {2011}, url = {http://arxiv.org/abs/1102.0079}, eprinttype = {arXiv}, eprint = {1102.0079}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-0079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-0649, author = {Min Zhang and Jie Zhang and Qiao{-}Yan Wen and Zhengping Jin and Hua Zhang}, title = {Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing}, journal = {CoRR}, volume = {abs/1112.0649}, year = {2011}, url = {http://arxiv.org/abs/1112.0649}, eprinttype = {arXiv}, eprint = {1112.0649}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-0649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/JinWD10, author = {Zhengping Jin and Qiaoyan Wen and Hongzhen Du}, title = {An improved semantically-secure identity-based signcryption scheme in the standard model}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {3}, pages = {545--552}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.12.009}, doi = {10.1016/J.COMPELECENG.2009.12.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/JinWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangWZ10, author = {Xuan Zhang and Qiaoyan Wen and Jie Zhang}, title = {New General Constructions of {LCZ} Sequence Sets Based on Interleaving Technique and Affine Transformations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {5}, pages = {942--949}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.942}, doi = {10.1587/TRANSFUN.E93.A.942}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhuW10, author = {Ping Zhu and Qiaoyan Wen}, title = {Some improved results on communication between information systems}, journal = {Inf. Sci.}, volume = {180}, number = {18}, pages = {3521--3531}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2010.05.028}, doi = {10.1016/J.INS.2010.05.028}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhuW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/LiaoWSZ10, author = {Xin Liao and Qiao{-}Yan Wen and Ying Sun and Jie Zhang}, title = {Multi-party covert communication with steganography and quantum secret sharing}, journal = {J. Syst. Softw.}, volume = {83}, number = {10}, pages = {1801--1804}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.04.076}, doi = {10.1016/J.JSS.2010.04.076}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/LiaoWSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/ZhuW10, author = {Ping Zhu and Qiaoyan Wen}, editor = {Xiaohua Hu and Tsau Young Lin and Vijay V. Raghavan and Jerzy W. Grzymala{-}Busse and Qing Liu and Andrei Z. Broder}, title = {Probabilistic Soft Sets}, booktitle = {2010 {IEEE} International Conference on Granular Computing, GrC 2010, San Jose, California, USA, 14-16 August 2010}, pages = {635--638}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/GrC.2010.51}, doi = {10.1109/GRC.2010.51}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/grc/ZhuW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/SunSZW10, author = {Yi Sun and Hongxiang Sun and Hua Zhang and Qiao{-}Yan Wen}, editor = {Fu Lee Wang and Zhiguo Gong and Xiangfeng Luo and Jingsheng Lei}, title = {A Secure Protocol for Point-Segment Position Problem}, booktitle = {Web Information Systems and Mining - International Conference, {WISM} 2010, Sanya, China, October 23-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6318}, pages = {212--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16515-3\_27}, doi = {10.1007/978-3-642-16515-3\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wism/SunSZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-0449, author = {Ping Zhu and Qiaoyan Wen}, title = {A note on "communicating between information systems"}, journal = {CoRR}, volume = {abs/1002.0449}, year = {2010}, url = {http://arxiv.org/abs/1002.0449}, eprinttype = {arXiv}, eprint = {1002.0449}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-0449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-0908, author = {Ping Zhu and Qiaoyan Wen}, title = {Homomorphisms between fuzzy information systems revisited}, journal = {CoRR}, volume = {abs/1002.0908}, year = {2010}, url = {http://arxiv.org/abs/1002.0908}, eprinttype = {arXiv}, eprint = {1002.0908}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-0908.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-1484, author = {Ping Zhu and Qiaoyan Wen}, title = {A note on communicating between information systems based on including degrees}, journal = {CoRR}, volume = {abs/1008.1484}, year = {2010}, url = {http://arxiv.org/abs/1008.1484}, eprinttype = {arXiv}, eprint = {1008.1484}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-1484.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinWZ10, author = {Zhengping Jin and Qiaoyan Wen and Hua Zhang}, title = {A supplement to Liu et al.'s certificateless signcryption scheme in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2010}, url = {http://eprint.iacr.org/2010/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/DuW09, author = {Hongzhen Du and Qiaoyan Wen}, title = {Efficient and provably-secure certificateless short signature scheme from bilinear pairings}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {2}, pages = {390--394}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.05.013}, doi = {10.1016/J.CSI.2008.05.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/DuW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ZhangWZL09, author = {Hua Zhang and Qiao{-}Yan Wen and Jie Zhang and Wenmin Li}, title = {A constant rounds group key agreement protocol without using hash functions}, journal = {Int. J. Netw. Manag.}, volume = {19}, number = {6}, pages = {457--464}, year = {2009}, url = {https://doi.org/10.1002/nem.720}, doi = {10.1002/NEM.720}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ZhangWZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/QinGWZ09, author = {Su{-}Juan Qin and Fei Gao and Qiao{-}Yan Wen and Fu{-}Chen Zhu}, title = {Security of quantum secret sharing with two-particle entanglement against individual attacks}, journal = {Quantum Inf. Comput.}, volume = {9}, number = {9{\&}10}, pages = {765--772}, year = {2009}, url = {https://doi.org/10.26421/QIC9.9-10-3}, doi = {10.26421/QIC9.9-10-3}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/QinGWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/LiaoW08, author = {Xin Liao and Qiao{-}Yan Wen}, title = {Embedding in Two Least Significant Bits with Wet Paper Coding}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {555--558}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.970}, doi = {10.1109/CSSE.2008.970}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/LiaoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/LiW08a, author = {Wenmin Li and Qiao{-}Yan Wen}, title = {Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {1003--1006}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.1129}, doi = {10.1109/CSSE.2008.1129}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/LiW08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/ZhangWC08, author = {Qing Zhang and Qiaoyan Wen and Gengli Chen}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Efficient Fair Contract Signing Protocol from Bilinear Pairings}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {333--337}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.115}, doi = {10.1109/ISECS.2008.115}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/ZhangWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinZDW08, author = {Zhengping Jin and Huijuan Zuo and Hongzhen Du and Qiaoyan Wen}, title = {An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2008}, url = {http://eprint.iacr.org/2008/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinZDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiaoW08, author = {Xin Liao and Qiao{-}Yan Wen}, title = {Embedding in Two Least Significant Bits with Wet Paper Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2008}, url = {http://eprint.iacr.org/2008/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiaoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuQ08, author = {Lu Zhao and Qiao{-}Yan Wen}, title = {2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2008}, url = {http://eprint.iacr.org/2008/259}, timestamp = {Sat, 06 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuW08, author = {Hongzhen Du and Qiaoyan Wen}, title = {Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2008}, url = {http://eprint.iacr.org/2008/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/GaoQWZ07, author = {Fei Gao and Su{-}Juan Qin and Qiao{-}Yan Wen and Fu{-}Chen Zhu}, title = {A simple participant attack on the br{\'{a}}dler-du{\v{s}}ek protocol}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {4}, pages = {329--334}, year = {2007}, url = {https://doi.org/10.26421/QIC7.4-4}, doi = {10.26421/QIC7.4-4}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/GaoQWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DuW07, author = {Hongzhen Du and Qiaoyan Wen}, title = {An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {725--729}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.168}, doi = {10.1109/CIS.2007.168}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/LiLWY07, author = {Yu{-}Ying Li and Lixiang Li and Qiaoyan Wen and Yixian Yang}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {Integer Programming via Chaotic Ant Swarm}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 4}, pages = {489--493}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.444}, doi = {10.1109/ICNC.2007.444}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/LiLWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/ZhangWZ07, author = {Xiufeng Zhang and Qiaoyan Wen and Fu{-}Chen Zhu}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {Object-Oriented Quantum Cryptography Simulation Model}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 4}, pages = {599--602}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.509}, doi = {10.1109/ICNC.2007.509}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/ZhangWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuW07, author = {Hongzhen Du and Qiaoyan Wen}, title = {Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2007}, url = {http://eprint.iacr.org/2007/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KeZW06, author = {Pinhui Ke and Jie Zhang and Qiaoyan Wen}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Results on Almost Resilient Functions}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {421--432}, year = {2006}, url = {https://doi.org/10.1007/11767480\_29}, doi = {10.1007/11767480\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KeZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TongZW06, author = {Xin Tong and Jie Zhang and Qiao{-}Yan Wen}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {New Constructions of Large Binary Sequences Family with Low Correlation}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {42--53}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_4}, doi = {10.1007/11937807\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TongZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/YuanWWZ06, author = {Zheng Yuan and Qiaoyan Wen and Wenling Wu and Qing Zhang}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {An \emph{ID}-Based Watermarking Scheme for Java Programs}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {848--857}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_85}, doi = {10.1007/11807964\_85}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/YuanWWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/LiLWY06, author = {Yu{-}Ying Li and Lixiang Li and Qiao{-}Yan Wen and Yixian Yang}, editor = {Licheng Jiao and Lipo Wang and Xinbo Gao and Jing Liu and Feng Wu}, title = {Data Fitting Via Chaotic Ant Swarm}, booktitle = {Advances in Natural Computation, Second International Conference, {ICNC} 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4222}, pages = {180--183}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11881223\_23}, doi = {10.1007/11881223\_23}, timestamp = {Mon, 19 Apr 2021 14:35:00 +0200}, biburl = {https://dblp.org/rec/conf/icnc/LiLWY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuWL05, author = {Tailin Liu and Qiaoyan Wen and Zihui Liu}, title = {Construction of nonbinary quantum cyclic codes by using graph method}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {48}, number = {6}, pages = {693--702}, year = {2005}, url = {https://doi.org/10.1360/04yf0368}, doi = {10.1360/04YF0368}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiuWL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KeLW05, author = {Pinhui Ke and Tailin Liu and Qiao{-}Yan Wen}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Constructions of Almost Resilient Functions}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {236--246}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_20}, doi = {10.1007/11599371\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/KeLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenWW05, author = {Fengtong Wen and Wenling Wu and Qiaoyan Wen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Error Oracle Attacks on Several Modes of Operation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {62--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_9}, doi = {10.1007/11596981\_9}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/WenWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GaoQWZ05, author = {Fei Gao and Su{-}Juan Qin and Qiao{-}Yan Wen and Fu{-}Chen Zhu}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {302--312}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_26}, doi = {10.1007/11599548\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GaoQWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KeZW05, author = {Pinhui Ke and Jie Zhang and Qiaoyan Wen}, title = {Further Constructions of Almost Resilient Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2005}, url = {http://eprint.iacr.org/2005/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KeZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.