BibTeX records: Rongmao Chen

download as .bib file

@article{DBLP:journals/tcs/LaiMGCM18,
  author    = {Jianchang Lai and
               Yi Mu and
               Fuchun Guo and
               Rongmao Chen and
               Sha Ma},
  title     = {Efficient \emph{k}-out-of-\emph{n} oblivious transfer scheme with
               the ideal communication cost},
  journal   = {Theor. Comput. Sci.},
  volume    = {714},
  pages     = {15--26},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.tcs.2017.12.019},
  doi       = {10.1016/j.tcs.2017.12.019},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/LaiMGCM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCWW18,
  author    = {Chi Liu and
               Rongmao Chen and
               Yi Wang and
               Yongjun Wang},
  title     = {Asymmetric Subversion Attacks on Signature Schemes},
  booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  pages     = {376--395},
  year      = {2018},
  crossref  = {DBLP:conf/acisp/2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3\_22},
  doi       = {10.1007/978-3-319-93638-3\_22},
  timestamp = {Mon, 02 Jul 2018 18:50:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/LiuCWW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author    = {Lin Liu and
               Jinshu Su and
               Rongmao Chen and
               Ximeng Liu and
               Xiaofeng Wang and
               Shuhui Chen and
               Ho{-}fung Leung},
  title     = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
               Data from Multiple Parties},
  booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  pages     = {431--451},
  year      = {2018},
  crossref  = {DBLP:conf/acisp/2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi       = {10.1007/978-3-319-93638-3\_25},
  timestamp = {Tue, 03 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/LiuSCLWCL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/XiaSCLC18,
  author    = {Yusheng Xia and
               Jinshu Su and
               Rongmao Chen and
               Yaping Liu and
               Shuhui Chen},
  title     = {A Real-Time Aware Routing Strategy in Smart City Environments},
  booktitle = {2018 {IEEE} International Conference on Sensing, Communication and
               Networking, {SECON} Workshops 2018, Hong Kong, Hong Kong, June 11,
               2018},
  pages     = {9--14},
  year      = {2018},
  crossref  = {DBLP:conf/secon/2018w},
  url       = {https://doi.org/10.1109/SECONW.2018.8396343},
  doi       = {10.1109/SECONW.2018.8396343},
  timestamp = {Fri, 06 Jul 2018 12:55:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secon/XiaSCLC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LaiMGC17,
  author    = {Jianchang Lai and
               Yi Mu and
               Fuchun Guo and
               Rongmao Chen},
  title     = {Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization},
  journal   = {Comput. J.},
  volume    = {60},
  number    = {12},
  pages     = {1809--1821},
  year      = {2017},
  url       = {https://doi.org/10.1093/comjnl/bxx060},
  doi       = {10.1093/comjnl/bxx060},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/LaiMGC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WangMC17,
  author    = {Xiaofen Wang and
               Yi Mu and
               Rongmao Chen},
  title     = {Privacy-preserving data search and sharing protocol for social networks
               through wireless applications},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {29},
  number    = {7},
  year      = {2017},
  url       = {https://doi.org/10.1002/cpe.3870},
  doi       = {10.1002/cpe.3870},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/WangMC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSG17,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo},
  title     = {Strong authenticated key exchange with auxiliary inputs},
  journal   = {Des. Codes Cryptography},
  volume    = {85},
  number    = {1},
  pages     = {145--173},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10623-016-0295-3},
  doi       = {10.1007/s10623-016-0295-3},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/ChenMYSG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSGZ17,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo and
               Zheng Yang},
  title     = {A note on the strong authenticated key exchange with auxiliary inputs},
  journal   = {Des. Codes Cryptography},
  volume    = {85},
  number    = {1},
  pages     = {175--178},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10623-017-0386-9},
  doi       = {10.1007/s10623-017-0386-9},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/ChenMYSGZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LaiMGSC17,
  author    = {Jianchang Lai and
               Yi Mu and
               Fuchun Guo and
               Willy Susilo and
               Rongmao Chen},
  title     = {Fully privacy-preserving and revocable ID-based broadcast encryption
               for data access control in smart city},
  journal   = {Personal and Ubiquitous Computing},
  volume    = {21},
  number    = {5},
  pages     = {855--868},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00779-017-1045-x},
  doi       = {10.1007/s00779-017-1045-x},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/puc/LaiMGSC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/WangMC17,
  author    = {Xiaofen Wang and
               Yi Mu and
               Rongmao Chen},
  title     = {Privacy-Preserving Data Packet Filtering Protocol with Source {IP}
               Authentication},
  journal   = {Wireless Personal Communications},
  volume    = {95},
  number    = {4},
  pages     = {3509--3537},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11277-017-4010-0},
  doi       = {10.1007/s11277-017-4010-0},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wpc/WangMC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author    = {Hao Sun and
               Jinshu Su and
               Xiaofeng Wang and
               Rongmao Chen and
               Yujing Liu and
               Qiaolin Hu},
  title     = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  pages     = {153--172},
  year      = {2017},
  crossref  = {DBLP:conf/acisp/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi       = {10.1007/978-3-319-59870-3\_9},
  timestamp = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/SunSWCLH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoCSLYM17,
  author    = {Fuchun Guo and
               Rongmao Chen and
               Willy Susilo and
               Jianchang Lai and
               Guomin Yang and
               Yi Mu},
  title     = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities
               with a Counterexample},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  pages     = {517--547},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-63715-0\_18},
  doi       = {10.1007/978-3-319-63715-0\_18},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GuoCSLYM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GrittiCSP17,
  author    = {Cl{\'{e}}mentine Gritti and
               Rongmao Chen and
               Willy Susilo and
               Thomas Plantard},
  title     = {Dynamic Provable Data Possession Protocols with Public Verifiability
               and Data Privacy},
  booktitle = {Information Security Practice and Experience - 13th International
               Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
               2017, Proceedings},
  pages     = {485--505},
  year      = {2017},
  crossref  = {DBLP:conf/ispec/2017},
  url       = {https://doi.org/10.1007/978-3-319-72359-4\_29},
  doi       = {10.1007/978-3-319-72359-4\_29},
  timestamp = {Fri, 08 Dec 2017 14:27:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/GrittiCSP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08434,
  author    = {Cl{\'{e}}mentine Gritti and
               Rongmao Chen and
               Willy Susilo and
               Thomas Plantard},
  title     = {Dynamic Provable Data Possession Protocols with Public Verifiability
               and Data Privacy},
  journal   = {CoRR},
  volume    = {abs/1709.08434},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.08434},
  archivePrefix = {arXiv},
  eprint    = {1709.08434},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-08434},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSG17,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo},
  title     = {Strong Authenticated Key Exchange with Auxiliary Inputs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {418},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/418},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenMYSG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoCSLYM17,
  author    = {Fuchun Guo and
               Rongmao Chen and
               Willy Susilo and
               Jianchang Lai and
               Guomin Yang and
               Yi Mu},
  title     = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities
               with {A} Counterexample},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {499},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/499},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GuoCSLYM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WangMCZ16,
  author    = {Xiaofen Wang and
               Yi Mu and
               Rongmao Chen and
               Xiaosong Zhang},
  title     = {Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer
               Group},
  journal   = {J. Comput. Sci. Technol.},
  volume    = {31},
  number    = {5},
  pages     = {1012--1027},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11390-016-1676-9},
  doi       = {10.1007/s11390-016-1676-9},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcst/WangMCZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangMC16,
  author    = {Xiaofen Wang and
               Yi Mu and
               Rongmao Chen},
  title     = {An efficient privacy-preserving aggregation and billing protocol for
               smart grid},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {17},
  pages     = {4536--4547},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1645},
  doi       = {10.1002/sec.1645},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/WangMC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYGW16,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Fuchun Guo and
               Xiaofen Wang},
  title     = {Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud
               Storage},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {4},
  pages     = {789--798},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2015.2510822},
  doi       = {10.1109/TIFS.2015.2510822},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ChenMYGW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMC16,
  author    = {Xiaofen Wang and
               Yi Mu and
               Rongmao Chen},
  title     = {One-Round Privacy-Preserving Meeting Location Determination for Smartphone
               Applications},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {8},
  pages     = {1712--1721},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2016.2549508},
  doi       = {10.1109/TIFS.2016.2549508},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/WangMC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYGHWW16,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Fuchun Guo and
               Xinyi Huang and
               Xiaofen Wang and
               Yongjun Wang},
  title     = {Server-Aided Public Key Encryption With Keyword Search},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {12},
  pages     = {2833--2842},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2016.2599293},
  doi       = {10.1109/TIFS.2016.2599293},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ChenMYGHWW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16,
  author    = {Rongmao Chen and
               Yi Mu and
               Willy Susilo and
               Guomin Yang and
               Fuchun Guo and
               Mingwu Zhang},
  title     = {One-Round Strong Oblivious Signature-Based Envelope},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  pages     = {3--20},
  year      = {2016},
  crossref  = {DBLP:conf/acisp/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-40367-0\_1},
  doi       = {10.1007/978-3-319-40367-0\_1},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ChenMSYGZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiMGSC16,
  author    = {Jianchang Lai and
               Yi Mu and
               Fuchun Guo and
               Willy Susilo and
               Rongmao Chen},
  title     = {Anonymous Identity-Based Broadcast Encryption with Revocation for
               File Sharing},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  pages     = {223--239},
  year      = {2016},
  crossref  = {DBLP:conf/acisp/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-40367-0\_14},
  doi       = {10.1007/978-3-319-40367-0\_14},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/LaiMGSC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoSMCLY16,
  author    = {Fuchun Guo and
               Willy Susilo and
               Yi Mu and
               Rongmao Chen and
               Jianchang Lai and
               Guomin Yang},
  title     = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in
               Security Reduction},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  pages     = {745--776},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53890-6\_25},
  doi       = {10.1007/978-3-662-53890-6\_25},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/GuoSMCLY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMYSGZ16,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo and
               Mingwu Zhang},
  title     = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
               Functions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  pages     = {844--876},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53887-6\_31},
  doi       = {10.1007/978-3-662-53887-6\_31},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/ChenMYSGZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SusiloCGYMC16,
  author    = {Willy Susilo and
               Rongmao Chen and
               Fuchun Guo and
               Guomin Yang and
               Yi Mu and
               Yang{-}Wai Chow},
  title     = {Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke
               Some Recipients in {IBBE} without Knowledge of the Plaintext},
  booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages     = {201--210},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016asia},
  url       = {http://doi.acm.org/10.1145/2897845.2897848},
  doi       = {10.1145/2897845.2897848},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SusiloCGYMC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChenMYSG16,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo},
  title     = {Strongly Leakage-Resilient Authenticated Key Exchange},
  booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  pages     = {19--36},
  year      = {2016},
  crossref  = {DBLP:conf/ctrsa/2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8\_2},
  doi       = {10.1007/978-3-319-29485-8\_2},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/ChenMYSG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/JiangWLGC16,
  author    = {Peng Jiang and
               Xiaofen Wang and
               Jianchang Lai and
               Fuchun Guo and
               Rongmao Chen},
  title     = {Oblivious Keyword Search with Authorization},
  booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
               China, November 10-11, 2016, Proceedings},
  pages     = {173--190},
  year      = {2016},
  crossref  = {DBLP:conf/provsec/2016},
  url       = {https://doi.org/10.1007/978-3-319-47422-9\_10},
  doi       = {10.1007/978-3-319-47422-9\_10},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/JiangWLGC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSG16,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo},
  title     = {Strongly Leakage-Resilient Authenticated Key Exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {308},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/308},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenMYSG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoSMCLY16,
  author    = {Fuchun Guo and
               Willy Susilo and
               Yi Mu and
               Rongmao Chen and
               Jianchang Lai and
               Guomin Yang},
  title     = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in
               Security Reduction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {872},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/872},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GuoSMCLY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSGZ16,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Willy Susilo and
               Fuchun Guo and
               Mingwu Zhang},
  title     = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
               Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {873},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/873},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenMYSGZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYG15,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Fuchun Guo},
  title     = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File
               Deduplication},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {12},
  pages     = {2643--2652},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2015.2470221},
  doi       = {10.1109/TIFS.2015.2470221},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ChenMYG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMYGW15,
  author    = {Rongmao Chen and
               Yi Mu and
               Guomin Yang and
               Fuchun Guo and
               Xiaofen Wang},
  title     = {A New General Framework for Secure Public Key Encryption with Keyword
               Search},
  booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
               2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  pages     = {59--76},
  year      = {2015},
  crossref  = {DBLP:conf/acisp/2015},
  url       = {https://doi.org/10.1007/978-3-319-19962-7\_4},
  doi       = {10.1007/978-3-319-19962-7\_4},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ChenMYGW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2018,
  editor    = {Willy Susilo and
               Guomin Yang},
  title     = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10946},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3},
  doi       = {10.1007/978-3-319-93638-3},
  isbn      = {978-3-319-93637-6},
  timestamp = {Mon, 02 Jul 2018 18:50:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secon/2018w,
  title     = {2018 {IEEE} International Conference on Sensing, Communication and
               Networking, {SECON} Workshops 2018, Hong Kong, Hong Kong, June 11,
               2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8396211},
  isbn      = {978-1-5386-5241-1},
  timestamp = {Fri, 06 Jul 2018 12:55:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secon/2018w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-2,
  editor    = {Josef Pieprzyk and
               Suriadi Suriadi},
  title     = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10343},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-59870-3},
  doi       = {10.1007/978-3-319-59870-3},
  isbn      = {978-3-319-59869-7},
  timestamp = {Wed, 31 May 2017 15:33:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-2,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10402},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63715-0},
  doi       = {10.1007/978-3-319-63715-0},
  isbn      = {978-3-319-63714-3},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2017,
  editor    = {Joseph K. Liu and
               Pierangela Samarati},
  title     = {Information Security Practice and Experience - 13th International
               Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
               2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10701},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72359-4},
  doi       = {10.1007/978-3-319-72359-4},
  isbn      = {978-3-319-72358-7},
  timestamp = {Fri, 08 Dec 2017 14:27:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor    = {Joseph K. Liu and
               Ron Steinfeld},
  title     = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9723},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-40367-0},
  doi       = {10.1007/978-3-319-40367-0},
  isbn      = {978-3-319-40366-3},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-2,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10032},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53890-6},
  doi       = {10.1007/978-3-662-53890-6},
  isbn      = {978-3-662-53889-0},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53887-6},
  doi       = {10.1007/978-3-662-53887-6},
  isbn      = {978-3-662-53886-9},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016asia,
  editor    = {Xiaofeng Chen and
               XiaoFeng Wang and
               Xinyi Huang},
  title     = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2897845},
  doi       = {10.1145/2897845},
  isbn      = {978-1-4503-4233-9},
  timestamp = {Thu, 09 Aug 2018 10:56:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2016,
  editor    = {Kazue Sako},
  title     = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9610},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8},
  doi       = {10.1007/978-3-319-29485-8},
  isbn      = {978-3-319-29484-1},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2016,
  editor    = {Liqun Chen and
               Jinguang Han},
  title     = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
               China, November 10-11, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10005},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-47422-9},
  doi       = {10.1007/978-3-319-47422-9},
  isbn      = {978-3-319-47421-2},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2015,
  editor    = {Ernest Foo and
               Douglas Stebila},
  title     = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
               2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9144},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-19962-7},
  doi       = {10.1007/978-3-319-19962-7},
  isbn      = {978-3-319-19961-0},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier