BibTeX records: Xiaolei Dong

download as .bib file

@article{DBLP:journals/access/WangSCD24,
  author       = {Miao Wang and
                  Liwang Sun and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {{IPO-PEKS:} Effective Inner Product Outsourcing Public Key Searchable
                  Encryption From Lattice in the IoT},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {28926--28937},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3368908},
  doi          = {10.1109/ACCESS.2024.3368908},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangSCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YangDCSLYD24,
  author       = {Yunbo Yang and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Ruofan Li and
                  Yihao Yang and
                  Shangmin Dou},
  title        = {{EMPSI:} Efficient multiparty private set intersection (with cardinality)},
  journal      = {Frontiers Comput. Sci.},
  volume       = {18},
  number       = {1},
  pages        = {181804},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11704-022-2269-0},
  doi          = {10.1007/S11704-022-2269-0},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/YangDCSLYD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ZhouCD23,
  author       = {Yuanjian Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Dynamic identity-based broadcast proxy re-encryption for data sharing
                  in autonomous vehicles},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {34},
  number       = {11},
  year         = {2023},
  url          = {https://doi.org/10.1002/ett.4801},
  doi          = {10.1002/ETT.4801},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/ZhouCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YangDCSD23,
  author       = {Yunbo Yang and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Shangmin Dou},
  title        = {{IXT:} Improved searchable encryption for multi-word queries based
                  on {PSI}},
  journal      = {Frontiers Comput. Sci.},
  volume       = {17},
  number       = {5},
  pages        = {175811},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11704-022-2236-9},
  doi          = {10.1007/S11704-022-2236-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/YangDCSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhouCDZ23,
  author       = {Yuanjian Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Zhou},
  title        = {{BLDSS:} {A} Blockchain-Based Lightweight Searchable Data Sharing
                  Scheme in Vehicular Social Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {9, May 1},
  pages        = {7974--7992},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3230833},
  doi          = {10.1109/JIOT.2022.3230833},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhouCDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SunCDS23,
  author       = {Liwang Sun and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  title        = {{LMCLAEKS:} LWE-assisted multi-recipient certificateless authenticated
                  encryption with keyword search},
  journal      = {Inf. Sci.},
  volume       = {648},
  pages        = {119554},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119554},
  doi          = {10.1016/J.INS.2023.119554},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SunCDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/SunCDSWC23,
  author       = {Liwang Sun and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen and
                  Miao Wang and
                  Jiasheng Chen},
  title        = {dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless
                  authenticated encryption with keyword search for concealing search
                  patterns},
  journal      = {J. Syst. Archit.},
  volume       = {144},
  pages        = {103007},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103007},
  doi          = {10.1016/J.SYSARC.2023.103007},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/SunCDSWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/WangCD23,
  author       = {Miao Wang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Criteria for entanglement and separability of discrete quantum states},
  journal      = {Quantum Inf. Comput.},
  volume       = {23},
  number       = {7{\&}8},
  pages        = {541--561},
  year         = {2023},
  url          = {https://doi.org/10.26421/QIC23.7-8-1},
  doi          = {10.26421/QIC23.7-8-1},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/WangCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouWWGCDC23,
  author       = {Jun Zhou and
                  Nan Wu and
                  Yisong Wang and
                  Shouzhen Gu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Differentially Private Federated Learning Model Against Poisoning
                  Attacks in Edge Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1941--1958},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3168556},
  doi          = {10.1109/TDSC.2022.3168556},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouWWGCDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouGCCD23,
  author       = {Jun Zhou and
                  Guobin Gao and
                  Zhenfu Cao and
                  Kim{-}Kwang Raymond Choo and
                  Xiaolei Dong},
  title        = {Lightweight Privacy-Preserving Distributed Recommender System Using
                  Tag-Based Multikey Fully Homomorphic Data Encapsulation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {5230--5246},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3243598},
  doi          = {10.1109/TDSC.2023.3243598},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouGCCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinZCDC23,
  author       = {Zhongyun Lin and
                  Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {Generalized Autonomous Path Proxy Re-Encryption Scheme to Support
                  Branch Functionality},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5387--5400},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3306942},
  doi          = {10.1109/TIFS.2023.3306942},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LinZCDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhouCCCD23,
  author       = {Jun Zhou and
                  Shiying Chen and
                  Kim{-}Kwang Raymond Choo and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {{EPNS:} Efficient Privacy-Preserving Intelligent Traffic Navigation
                  From Multiparty Delegated Computation in Cloud-Assisted VANETs},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {3},
  pages        = {1491--1506},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2021.3110718},
  doi          = {10.1109/TMC.2021.3110718},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhouCCCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XiaCSDZFLGS23,
  author       = {Zhen Xia and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong and
                  Jun Zhou and
                  Liming Fang and
                  Zhe Liu and
                  Chunpeng Ge and
                  Chunhua Su},
  editor       = {Weizhi Meng and
                  Zheng Yan and
                  Vincenzo Piuri},
  title        = {Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance
                  Stability with Deep Learning},
  booktitle    = {Information Security Practice and Experience - 18th International
                  Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14341},
  pages        = {579--594},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7032-2\_34},
  doi          = {10.1007/978-981-99-7032-2\_34},
  timestamp    = {Wed, 15 Nov 2023 10:18:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/XiaCSDZFLGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/WuCSDYZFLGS23,
  author       = {Panyu Wu and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong and
                  Yihao Yang and
                  Jun Zhou and
                  Liming Fang and
                  Zhe Liu and
                  Chunpeng Ge and
                  Chunhua Su},
  title        = {{MMDSSE:} Multi-client and Multi-keyword Dynamic Searchable Symmetric
                  Encryption for Cloud Storage},
  booktitle    = {20th Annual International Conference on Privacy, Security and Trust,
                  {PST} 2023, Copenhagen, Denmark, August 21-23, 2023},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PST58708.2023.10320157},
  doi          = {10.1109/PST58708.2023.10320157},
  timestamp    = {Thu, 07 Dec 2023 14:16:22 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/WuCSDYZFLGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/YangDSCYZFLGSH23,
  author       = {Yihao Yang and
                  Xiaolei Dong and
                  Jiachen Shen and
                  Zhenfu Cao and
                  Yunbo Yang and
                  Jun Zhou and
                  Liming Fang and
                  Zhe Liu and
                  Chunpeng Ge and
                  Chunhua Su and
                  Zongyang Hou},
  title        = {{MDPPC:} Efficient Scalable Multiparty Delegated {PSI} and {PSI} Cardinality},
  booktitle    = {20th Annual International Conference on Privacy, Security and Trust,
                  {PST} 2023, Copenhagen, Denmark, August 21-23, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PST58708.2023.10320155},
  doi          = {10.1109/PST58708.2023.10320155},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/YangDSCYZFLGSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiCSD23,
  author       = {Jinyang Li and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {{MCVDSSE:} Secure Multi-client Verifiable Dynamic Symmetric Searchable
                  Encryption},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_5},
  doi          = {10.1007/978-3-031-45933-7\_5},
  timestamp    = {Wed, 06 Dec 2023 13:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiCSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LuoCSD23,
  author       = {Kaifeng Luo and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {{SVFL:} Secure Vertical Federated Learning on Linear Models},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {332--344},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_20},
  doi          = {10.1007/978-3-031-45933-7\_20},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LuoCSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/YuWYCD23,
  author       = {Liqing Yu and
                  Yusai Wu and
                  Yu Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Security Proofs for Key-Alternating Ciphers with Non-Independent Round
                  Permutations},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {238--267},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_9},
  doi          = {10.1007/978-3-031-48615-9\_9},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/YuWYCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuWYCD23,
  author       = {Liqing Yu and
                  Yusai Wu and
                  Yu Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Security Proofs for Key-Alternating Ciphers with Non-Independent Round
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1355},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1355},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YuWYCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuCD22,
  author       = {Huidan Hu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data
                  Sharing in Clouds},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {87322--87332},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3200084},
  doi          = {10.1109/ACCESS.2022.3200084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiuCDZBS22,
  author       = {Zhusen Liu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaopeng Zhao and
                  Haiyong Bao and
                  Jiachen Shen},
  title        = {A verifiable privacy-preserving data collection scheme supporting
                  multi-party computation in fog-based smart grid},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {3},
  pages        = {161810},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-021-0410-0},
  doi          = {10.1007/S11704-021-0410-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiuCDZBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuCDZLBS22,
  author       = {Zhusen Liu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaopeng Zhao and
                  Tian Liu and
                  Haiyong Bao and
                  Jiachen Shen},
  title        = {{EPMDA-FED:} Efficient and Privacy-Preserving Multidimensional Data
                  Aggregation Scheme With Fast Error Detection in Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {9},
  pages        = {6922--6933},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3113519},
  doi          = {10.1109/JIOT.2021.3113519},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuCDZLBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/GuoCD22,
  author       = {Ying Guo and
                  Zhen{-}Fu Cao and
                  Xiaolei Dong},
  title        = {Generalized Goldwasser and Micali's Type Cryptosystem},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {37},
  number       = {2},
  pages        = {459--467},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11390-021-0806-1},
  doi          = {10.1007/S11390-021-0806-1},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/GuoCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhouCDC22,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform
                  in the Encrypted Domain},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {1},
  pages        = {366--382},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2019.2948012},
  doi          = {10.1109/TCC.2019.2948012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhouCDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ChenZZCDC22,
  author       = {Ying Chen and
                  Tianhui Zhou and
                  Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {{SAVE:} Efficient Privacy-Preserving Location-Based Service Bundle
                  Authentication in Self-Organizing Vehicular Social Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {8},
  pages        = {11752--11766},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3106783},
  doi          = {10.1109/TITS.2021.3106783},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/ChenZZCDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/SunLCCDTZM22,
  author       = {Caiqi Sun and
                  Penghao Lu and
                  Lei Cheng and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Yili Tang and
                  Jun Zhou and
                  Linjian Mo},
  editor       = {Arindam Banerjee and
                  Zhi{-}Hua Zhou and
                  Evangelos E. Papalexakis and
                  Matteo Riondato},
  title        = {Multi-interest Sequence Modeling for Recommendation with Causal Embedding},
  booktitle    = {Proceedings of the 2022 {SIAM} International Conference on Data Mining,
                  {SDM} 2022, Alexandria, VA, USA, April 28-30, 2022},
  pages        = {406--414},
  publisher    = {{SIAM}},
  year         = {2022},
  url          = {https://doi.org/10.1137/1.9781611977172.46},
  doi          = {10.1137/1.9781611977172.46},
  timestamp    = {Sat, 30 Sep 2023 09:55:58 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/SunLCCDTZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangCD21,
  author       = {Gaoli Wang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Improved File-injection Attacks on Searchable Encryption Using Finite
                  Set Theory},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {8},
  pages        = {1264--1276},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa161},
  doi          = {10.1093/COMJNL/BXAA161},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoCDS21,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao},
  title        = {Extended Galbraith's test on the anonymity of {IBE} schemes from higher
                  residuosity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {241--253},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00816-w},
  doi          = {10.1007/S10623-020-00816-W},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoCDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/GuoMCDC21,
  author       = {Ying Guo and
                  Fei Meng and
                  Leixiao Cheng and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Designated server-aided revocable identity-based keyword search on
                  lattice},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2021},
  number       = {1},
  pages        = {174},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13638-021-02006-1},
  doi          = {10.1186/S13638-021-02006-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/GuoMCDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CaoCDW21,
  author       = {Nanyuan Cao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Haijiang Wang},
  title        = {Improved {RSA} lossy trapdoor function and applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {229--241},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114703},
  doi          = {10.1504/IJICS.2021.114703},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CaoCDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenZCCDC21,
  author       = {Linghui Chen and
                  Jun Zhou and
                  Ying Chen and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {{PADP:} Efficient Privacy-Preserving Data Aggregation and Dynamic
                  Pricing for Vehicle-to-Grid Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {7863--7873},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3041117},
  doi          = {10.1109/JIOT.2020.3041117},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenZCCDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LouDCS21,
  author       = {Menghui Lou and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  title        = {{SESCF:} {A} Secure and Efficient Supply Chain Framework via Blockchain-Based
                  Smart Contracts},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {8884478:1--8884478:18},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8884478},
  doi          = {10.1155/2021/8884478},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LouDCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouCCD21,
  author       = {Jun Zhou and
                  Kim{-}Kwang Raymond Choo and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {{PVOPM:} Verifiable Privacy-Preserving Pattern Matching with Efficient
                  Outsourcing in the Malicious Setting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2253--2270},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2947436},
  doi          = {10.1109/TDSC.2019.2947436},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouCCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/NingCDLWC21,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kaitai Liang and
                  Lifei Wei and
                  Kim{-}Kwang Raymond Choo},
  title        = {CryptCloud{\textdollar}{\^{}}+{\textdollar}+: Secure and Expressive
                  Data Access Control for Cloud Storage},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {111--124},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSC.2018.2791538},
  doi          = {10.1109/TSC.2018.2791538},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/NingCDLWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/QianCDSLY21,
  author       = {Jiawei Qian and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen and
                  Zhusen Liu and
                  Yunxiu Ye},
  title        = {Two Secure and Efficient Lightweight Data Aggregation Schemes for
                  Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {12},
  number       = {3},
  pages        = {2625--2637},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSG.2020.3044916},
  doi          = {10.1109/TSG.2020.3044916},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/QianCDSLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/TangCDS21,
  author       = {Xiao Tang and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {PKMark: {A} Robust Zero-distortion Blind Reversible Scheme for Watermarking
                  Relational Databases},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {72--79},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00020},
  doi          = {10.1109/BIGDATASE53435.2021.00020},
  timestamp    = {Tue, 15 Mar 2022 13:00:54 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/TangCDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/TangSCD21,
  author       = {Qi Tang and
                  Jiachen Shen and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Shaohua Wan and
                  Xiaochun Cheng and
                  Celimuge Wu},
  title        = {{PSSBP:} {A} Privacy-preserving Scope-query Searchable Encryption
                  Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks},
  booktitle    = {19th {IEEE} International Conference on Embedded and Ubiquitous Computing,
                  {EUC} 2021, Shenyang, China, October 20-22, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EUC53437.2021.00018},
  doi          = {10.1109/EUC53437.2021.00018},
  timestamp    = {Tue, 20 Feb 2024 19:40:20 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/TangSCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/FengCSD21,
  author       = {Weijia Feng and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong},
  title        = {RTPoW: {A} Proof-of-Work Consensus Scheme with Real-Time Difficulty
                  Adjustment Algorithm},
  booktitle    = {27th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2021, Beijing, China, December 14-16, 2021},
  pages        = {233--240},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICPADS53394.2021.00035},
  doi          = {10.1109/ICPADS53394.2021.00035},
  timestamp    = {Mon, 09 May 2022 09:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/FengCSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/LiCSD21,
  author       = {Xiangyu Li and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong},
  title        = {{DPFDT:} Decentralized Privacy-preserving Fair Data Trading System},
  booktitle    = {17th International Conference on Mobility, Sensing and Networking,
                  {MSN} 2021, Exeter, United Kingdom, December 13-15, 2021},
  pages        = {183--190},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSN53354.2021.00040},
  doi          = {10.1109/MSN53354.2021.00040},
  timestamp    = {Thu, 21 Apr 2022 15:52:12 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/LiCSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouZCD20,
  author       = {Jun Zhou and
                  Meng Zheng and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {{PVIDM:} Privacy-preserving verifiable shape context based image denoising
                  and matching with efficient outsourcing in the malicious setting},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101631},
  doi          = {10.1016/J.COSE.2019.101631},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouZCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenZCVDC20,
  author       = {Jialu Chen and
                  Jun Zhou and
                  Zhenfu Cao and
                  Athanasios V. Vasilakos and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {Lightweight Privacy-Preserving Training and Evaluation for Discretized
                  Neural Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {2663--2678},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2942165},
  doi          = {10.1109/JIOT.2019.2942165},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenZCVDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenZCDC20,
  author       = {Huajie Shen and
                  Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kim{-}Kwang Raymond Choo},
  title        = {Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving
                  Location-Based Service in Vehicular Social Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {7},
  pages        = {6610--6622},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2974874},
  doi          = {10.1109/JIOT.2020.2974874},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenZCDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouCQD020,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Zhan Qin and
                  Xiaolei Dong and
                  Kui Ren},
  title        = {{LPPA:} Lightweight Privacy-Preserving Authentication From Efficient
                  Multi-Key Secure Outsourced Computation for Location-Based Services
                  in VANETs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {420--434},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2923156},
  doi          = {10.1109/TIFS.2019.2923156},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouCQD020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangDC20,
  author       = {Haijiang Wang and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption
                  with Fast Keyword Search},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {13},
  number       = {6},
  pages        = {1142--1151},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSC.2017.2753231},
  doi          = {10.1109/TSC.2017.2753231},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/WangDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhaoCDSWL20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao and
                  Licheng Wang and
                  Zhusen Liu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue
                  Symbol},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {408--424},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_21},
  doi          = {10.1007/978-3-030-55304-3\_21},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhaoCDSWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuYCD20,
  author       = {Yusai Wu and
                  Liqing Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single
                  Permutation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {662--693},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_22},
  doi          = {10.1007/978-3-030-64837-4\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WuYCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbct/YanSCD20,
  author       = {Wenqi Yan and
                  Jiachen Shen and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Blockchain Based Digital Evidence Chain of Custody},
  booktitle    = {ICBCT'20: The 2nd International Conference on Blockchain Technology,
                  Hilo, HI, USA, March 12-14, 2020},
  pages        = {19--23},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3390566.3391690},
  doi          = {10.1145/3390566.3391690},
  timestamp    = {Mon, 10 Aug 2020 13:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icbct/YanSCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbct/ChenSCD20,
  author       = {Xin Chen and
                  Jiachen Shen and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {A Blockchain-Based Privacy-Preserving Scheme for Smart Grids},
  booktitle    = {ICBCT'20: The 2nd International Conference on Blockchain Technology,
                  Hilo, HI, USA, March 12-14, 2020},
  pages        = {120--124},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3390566.3391667},
  doi          = {10.1145/3390566.3391667},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbct/ChenSCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ChenCSDW20,
  author       = {Jing Chen and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong and
                  Xingkai Wang},
  title        = {Forward Secure Dynamic Searchable Symmetric Encryption with Lighter
                  Storage},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {24--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377666},
  doi          = {10.1145/3377644.3377666},
  timestamp    = {Thu, 30 Apr 2020 16:20:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/ChenCSDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhaoCDZ20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jinwen Zheng},
  editor       = {Willy Susilo and
                  Robert H. Deng and
                  Fuchun Guo and
                  Yannan Li and
                  Rolly Intan},
  title        = {Anonymous {IBE} from Quadratic Residuosity with Fast Encryption},
  booktitle    = {Information Security - 23rd International Conference, {ISC} 2020,
                  Bali, Indonesia, December 16-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12472},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62974-8\_1},
  doi          = {10.1007/978-3-030-62974-8\_1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhaoCDZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanDCS20,
  author       = {Chan Fan and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {{VCKSCF:} Efficient Verifiable Conjunctive Keyword Search Based on
                  Cuckoo Filter for Cloud Storage},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {285--292},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00048},
  doi          = {10.1109/TRUSTCOM50675.2020.00048},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanDCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoCDSWL20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao and
                  Licheng Wang and
                  Zhusen Liu},
  title        = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue
                  Symbol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/245},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoCDSWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoCDZ20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jinwen Zheng},
  title        = {Anonymous {IBE} From Quadratic Residue With Fast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/712},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoCDZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoCD20,
  author       = {Ying Guo and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {A Generalization of Paillier's Public-Key System With Fast Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/796},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuYCD20,
  author       = {Yusai Wu and
                  Liqing Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Tight Security Analysis of 3-Round Key-Alternating Cipher with {A}
                  Single Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1073},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1073},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuYCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanDCS20,
  author       = {Chan Fan and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  title        = {{VCKSCF:} Efficient Verifiable Conjunctive Keyword Search Based on
                  Cuckoo Filter for Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1372},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1372},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FanDCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangDCLC19,
  author       = {Haijiang Wang and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Dongmei Li and
                  Nanyuan Cao},
  title        = {Secure key-aggregation authorized searchable encryption},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {3},
  pages        = {39111:1--39111:3},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-017-9508-3},
  doi          = {10.1007/S11432-017-9508-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangDCLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangCD19,
  author       = {Gaoli Wang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Improved Fault-Tolerant Aggregate Signatures},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {4},
  pages        = {481--489},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxy108},
  doi          = {10.1093/COMJNL/BXY108},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/CaoCLDZ19,
  author       = {Nanyuan Cao and
                  Zhenfu Cao and
                  Zhen Liu and
                  Xiaolei Dong and
                  Xiaopeng Zhao},
  title        = {All-But-Many Lossy Trapdoor Functions under Decisional {RSA} Subgroup
                  Assumption and Application},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {8},
  pages        = {1148--1157},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz008},
  doi          = {10.1093/COMJNL/BXZ008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/CaoCLDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhouCDV19,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Thanos Vasilakos},
  title        = {{GTSIM-POP:} Game theory based secure incentive mechanism and patient-optimized
                  privacy-preserving packet forwarding scheme in m-healthcare social
                  networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {70--82},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.05.079},
  doi          = {10.1016/J.FUTURE.2019.05.079},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhouCDV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiDCW19,
  author       = {Dongmei Li and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Haijiang Wang},
  title        = {Privacy-preserving outsourced image feature extraction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {59--64},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.020},
  doi          = {10.1016/J.JISA.2019.03.020},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiDCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WangDC19,
  author       = {Haijiang Wang and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Secure and efficient encrypted keyword search for multi-user setting
                  in cloud computing},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {12},
  number       = {1},
  pages        = {32--42},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12083-017-0622-0},
  doi          = {10.1007/S12083-017-0622-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/WangDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhouZCD19,
  author       = {Jun Zhou and
                  Yifang Zhang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {{PPSAS:} Lightweight Privacy-preserving Spectrum Aggregation and Auction
                  in Cognitive Radio Networks},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1127--1137},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00115},
  doi          = {10.1109/ICDCS.2019.00115},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhouZCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icit/WangDSC19,
  author       = {Kangle Wang and
                  Xiaolei Dong and
                  Jiachen Shen and
                  Zhenfu Cao},
  title        = {An Effective Verifiable Symmetric Searchable Encryption Scheme in
                  Cloud Computing},
  booktitle    = {{ICIT} 2019 - The 7th International Conference on Information Technology:
                  IoT and Smart City, Shanghai, China, December 20-23, 2019},
  pages        = {98--102},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3377170.3377251},
  doi          = {10.1145/3377170.3377251},
  timestamp    = {Fri, 27 Mar 2020 16:12:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icit/WangDSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/YeDSCZ19,
  author       = {Fanghan Ye and
                  Xiaolei Dong and
                  Jiachen Shen and
                  Zhenfu Cao and
                  Wenhua Zhao},
  title        = {A Verifiable Dynamic Multi-user Searchable Encryption Scheme without
                  Trusted Third Parties},
  booktitle    = {25th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2019, Tianjin, China, December 4-6, 2019},
  pages        = {896--900},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICPADS47876.2019.00131},
  doi          = {10.1109/ICPADS47876.2019.00131},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/YeDSCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/ChenCDS19,
  author       = {Hongyuan Chen and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  editor       = {Weizhi Meng and
                  Piotr Cofta and
                  Christian Damsgaard Jensen and
                  Tyrone Grandison},
  title        = {{SDKSE-KGA:} {A} Secure Dynamic Keyword Searchable Encryption Scheme
                  Against Keyword Guessing Attacks},
  booktitle    = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {563},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33716-2\_13},
  doi          = {10.1007/978-3-030-33716-2\_13},
  timestamp    = {Tue, 15 Jun 2021 13:49:14 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/ChenCDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/LiuCDS19,
  author       = {Jiming Liu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  editor       = {Weizhi Meng and
                  Steven Furnell},
  title        = {{DMU-ABSE:} Dynamic Multi-user Attribute-Based Searchable Encryption
                  with File Deletion and User Revocation},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 5th International
                  Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1095},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0758-8\_2},
  doi          = {10.1007/978-981-15-0758-8\_2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/LiuCDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZCCD19,
  author       = {Xiaopeng Zhao and
                  Jinwen Zheng and
                  Nanyuan Cao and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Identity-Based Encryption from e-th Power Residue Symbols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZCCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiDCW18,
  author       = {Dongmei Li and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Haijiang Wang},
  title        = {Privacy-preserving large-scale systems of linear equations in outsourcing
                  storage and computation},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {032112:1--032112:9},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9208-3},
  doi          = {10.1007/S11432-017-9208-3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiDCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChenZCD18,
  author       = {Siyuan Chen and
                  Peng Zeng and
                  Kim{-}Kwang Raymond Choo and
                  Xiaolei Dong},
  title        = {Efficient Ring Signature and Group Signature Schemes Based on q-ary
                  Identification Protocols},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {4},
  pages        = {545--560},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxx112},
  doi          = {10.1093/COMJNL/BXX112},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ChenZCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangDCL18,
  author       = {Haijiang Wang and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Dongmei Li},
  title        = {Secure and Efficient Attribute-Based Encryption with Keyword Search},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {8},
  pages        = {1133--1142},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy031},
  doi          = {10.1093/COMJNL/BXY031},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangDCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/ZhangCDS18,
  author       = {Huajun Zhang and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  title        = {Proof of Multicopy via Proof of File Position in Cloud},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {141--151},
  year         = {2018},
  url          = {https://doi.org/10.3233/FI-2018-1622},
  doi          = {10.3233/FI-2018-1622},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/ZhangCDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NingCDW18,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Lifei Wei},
  title        = {White-Box Traceable {CP-ABE} for Cloud Storage Service: How to Catch
                  People Leaking Their Access Credentials Effectively},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {883--897},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2608343},
  doi          = {10.1109/TDSC.2016.2608343},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NingCDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingCDLMW18,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Kaitai Liang and
                  Hui Ma and
                  Lifei Wei},
  title        = {Auditable {\(\sigma\)}-Time Outsourced Attribute-Based Encryption
                  for Access Control in Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {1},
  pages        = {94--105},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2738601},
  doi          = {10.1109/TIFS.2017.2738601},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NingCDLMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhengZCD18,
  author       = {Meng Zheng and
                  Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {{PPOIM:} Privacy-Preserving Shape Context Based Image Denoising and
                  Matching with Efficient Outsourcing},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {215--231},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_13},
  doi          = {10.1007/978-3-030-01950-1\_13},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZhengZCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiangCDS18,
  author       = {Yunong Liang and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Efficient Multi-keyword Searchable Encryption Based on Multi-input
                  Inner-Product Functional Encryption},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_22},
  doi          = {10.1007/978-3-030-01950-1\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiangCDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssic/ChenCDS18,
  author       = {Hongyuan Chen and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  title        = {{SDKSE:} {A} Secure Dynamic Keyword Searchable Encryption Scheme for
                  Email Systems},
  booktitle    = {Third International Conference on Security of Smart Cities, Industrial
                  Control System and Communications, {SSIC} 2018, Shanghai, China, October
                  18-19, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SSIC.2018.8556786},
  doi          = {10.1109/SSIC.2018.8556786},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ssic/ChenCDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssic/HuiDSCCL18,
  author       = {Liang Hui and
                  Xiaolei Dong and
                  Jiachen Shen and
                  Zhenfu Cao and
                  Hongyuan Chen and
                  Yunong Liang},
  title        = {{VEPP:} {A} Verifiable, Highly Efficient and Privacy-Preserving Protocol
                  for Outsourcing Large Matrix Multiplication},
  booktitle    = {Third International Conference on Security of Smart Cities, Industrial
                  Control System and Communications, {SSIC} 2018, Shanghai, China, October
                  18-19, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SSIC.2018.8556689},
  doi          = {10.1109/SSIC.2018.8556689},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssic/HuiDSCCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ZhouCDV17,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Athanasios V. Vasilakos},
  title        = {Security and Privacy for Cloud-Based IoT: Challenges},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {1},
  pages        = {26--33},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600363CM},
  doi          = {10.1109/MCOM.2017.1600363CM},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ZhouCDV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangD0CL17,
  author       = {Xiaomei Zhang and
                  Xiaolei Dong and
                  Jie Wu and
                  Zhenfu Cao and
                  Chen Lyu},
  title        = {Fault Activity Aware Service Delivery in Wireless Sensor Networks
                  for Smart Cities},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2017},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/9394613},
  doi          = {10.1155/2017/9394613},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhangD0CL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/ZhangCLFDC17,
  author       = {Xiaomei Zhang and
                  Chi{-}Hung Chi and
                  Chen Lyu and
                  Zhijun Fang and
                  Xiaolei Dong and
                  Qiang Chen},
  editor       = {Xiaoqing (Frank) Liu and
                  Umesh Bellur},
  title        = {Availability Based Multiservice Delivery for Wireless Sensor Networks
                  in Adversarial Environments},
  booktitle    = {2017 {IEEE} International Conference on Services Computing, {SCC}
                  2017, Honolulu, HI, USA, June 25-30, 2017},
  pages        = {180--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SCC.2017.30},
  doi          = {10.1109/SCC.2017.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/ZhangCLFDC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoDCS17,
  author       = {Wanfen Guo and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  title        = {Efficient Attribute-Based Secure Keyword Search on the Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {782},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/782},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoDCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/NingCDW16,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Lifei Wei},
  title        = {Traceable and revocable {CP-ABE} with shorter ciphertexts},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {11},
  pages        = {119102:1--119102:3},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-0062-7},
  doi          = {10.1007/S11432-016-0062-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/NingCDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GongDCC16,
  author       = {Junqing Gong and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jie Chen},
  title        = {Almost-Tight Identity Based Encryption Against Selective Opening Attack},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {11},
  pages        = {1669--1688},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw030},
  doi          = {10.1093/COMJNL/BXW030},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GongDCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/DongZC16,
  author       = {Xiaolei Dong and
                  Jun Zhou and
                  Zhenfu Cao},
  title        = {Efficient privacy-preserving temporal and spacial data aggregation
                  for smart grid communications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {4},
  pages        = {1145--1160},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3570},
  doi          = {10.1002/CPE.3570},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/DongZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ZhouCD16,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Secure and efficient fine-grained multiple file sharing in cloud-assisted
                  crowd sensing networks},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {9},
  number       = {4},
  pages        = {774--794},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12083-016-0449-0},
  doi          = {10.1007/S12083-016-0449-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ZhouCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiaZDDC16,
  author       = {Weiwei Jia and
                  Haojin Zhu and
                  Suguo Du and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Cloud-based privacy-preserving aggregation architecture in multi-domain
                  wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {13},
  pages        = {1905--1915},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.950},
  doi          = {10.1002/SEC.950},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiaZDDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiDC16,
  author       = {Dongmei Li and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Secure and privacy-preserving pattern matching in outsourced computing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3444--3451},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1552},
  doi          = {10.1002/SEC.1552},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GongD0C16,
  author       = {Junqing Gong and
                  Xiaolei Dong and
                  Jie Chen and
                  Zhenfu Cao},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Efficient {IBE} with Tight Reduction to Standard Assumption in the
                  Multi-challenge Setting},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {624--654},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_21},
  doi          = {10.1007/978-3-662-53890-6\_21},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GongD0C16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhouCD16,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {{PPOPM:} More Efficient Privacy Preserving Outsourced Pattern Matching},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {135--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_7},
  doi          = {10.1007/978-3-319-45744-4\_7},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhouCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NingCDG016,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Junqing Gong and
                  Jie Chen},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Traceable {CP-ABE} with Short Ciphertexts: How to Catch People Selling
                  Decryption Devices on eBay Efficiently},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {551--569},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_28},
  doi          = {10.1007/978-3-319-45741-3\_28},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NingCDG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Gong0DCT16,
  author       = {Junqing Gong and
                  Jie Chen and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Shaohua Tang},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Extended Nested Dual System Groups, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {133--163},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_6},
  doi          = {10.1007/978-3-662-49384-7\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Gong0DCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongD0C16,
  author       = {Junqing Gong and
                  Xiaolei Dong and
                  Jie Chen and
                  Zhenfu Cao},
  title        = {Efficient {IBE} with Tight Reduction to Standard Assumption in the
                  Multi-challenge Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/860},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongD0C16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhouCDXV15,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Naixue Xiong and
                  Athanasios V. Vasilakos},
  title        = {4S: {A} secure and privacy-preserving key management scheme for cloud-assisted
                  wireless body area network in m-healthcare social networks},
  journal      = {Inf. Sci.},
  volume       = {314},
  pages        = {255--276},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2014.09.003},
  doi          = {10.1016/J.INS.2014.09.003},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhouCDXV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/ZhouCDL15,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaodong Lin},
  title        = {{PPDM:} {A} Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare
                  Systems},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {9},
  number       = {7},
  pages        = {1332--1344},
  year         = {2015},
  url          = {https://doi.org/10.1109/JSTSP.2015.2427113},
  doi          = {10.1109/JSTSP.2015.2427113},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jstsp/ZhouCDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ZhangDX0L15,
  author       = {Xiaomei Zhang and
                  Xiaolei Dong and
                  Naixue Xiong and
                  Jie Wu and
                  Xiuqi Li},
  title        = {Fault-aware flow control and multi-path routing in VANETs},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {6},
  pages        = {1090--1107},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-014-0302-2},
  doi          = {10.1007/S12083-014-0302-2},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ZhangDX0L15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NingDCWL15,
  author       = {Jianting Ning and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Lifei Wei and
                  Xiaodong Lin},
  title        = {White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting
                  Flexible Attributes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1274--1288},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2405905},
  doi          = {10.1109/TIFS.2015.2405905},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NingDCWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouDCV15,
  author       = {Jun Zhou and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Athanasios V. Vasilakos},
  title        = {Secure and privacy preserving protocol for cloud-based vehicular DTNs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1299--1314},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2407326},
  doi          = {10.1109/TIFS.2015.2407326},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouDCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ZhouLDC15,
  author       = {Jun Zhou and
                  Xiaodong Lin and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {{PSMPA:} Patient Self-Controllable and Multi-Level Privacy-Preserving
                  Cooperative Authentication in Distributedm-Healthcare Cloud Computing
                  System},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {26},
  number       = {6},
  pages        = {1693--1703},
  year         = {2015},
  url          = {https://doi.org/10.1109/TPDS.2014.2314119},
  doi          = {10.1109/TPDS.2014.2314119},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ZhouLDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/ZhouCDL15,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaodong Lin},
  title        = {Security and privacy in cloud-assisted wireless wearable communications:
                  Challenges, solutions, and future directions},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {22},
  number       = {2},
  pages        = {136--144},
  year         = {2015},
  url          = {https://doi.org/10.1109/MWC.2015.7096296},
  doi          = {10.1109/MWC.2015.7096296},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/ZhouCDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NingDCW15,
  author       = {Jianting Ning and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Lifei Wei},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Accountable Authority Ciphertext-Policy Attribute-Based Encryption
                  with White-Box Traceability and Public Auditing in the Cloud},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {270--289},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_14},
  doi          = {10.1007/978-3-319-24177-7\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NingDCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhouCDL15,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaodong Lin},
  title        = {{EVOC:} More efficient verifiable outsourced computation from any
                  one-way trapdoor function},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7444--7449},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249516},
  doi          = {10.1109/ICC.2015.7249516},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhouCDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhouCDL15,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaodong Lin},
  title        = {{TR-MABE:} White-box traceable and revocable multi-authority attribute-based
                  encryption and its applications to multi-level privacy-preserving
                  e-healthcare cloud computing systems},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {2398--2406},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218628},
  doi          = {10.1109/INFOCOM.2015.7218628},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhouCDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingDCW15,
  author       = {Jianting Ning and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Lifei Wei},
  title        = {Accountable Authority Ciphertext-Policy Attribute-Based Encryption
                  with White-Box Traceability and Public Auditing in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingDCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongCDCT15,
  author       = {Junqing Gong and
                  Jie Chen and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Shaohua Tang},
  title        = {Extended Nested Dual System Groups, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/820},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongCDCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongDCC15,
  author       = {Junqing Gong and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jie Chen},
  title        = {Almost-tight Identity Based Encryption against Selective Opening Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/904},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongDCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WeiZCDJCV14,
  author       = {Lifei Wei and
                  Haojin Zhu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Weiwei Jia and
                  Yunlu Chen and
                  Athanasios V. Vasilakos},
  title        = {Security and privacy for storage and computation in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {258},
  pages        = {371--386},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.04.028},
  doi          = {10.1016/J.INS.2013.04.028},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WeiZCDJCV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/JiaZCDX14,
  author       = {Weiwei Jia and
                  Haojin Zhu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Chengxin Xiao},
  title        = {Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid},
  journal      = {{IEEE} Syst. J.},
  volume       = {8},
  number       = {2},
  pages        = {598--607},
  year         = {2014},
  url          = {https://doi.org/10.1109/JSYST.2013.2260937},
  doi          = {10.1109/JSYST.2013.2260937},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/JiaZCDX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NingCDWL14,
  author       = {Jianting Ning and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Lifei Wei and
                  Xiaodong Lin},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box
                  Traceability},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_4},
  doi          = {10.1007/978-3-319-11212-1\_4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NingCDWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DongZALC14,
  author       = {Xiaolei Dong and
                  Jun Zhou and
                  Khalid Nawaf Alharbi and
                  Xiaodong Lin and
                  Zhenfu Cao},
  title        = {An ElGamal-based efficient and privacy-preserving data aggregation
                  scheme for smart grid},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
                  TX, USA, December 8-12, 2014},
  pages        = {4720--4725},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7037553},
  doi          = {10.1109/GLOCOM.2014.7037553},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/DongZALC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccoms/HeCDS14,
  author       = {Danyang He and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  title        = {User self-controllable profile matching for privacy-preserving mobile
                  social networks},
  booktitle    = {{IEEE} International Conference on Communication Systems, {ICCS} 2014,
                  Macau, China, November 19-21, 2014},
  pages        = {248--252},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCS.2014.7024803},
  doi          = {10.1109/ICCS.2014.7024803},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccoms/HeCDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangDCS14,
  author       = {Hong Zhang and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  editor       = {Lucas Chi Kwong Hui and
                  S. H. Qing and
                  Elaine Shi and
                  Siu{-}Ming Yiu},
  title        = {4P{\_}VES: {A} Collusion-Resistant Accountable Virtual Economy System},
  booktitle    = {Information and Communications Security - 16th International Conference,
                  {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8958},
  pages        = {61--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21966-0\_5},
  doi          = {10.1007/978-3-319-21966-0\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangDCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WeiCD13,
  author       = {Lifei Wei and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Secure identity-based multisignature schemes under quadratic residue
                  assumptions},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {689--701},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.600},
  doi          = {10.1002/SEC.600},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WeiCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/ZhouCDLV13,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Xiaodong Lin and
                  Athanasios V. Vasilakos},
  title        = {Securing m-healthcare social networks: challenges, countermeasures
                  and future directions},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {20},
  number       = {4},
  year         = {2013},
  url          = {https://doi.org/10.1109/MWC.2013.6590046},
  doi          = {10.1109/MWC.2013.6590046},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/ZhouCDLV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bodynets/ZhouCD13,
  author       = {Jun Zhou and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Junichi Suzuki and
                  Honggang Wang},
  title        = {{BDK:} Secure and Efficient Biometric based Deterministic Key Agreement
                  in Wireless Body Area Networks},
  booktitle    = {8th International Conference on Body Area Networks, {BODYNETS} 2013,
                  Boston, MA, USA, September 30 - October 2, 2013},
  pages        = {488--494},
  publisher    = {{ICST}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.bodynets.2013.253731},
  doi          = {10.4108/ICST.BODYNETS.2013.253731},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bodynets/ZhouCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhangD0LX13,
  author       = {Xiaomei Zhang and
                  Xiaolei Dong and
                  Jie Wu and
                  Xiuqi Li and
                  Naixue Xiong},
  title        = {Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor
                  Networks},
  booktitle    = {33rd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013},
  pages        = {27--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCSW.2013.19},
  doi          = {10.1109/ICDCSW.2013.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhangD0LX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoDWS13a,
  author       = {Zhenfu Cao and
                  Xiaolei Dong and
                  Licheng Wang and
                  Jun Shao},
  title        = {More Efficient Cryptosystems From k-th Power Residues},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoDWS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoWDC13,
  author       = {Jun Shao and
                  Licheng Wang and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {New Efficient Identity-Based Encryption From Factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoWDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/YangCD11,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Fuzzy identity based signature with applications to biometric authentication},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {4},
  pages        = {532--540},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.04.013},
  doi          = {10.1016/J.COMPELECENG.2011.04.013},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/YangCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/XingCD11,
  author       = {Dongsheng Xing and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Identity based signature scheme based on cubic residues},
  journal      = {Sci. China Inf. Sci.},
  volume       = {54},
  number       = {10},
  pages        = {2001--2012},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11432-011-4413-6},
  doi          = {10.1007/S11432-011-4413-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/XingCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/YangCDZ11,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Tanveer A. Zia},
  title        = {An Efficient Privacy Preserving Data Aggregation Scheme with Constant
                  Communication Overheads for Wireless Sensor Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {15},
  number       = {11},
  pages        = {1205--1207},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCOMM.2011.092911.111598},
  doi          = {10.1109/LCOMM.2011.092911.111598},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/YangCDZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/YangCD11,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Threshold proxy re-signature},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {24},
  number       = {4},
  pages        = {816--824},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11424-011-8370-3},
  doi          = {10.1007/S11424-011-8370-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/YangCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/DongWZCW11,
  author       = {Xiaolei Dong and
                  Lifei Wei and
                  Haojin Zhu and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented
                  Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {60},
  number       = {2},
  pages        = {580--591},
  year         = {2011},
  url          = {https://doi.org/10.1109/TVT.2010.2095432},
  doi          = {10.1109/TVT.2010.2095432},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/DongWZCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/YangCD10,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Efficient certificateless threshold signatures without random oracles},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {23},
  number       = {6},
  pages        = {1167--1182},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11424-010-7274-y},
  doi          = {10.1007/S11424-010-7274-Y},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/YangCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/DongQC09,
  author       = {Xiaolei Dong and
                  Haifeng Qian and
                  Zhenfu Cao},
  title        = {Provably secure RSA-type signature based on conic curve},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {217--225},
  year         = {2009},
  url          = {https://doi.org/10.1002/wcm.602},
  doi          = {10.1002/WCM.602},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/DongQC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YangCD09,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Certificateless Threshold Signature for Data Report Authentication
                  in Mobile Ad Hoc Network},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {143--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.11},
  doi          = {10.1109/NSS.2009.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/YangCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuDC08,
  author       = {Rongxing Lu and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Designing efficient proxy signature schemes for mobile communication},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {2},
  pages        = {183--195},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0017-1},
  doi          = {10.1007/S11432-008-0017-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DongCW08,
  author       = {Xiaolei Dong and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {New designing of cryptosystems based on quadratic fields},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {8},
  pages        = {1106--1116},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0091-4},
  doi          = {10.1007/S11432-008-0091-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/DongCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangCD08,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Chosen Ciphertext Secure Certificateless Threshold Encryption in the
                  Standard Model},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_17},
  doi          = {10.1007/978-3-642-01440-6\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YangCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/QinCD08,
  author       = {Liuquan Qin and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Multi-Receiver Identity-Based Encryption in Multiple {PKG} Environment},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {1862--1866},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.360},
  doi          = {10.1109/GLOCOM.2008.ECP.360},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/QinCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/YangCD08,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Ty Znati and
                  Youtao Zhang},
  title        = {Threshold Proxy Re-Signature},
  booktitle    = {2008 {IEEE} International Performance, Computing and Communications
                  Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008},
  pages        = {450--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PCCC.2008.4745095},
  doi          = {10.1109/PCCC.2008.4745095},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/YangCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangCD08,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Fuzzy Identity Based Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChaiCD07,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Identity-based signature scheme based on quadratic residues},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {373--380},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-0038-1},
  doi          = {10.1007/S11432-007-0038-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChaiCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LuCD07,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {A New Practical Limited Identity-Based Encryption Scheme},
  journal      = {Fundam. Informaticae},
  volume       = {80},
  number       = {4},
  pages        = {461--474},
  year         = {2007},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi80-4-07},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/LuCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/ChaiCD07,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Efficient ID-Based Multi-Receiver Threshold Decryption},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {18},
  number       = {5},
  pages        = {987--1004},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0129054107005091},
  doi          = {10.1142/S0129054107005091},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/ChaiCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoDW07,
  author       = {Zhenfu Cao and
                  Xiaolei Dong and
                  Licheng Wang},
  title        = {New Public Key Cryptosystems Using Polynomials over Non-commutative
                  Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LuCD06,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Authenticated encryption protocol with perfect forward secrecy for
                  mobile communication},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {6},
  pages        = {273--280},
  year         = {2006},
  url          = {https://doi.org/10.1002/wcm.394},
  doi          = {10.1002/WCM.394},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LuCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LuCD06,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Efficient ID-Based One-Time Proxy Signature and Its Application in
                  E-Cheque},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_10},
  doi          = {10.1007/11935070\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LuCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/LuCDS06,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Renwang Su},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {Designated Verifier Proxy Signature Scheme from Bilinear Pairings},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.211},
  doi          = {10.1109/IMSCCS.2006.211},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/LuCDS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/LuCDS06a,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Renwang Su},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {Group Oriented Deniable Authentication Protocol},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {89--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.230},
  doi          = {10.1109/IMSCCS.2006.230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/LuCDS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongWC06,
  author       = {Xiaolei Dong and
                  Licheng Wang and
                  Zhenfu Cao},
  title        = {New Public Key Authentication Frameworks with Lite Certification Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongWC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics