BibTeX records: Shundong Li

download as .bib file

@article{DBLP:journals/access/GongWZLW19,
  author    = {Linming Gong and
               Mingming Wang and
               Xiangjian Zuo and
               Shundong Li and
               Daoshun Wang},
  title     = {Using Transposition Padding to Get {CCA2} Security From Any Deterministic
               Encryption Schemes},
  journal   = {{IEEE} Access},
  volume    = {7},
  pages     = {6765--6773},
  year      = {2019},
  url       = {https://doi.org/10.1109/ACCESS.2019.2891075},
  doi       = {10.1109/ACCESS.2019.2891075},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/GongWZLW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GongLWW18,
  author    = {Linming Gong and
               Shundong Li and
               Chunying Wu and
               Daoshun Wang},
  title     = {Secure "Ratio" Computation and Efficient Protocol for General
               Secure Two-Party Comparison},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {25532--25542},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2827025},
  doi       = {10.1109/ACCESS.2018.2827025},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/access/GongLWW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FangLW18,
  author    = {Ledi Fang and
               Shundong Li and
               Wenli Wang},
  title     = {An Efficient Protocol for Privately Determining the Relationship Between
               Two Straight Lines},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {6},
  pages     = {1175--1182},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1175-1182.pdf},
  timestamp = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/FangLW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/DouL17,
  author    = {Jiawei Dou and
               Shundong Li},
  title     = {Optimal impulsive harvesting policies for single-species populations},
  journal   = {Applied Mathematics and Computation},
  volume    = {292},
  pages     = {145--155},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.amc.2016.07.027},
  doi       = {10.1016/j.amc.2016.07.027},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amc/DouL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLCXZZ17,
  author    = {Xin Liu and
               Shundong Li and
               Xiubo Chen and
               Gang Xu and
               Xiaolin Zhang and
               Yong Zhou},
  title     = {Efficient Solutions to Two-Party and Multiparty Millionaires' Problem},
  journal   = {Security and Communication Networks},
  volume    = {2017},
  pages     = {5207386:1--5207386:11},
  year      = {2017},
  url       = {https://doi.org/10.1155/2017/5207386},
  doi       = {10.1155/2017/5207386},
  timestamp = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/LiuLCXZZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhouLDGL17,
  author    = {Sufang Zhou and
               Shundong Li and
               Jiawei Dou and
               Yaling Geng and
               Xin Liu},
  title     = {Efficient Secure Multiparty Subset Computation},
  journal   = {Security and Communication Networks},
  volume    = {2017},
  pages     = {9717580:1--9717580:11},
  year      = {2017},
  url       = {https://doi.org/10.1155/2017/9717580},
  doi       = {10.1155/2017/9717580},
  timestamp = {Thu, 16 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ZhouLDGL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenLHWZ16,
  author    = {Zhenhua Chen and
               Shundong Li and
               Qiong Huang and
               Yilei Wang and
               Sufang Zhou},
  title     = {A restricted proxy re-encryption with keyword search for fine-grained
               data access control in cloud storage},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {28},
  number    = {10},
  pages     = {2858--2876},
  year      = {2016},
  url       = {https://doi.org/10.1002/cpe.3754},
  doi       = {10.1002/cpe.3754},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/ChenLHWZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GuoLDZ16,
  author    = {Yimin Guo and
               Shundong Li and
               Jiawei Dou and
               Sufang Zhou},
  title     = {Deterministic cloned tag detection protocol for anonymous radio-frequency
               identification systems},
  journal   = {{IET} Information Security},
  volume    = {10},
  number    = {1},
  pages     = {28--32},
  year      = {2016},
  url       = {https://doi.org/10.1049/iet-ifs.2014.0504},
  doi       = {10.1049/iet-ifs.2014.0504},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iet-ifs/GuoLDZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenLHYD16,
  author    = {Zhenhua Chen and
               Shundong Li and
               Qiong Huang and
               Jianhua Yan and
               Yong Ding},
  title     = {A Joint Random Secret Sharing Scheme with Public Verifiability},
  journal   = {I. J. Network Security},
  volume    = {18},
  number    = {5},
  pages     = {917--925},
  year      = {2016},
  url       = {http://ijns.femto.com.tw/contents/ijns-v18-n5/ijns-2016-v18-n5-p917-925.pdf},
  timestamp = {Wed, 17 Feb 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChenLHYD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DouGLM16,
  author    = {Jiawei Dou and
               Linming Gong and
               Shundong Li and
               Li Ma},
  title     = {Efficient private subset computation},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {18},
  pages     = {5965--5976},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1749},
  doi       = {10.1002/sec.1749},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/DouGLM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GongLMWD16,
  author    = {Linming Gong and
               Shundong Li and
               Qing Mao and
               Daoshun Wang and
               Jiawei Dou},
  title     = {A homomorphic encryption scheme with adaptive chosen ciphertext security
               but without random oracle},
  journal   = {Theor. Comput. Sci.},
  volume    = {609},
  pages     = {253--261},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.tcs.2015.10.001},
  doi       = {10.1016/j.tcs.2015.10.001},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/GongLMWD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/WuLZ15,
  author    = {Chunying Wu and
               Shundong Li and
               Yiying Zhang},
  title     = {Key management scheme based on secret sharing for wireless sensor
               networks},
  journal   = {{IJICT}},
  volume    = {7},
  number    = {2/3},
  pages     = {126--140},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJICT.2015.068375},
  doi       = {10.1504/IJICT.2015.068375},
  timestamp = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijict/WuLZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLWH15,
  author    = {Zhenhua Chen and
               Shundong Li and
               Qianhong Wu and
               Qiong Huang},
  title     = {A distributed secret share update scheme with public verifiability
               for ad hoc network},
  journal   = {Security and Communication Networks},
  volume    = {8},
  number    = {8},
  pages     = {1485--1493},
  year      = {2015},
  url       = {https://doi.org/10.1002/sec.1097},
  doi       = {10.1002/sec.1097},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ChenLWH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLZYX15,
  author    = {Zhenhua Chen and
               Shundong Li and
               Youwen Zhu and
               Jianhua Yan and
               Xinli Xu},
  title     = {A cheater identifiable multi-secret sharing scheme based on the Chinese
               remainder theorem},
  journal   = {Security and Communication Networks},
  volume    = {8},
  number    = {18},
  pages     = {3592--3601},
  year      = {2015},
  url       = {https://doi.org/10.1002/sec.1283},
  doi       = {10.1002/sec.1283},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ChenLZYX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/QinCLL14,
  author    = {Zheng Qin and
               Yang Chang and
               Shundong Li and
               Fengxiang Li},
  title     = {E-Commerce Strategy},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-39414-0},
  doi       = {10.1007/978-3-642-39414-0},
  isbn      = {978-3-642-39413-3},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/QinCLL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenLWZ14a,
  author    = {Zhenhua Chen and
               Shundong Li and
               Chunzhi Wang and
               Mingwu Zhang},
  title     = {Comments on {FHH} Anonymous Multireceiver Encryption},
  journal   = {I. J. Network Security},
  volume    = {16},
  number    = {5},
  pages     = {397--400},
  year      = {2014},
  url       = {http://ijns.femto.com.tw/contents/ijns-v16-n5/ijns-2014-v16-n5-p397-400.pdf},
  timestamp = {Mon, 21 Jul 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChenLWZ14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWWD14,
  author    = {Shundong Li and
               Chunying Wu and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Secure multiparty computation of solid geometric problems and their
               applications},
  journal   = {Inf. Sci.},
  volume    = {282},
  pages     = {401--413},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ins.2014.04.004},
  doi       = {10.1016/j.ins.2014.04.004},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/LiWWD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChenLGWC14,
  author    = {Zhenhua Chen and
               Shundong Li and
               Yimin Guo and
               Yilei Wang and
               Yunjie Chu},
  title     = {A Limited Proxy Re-encryption with Keyword Search for Data Access
               Control in Cloud Computing},
  booktitle = {Network and System Security - 8th International Conference, {NSS}
               2014, Xi'an, China, October 15-17, 2014, Proceedings},
  pages     = {82--95},
  year      = {2014},
  crossref  = {DBLP:conf/nss/2014},
  url       = {https://doi.org/10.1007/978-3-319-11698-3\_7},
  doi       = {10.1007/978-3-319-11698-3\_7},
  timestamp = {Fri, 02 Nov 2018 09:40:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nss/ChenLGWC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangLLL13,
  author    = {Daoshun Wang and
               Song Liu and
               Xiangyang Luo and
               Shundong Li},
  title     = {A transcoding-resistant video watermarking algorithm based on corners
               and singular value decomposition},
  journal   = {Telecommunication Systems},
  volume    = {54},
  number    = {3},
  pages     = {359--371},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11235-013-9739-5},
  doi       = {10.1007/s11235-013-9739-5},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/telsys/WangLLL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WuLZ13,
  author    = {Chunying Wu and
               Shundong Li and
               Yiying Zhang},
  title     = {Key Management Scheme Based on Secret Sharing for Wireless Sensor
               Network},
  booktitle = {2013 Fourth International Conference on Emerging Intelligent Data
               and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages     = {574--578},
  year      = {2013},
  crossref  = {DBLP:conf/eidwt/2013},
  url       = {https://doi.org/10.1109/EIDWT.2013.103},
  doi       = {10.1109/EIDWT.2013.103},
  timestamp = {Fri, 29 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eidwt/WuLZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/XuWLY13,
  author    = {Xing{-}Fu Xu and
               Daoshun Wang and
               Shundong Li and
               Ching{-}Nung Yang},
  title     = {An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes},
  booktitle = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  pages     = {369--372},
  year      = {2013},
  crossref  = {DBLP:conf/iih-msp/2013},
  url       = {https://doi.org/10.1109/IIH-MSP.2013.99},
  doi       = {10.1109/IIH-MSP.2013.99},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/XuWLY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DongWLD12,
  author    = {Lin Dong and
               Daoshun Wang and
               Shundong Li and
               Yiqi Dai},
  title     = {(2, n) secret sharing scheme for gray and color images based on Boolean
               operation},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {55},
  number    = {5},
  pages     = {1151--1161},
  year      = {2012},
  url       = {https://doi.org/10.1007/s11432-011-4302-z},
  doi       = {10.1007/s11432-011-4302-z},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/DongWLD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenLWS12,
  author    = {Zhenhua Chen and
               Shundong Li and
               Chunzhi Wang and
               Yanping Shen},
  title     = {Two Constructions of Multireceiver Encryption Supporting Constant
               Keys, Short Ciphertexts, and Identity Privacy},
  journal   = {I. J. Network Security},
  volume    = {14},
  number    = {5},
  pages     = {270--279},
  year      = {2012},
  url       = {http://ijns.femto.com.tw/contents/ijns-v14-n5/ijns-2012-v14-n5-p270-279.pdf},
  timestamp = {Wed, 07 Nov 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/ChenLWS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ChenWWL12,
  author    = {Zhenhua Chen and
               Chunying Wu and
               Daoshun Wang and
               Shundong Li},
  title     = {Conjunctive Keywords Searchable Encryption with Efficient Pairing,
               Constant Ciphertext and Short Trapdoor},
  booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
               2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  pages     = {176--189},
  year      = {2012},
  crossref  = {DBLP:conf/paisi/2012},
  url       = {https://doi.org/10.1007/978-3-642-30428-6\_15},
  doi       = {10.1007/978-3-642-30428-6\_15},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/paisi/ChenWWL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiWD09,
  author    = {Shundong Li and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Symmetric cryptographic protocols for extended millionaires' problem},
  journal   = {Science in China Series {F:} Information Sciences},
  volume    = {52},
  number    = {6},
  pages     = {974--982},
  year      = {2009},
  url       = {https://doi.org/10.1007/s11432-009-0109-6},
  doi       = {10.1007/s11432-009-0109-6},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/LiWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iim/LiWD09,
  author    = {Shundong Li and
               Daoshun Wang and
               Yiqi Dai},
  title     = {Secure Signature Protocol},
  journal   = {Intelligent Information Management},
  volume    = {1},
  number    = {3},
  pages     = {174--179},
  year      = {2009},
  url       = {https://doi.org/10.4236/iim.2009.13026},
  doi       = {10.4236/iim.2009.13026},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iim/LiWD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiDWL08,
  author    = {Shundong Li and
               Yiqi Dai and
               Daoshun Wang and
               Ping Luo},
  title     = {Comparing two sets without disclosing them},
  journal   = {Science in China Series {F:} Information Sciences},
  volume    = {51},
  number    = {9},
  pages     = {1231--1238},
  year      = {2008},
  url       = {https://doi.org/10.1007/s11432-008-0112-3},
  doi       = {10.1007/s11432-008-0112-3},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/LiDWL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShundongDYP08,
  author    = {Shundong Li and
               Daoshun Wang and
               Yiqi Dai and
               Ping Luo},
  title     = {Symmetric cryptographic solution to Yao's millionaires' problem and
               an evaluation of secure multiparty computations},
  journal   = {Inf. Sci.},
  volume    = {178},
  number    = {1},
  pages     = {244--255},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.ins.2007.07.015},
  doi       = {10.1016/j.ins.2007.07.015},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/ShundongDYP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alpit/DouL07,
  author    = {Jiawei Dou and
               Shundong Li},
  title     = {New Efficient Non-malleable Commitment Schemes},
  booktitle = {Proceedings of The Sixth International Conference on Advanced Language
               Processing and Web Information Technology, {ALPIT} 2007, Luoyang,
               Henan, China, 22-24 August 2007},
  pages     = {601--605},
  year      = {2007},
  crossref  = {DBLP:conf/alpit/2007},
  url       = {https://doi.org/10.1109/ALPIT.2007.109},
  doi       = {10.1109/ALPIT.2007.109},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/alpit/DouL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdim/ShundongYDP06,
  author    = {Shundong Li and
               Yiqi Dai and
               Daoshun Wang and
               Ping Luo},
  title     = {Symmetric Encryption Solutions to Millionaire's Problem and Its Extension},
  booktitle = {First {IEEE} International Conference on Digital Information Management
               (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings},
  pages     = {531--537},
  year      = {2006},
  crossref  = {DBLP:conf/icdim/2006},
  url       = {https://doi.org/10.1109/ICDIM.2007.369247},
  doi       = {10.1109/ICDIM.2007.369247},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdim/ShundongYDP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiD05,
  author    = {Shundong Li and
               Yiqi Dai},
  title     = {Secure Two-Party Computational Geometry},
  journal   = {J. Comput. Sci. Technol.},
  volume    = {20},
  number    = {2},
  pages     = {258--263},
  year      = {2005},
  url       = {https://doi.org/10.1007/s11390-005-0258-z},
  doi       = {10.1007/s11390-005-0258-z},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcst/LiD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2014,
  editor    = {Man Ho Au and
               Barbara Carminati and
               C.{-}C. Jay Kuo},
  title     = {Network and System Security - 8th International Conference, {NSS}
               2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8792},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11698-3},
  doi       = {10.1007/978-3-319-11698-3},
  isbn      = {978-3-319-11697-6},
  timestamp = {Fri, 02 Nov 2018 09:40:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eidwt/2013,
  title     = {2013 Fourth International Conference on Emerging Intelligent Data
               and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6630243},
  isbn      = {978-0-7695-5044-2},
  timestamp = {Mon, 23 May 2016 12:06:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eidwt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2013,
  editor    = {Kebin Jia and
               Jeng{-}Shyang Pan and
               Yao Zhao and
               Lakhmi C. Jain},
  title     = {Ninth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing, {IIH-MSP} 2013, Beijing, China, October
               16-18, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6845398},
  isbn      = {978-0-7695-5120-3},
  timestamp = {Wed, 18 May 2016 12:52:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iih-msp/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/paisi/2012,
  editor    = {Michael Chau and
               G. Alan Wang and
               Wei Thoo Yue and
               Hsinchun Chen},
  title     = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
               2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7299},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30428-6},
  doi       = {10.1007/978-3-642-30428-6},
  isbn      = {978-3-642-30427-9},
  timestamp = {Sun, 21 May 2017 00:19:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/paisi/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/alpit/2007,
  title     = {Proceedings of The Sixth International Conference on Advanced Language
               Processing and Web Information Technology, {ALPIT} 2007, Luoyang,
               Henan, China, 22-24 August 2007},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4460594},
  isbn      = {978-0-7695-2930-1},
  timestamp = {Tue, 18 Nov 2014 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/alpit/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdim/2006,
  title     = {First {IEEE} International Conference on Digital Information Management
               (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4221856},
  isbn      = {1-4244-0682-X},
  timestamp = {Fri, 15 Jan 2016 12:16:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdim/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier