Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sha Ma
@article{DBLP:journals/cj/YangMDJH24, author = {Tian Yang and Sha Ma and Jiaojiao Du and Chengyu Jiang and Qiong Huang}, title = {Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage}, journal = {Comput. J.}, volume = {67}, number = {2}, pages = {642--657}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxad006}, doi = {10.1093/COMJNL/BXAD006}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YangMDJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LuLHMAH24, author = {Jingwei Lu and Hongbo Li and Jianye Huang and Sha Ma and Man Ho Allen Au and Qiong Huang}, title = {An Identity-Based Encryption with Equality Test scheme for healthcare social apps}, journal = {Comput. Stand. Interfaces}, volume = {87}, pages = {103759}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103759}, doi = {10.1016/J.CSI.2023.103759}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LuLHMAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/LiWMXH24, author = {Ximing Li and Hao Wang and Sha Ma and Meiyan Xiao and Qiong Huang}, title = {Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud}, journal = {Cybersecur.}, volume = {7}, number = {1}, pages = {18}, year = {2024}, url = {https://doi.org/10.1186/s42400-024-00211-1}, doi = {10.1186/S42400-024-00211-1}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersec/LiWMXH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MaYHJ24, author = {Sha Ma and Zhiqing Ye and Qiong Huang and Chengyu Jiang}, title = {Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis}, journal = {Inf. Sci.}, volume = {660}, pages = {120099}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2024.120099}, doi = {10.1016/J.INS.2024.120099}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/MaYHJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/LuLHMAH23, author = {Jingwei Lu and Hongbo Li and Jianye Huang and Sha Ma and Man Ho Allen Au and Qiong Huang}, title = {Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security}, journal = {Inf.}, volume = {14}, number = {3}, pages = {142}, year = {2023}, url = {https://doi.org/10.3390/info14030142}, doi = {10.3390/INFO14030142}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/LuLHMAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaZHW23, author = {Sha Ma and Pan Zhou and Qiong Huang and Jiajun Wang}, title = {{MTER:} An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4515--4529}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3295950}, doi = {10.1109/TIFS.2023.3295950}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaZHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangMLYH23, author = {Guiquan Yang and Sha Ma and Hongbo Li and Husheng Yang and Qiong Huang}, editor = {Chunpeng Ge and Moti Yung}, title = {Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {299--319}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_15}, doi = {10.1007/978-981-97-0942-7\_15}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YangMLYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangMZYH23, author = {Husheng Yang and Sha Ma and Pan Zhou and Guiquan Yang and Qiong Huang}, editor = {Chunpeng Ge and Moti Yung}, title = {Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {356--367}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_21}, doi = {10.1007/978-981-97-0945-8\_21}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YangMZYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LinWMZ23, author = {Yongbing Lin and Lei Wan and Sha Ma and Peike Zhang}, title = {Feature Structure Similarity Index for Hybrid Human and Machine Vision}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2023, Kuala Lumpur, Malaysia, October 8-11, 2023}, pages = {1480--1484}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIP49359.2023.10222499}, doi = {10.1109/ICIP49359.2023.10222499}, timestamp = {Tue, 21 Nov 2023 12:38:06 +0100}, biburl = {https://dblp.org/rec/conf/icip/LinWMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaZH22, author = {Sha Ma and Yijian Zhong and Qiong Huang}, title = {Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3758--3772}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3212203}, doi = {10.1109/TIFS.2022.3212203}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/GuoHMXYS21, author = {Qingwen Guo and Qiong Huang and Sha Ma and Meiyan Xiao and Guomin Yang and Willy Susilo}, title = {Functional signatures: new definition and constructions}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {12}, year = {2021}, url = {https://doi.org/10.1007/s11432-019-2855-3}, doi = {10.1007/S11432-019-2855-3}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/GuoHMXYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LingMHLZL21, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ximing Li and Yijian Zhong and Yunzhi Ling}, title = {Efficient Group ID-Based Encryption With Equality Test Against Insider Attack}, journal = {Comput. J.}, volume = {64}, number = {4}, pages = {661--674}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa120}, doi = {10.1093/COMJNL/BXAA120}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LingMHLZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaH21, author = {Sha Ma and Qiong Huang}, title = {CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model}, journal = {Comput. J.}, volume = {64}, number = {8}, pages = {1239--1252}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa153}, doi = {10.1093/COMJNL/BXAA153}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangHLXMS21, author = {Yuanhao Wang and Qiong Huang and Hongbo Li and Meiyan Xiao and Sha Ma and Willy Susilo}, title = {Private Set Intersection With Authorization Over Outsourced Encrypted Datasets}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4050--4062}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3101059}, doi = {10.1109/TIFS.2021.3101059}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangHLXMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbbe/MaPWL21, author = {Sha Ma and Rongchao Peng and Dachao Wei and Yi Li}, title = {Development of a Rat-Licking Device for Operant Conditioning Experiments}, booktitle = {{ICBBE} 2021: 8th International Conference on Biomedical and Bioinformatics Engineering, Kyoto, Japan, November 12 - 15, 2021}, pages = {170--174}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3502871.3502898}, doi = {10.1145/3502871.3502898}, timestamp = {Mon, 20 Mar 2023 15:26:49 +0100}, biburl = {https://dblp.org/rec/conf/icbbe/MaPWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/XiangMHL21, author = {Ru Xiang and Sha Ma and Qiong Huang and Ximing Li}, editor = {Qiong Huang and Yu Yu}, title = {A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model}, booktitle = {Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13059}, pages = {279--295}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90402-9\_15}, doi = {10.1007/978-3-030-90402-9\_15}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/XiangMHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhongMH20, author = {Yijian Zhong and Sha Ma and Qiong Huang}, title = {Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting}, journal = {{IEEE} Access}, volume = {8}, pages = {132825--132840}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3007349}, doi = {10.1109/ACCESS.2020.3007349}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhongMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaH20, author = {Sha Ma and Qiong Huang}, title = {A New Framework of {IND-CCA} Secure Public Key Encryption with Keyword Search}, journal = {Comput. J.}, volume = {63}, number = {12}, pages = {1849--1858}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxaa014}, doi = {10.1093/COMJNL/BXAA014}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LingMHLL20, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ximing Li and Yunzhi Ling}, title = {Group public key encryption with equality test against offline message recovery attack}, journal = {Inf. Sci.}, volume = {510}, pages = {16--32}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.09.025}, doi = {10.1016/J.INS.2019.09.025}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LingMHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiHMSS19, author = {Hongbo Li and Qiong Huang and Sha Ma and Jian Shen and Willy Susilo}, title = {Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage}, journal = {{IEEE} Access}, volume = {7}, pages = {25409--25421}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2899680}, doi = {10.1109/ACCESS.2019.2899680}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiHMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LingMHXL19, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ru Xiang and Ximing Li}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Group ID-Based Encryption with Equality Test}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {39--57}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_3}, doi = {10.1007/978-3-030-21548-4\_3}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LingMHXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/LiCGMH19, author = {Ximing Li and Weizhao Chen and Yubin Guo and Sha Ma and Qiong Huang}, editor = {Rui Mao and Hongzhi Wang and Xiaolan Xie and Zeguang Lu}, title = {Secure, Efficient and Searchable File System on Distributed Clouds}, booktitle = {Data Science - 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, {ICPCSEE} 2019, Guilin, China, September 20-23, 2019, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1059}, pages = {246--266}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0121-0\_19}, doi = {10.1007/978-981-15-0121-0\_19}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycsee/LiCGMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MaH19, author = {Sha Ma and Qiong Huang}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {3--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_1}, doi = {10.1007/978-3-030-34339-2\_1}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MaH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/MaHLX19, author = {Sha Ma and Qiong Huang and Ximing Li and Meiyan Xiao}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Plaintext-Verifiably-Checkable Encryption}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {149--166}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_9}, doi = {10.1007/978-3-030-31919-9\_9}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/MaHLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LaiMGJM18, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Peng Jiang and Sha Ma}, title = {Identity-Based Broadcast Encryption for Inner Products}, journal = {Comput. J.}, volume = {61}, number = {8}, pages = {1240--1251}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy062}, doi = {10.1093/COMJNL/BXY062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LaiMGJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MaMS18, author = {Sha Ma and Yi Mu and Willy Susilo}, title = {A Generic Scheme of plaintext-checkable database encryption}, journal = {Inf. Sci.}, volume = {429}, pages = {88--101}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2017.11.010}, doi = {10.1016/J.INS.2017.11.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/MaMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MaMSY18, author = {Sha Ma and Yi Mu and Willy Susilo and Bo Yang}, title = {Witness-based searchable encryption}, journal = {Inf. Sci.}, volume = {453}, pages = {364--378}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.04.012}, doi = {10.1016/J.INS.2018.04.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/MaMSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LaiMGCM18, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Rongmao Chen and Sha Ma}, title = {Efficient \emph{k}-out-of-\emph{n} oblivious transfer scheme with the ideal communication cost}, journal = {Theor. Comput. Sci.}, volume = {714}, pages = {15--26}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2017.12.019}, doi = {10.1016/J.TCS.2017.12.019}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LaiMGCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LingMHL18, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ximing Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {370--382}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_34}, doi = {10.1007/978-3-030-00012-7\_34}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LingMHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ma18, author = {Sha Ma}, title = {Authorized Equality Test of Encrypted Data for Secure Cloud Databases}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {223--230}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00043}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00043}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Ma18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Ma17, author = {Sha Ma}, title = {Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting}, journal = {Comput. J.}, volume = {60}, number = {12}, pages = {1822--1838}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxx061}, doi = {10.1093/COMJNL/BXX061}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Ma17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuMMZ17, author = {Tong Wu and Sha Ma and Yi Mu and Shengke Zeng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {ID-Based Encryption with Equality Test Against Insider Attack}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {168--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_9}, doi = {10.1007/978-3-319-60055-0\_9}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuMMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/CholeFMSVBMACKO17, author = {Sharad Chole and Andy Fingerhut and Sha Ma and Anirudh Sivaraman and Shay Vargaftik and Alon Berger and Gal Mendelson and Mohammad Alizadeh and Shang{-}Tse Chuang and Isaac Keslassy and Ariel Orda and Tom Edsall}, title = {dRMT: Disaggregated Programmable Switching}, booktitle = {Proceedings of the Conference of the {ACM} Special Interest Group on Data Communication, {SIGCOMM} 2017, Los Angeles, CA, USA, August 21-25, 2017}, pages = {1--14}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098822.3098823}, doi = {10.1145/3098822.3098823}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/CholeFMSVBMACKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MaL17, author = {Sha Ma and Yunhao Ling}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {A General Two-Server Cryptosystem Supporting Complex Queries}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {249--260}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_21}, doi = {10.1007/978-3-319-93563-8\_21}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Ma16, author = {Sha Ma}, title = {Identity-based encryption with outsourced equality test in cloud computing}, journal = {Inf. Sci.}, volume = {328}, pages = {389--402}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2015.08.053}, doi = {10.1016/J.INS.2015.08.053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Ma16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuYMM16, author = {Shengmin Xu and Guomin Yang and Yi Mu and Sha Ma}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Proxy Signature with Revocation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {21--36}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_2}, doi = {10.1007/978-3-319-40367-0\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuYMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SangXJLZM16, author = {Chaoqiang Sang and Pengfei Xia and Yao Jiang and Qingwen Liu and Juan Zheng and Sha Ma}, title = {Stand-Alone Unlicensed {LTE} (SAiL)}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7842294}, doi = {10.1109/GLOCOM.2016.7842294}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SangXJLZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaZHY15, author = {Sha Ma and Mingwu Zhang and Qiong Huang and Bo Yang}, title = {Public Key Encryption with Delegated Equality Test in a Multi-User Setting}, journal = {Comput. J.}, volume = {58}, number = {4}, pages = {986--1002}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu026}, doi = {10.1093/COMJNL/BXU026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaZHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaHZY15, author = {Sha Ma and Qiong Huang and Mingwu Zhang and Bo Yang}, title = {Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {458--470}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2378592}, doi = {10.1109/TIFS.2014.2378592}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaHZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaYZ14, author = {Sha Ma and Bo Yang and Mingwu Zhang}, title = {{PPGJ:} {A} privacy-preserving general join for outsourced encrypted database}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1232--1244}, year = {2014}, url = {https://doi.org/10.1002/sec.854}, doi = {10.1002/SEC.854}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vr/MaVSR12, author = {Sha Ma and Martin R. Varley and Lik{-}Kwan Shark and Jim Richards}, title = {Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study}, journal = {Virtual Real.}, volume = {16}, number = {4}, pages = {325--334}, year = {2012}, url = {https://doi.org/10.1007/s10055-012-0209-2}, doi = {10.1007/S10055-012-0209-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vr/MaVSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/SunYHML12, author = {Weiwei Sun and Bo Yang and Qiong Huang and Sha Ma and Ximing Li}, editor = {Michael Chau and G. Alan Wang and Wei Thoo Yue and Hsinchun Chen}, title = {Multi-Committer Threshold Commitment Scheme from Lattice}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7299}, pages = {162--175}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30428-6\_14}, doi = {10.1007/978-3-642-30428-6\_14}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paisi/SunYHML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MaYLX11, author = {Sha Ma and Bo Yang and Kangshun Li and Feng Xia}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {A Privacy-Preserving Join on Outsourced Database}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {278--292}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_19}, doi = {10.1007/978-3-642-24861-0\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/MaYLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iv/MaVSR10, author = {Sha Ma and Martin R. Varley and Lik{-}Kwan Shark and Jim Richards}, editor = {Ebad Banissi and Stefan Bertschi and Remo Aslak Burkhard and John Counsell and Mohammad Dastbaz and Martin J. Eppler and Camilla Forsell and Georges G. Grinstein and Jimmy Johansson and Mikael Jern and Farzad Khosrowshahi and Francis T. Marchese and Carsten Maple and Richard Laing and Urska Cvek and Marjan Trutschl and Muhammad Sarfraz and Liz J. Stuart and Anna Ursyn and Theodor G. Wyeld}, title = {{EMG} Biofeedback Based {VR} System for Hand Rotation and Grasping Rehabilitation}, booktitle = {14th International Conference on Information Visualisation, {IV} 2010, 26-29 July 2010, London, {UK}}, pages = {479--484}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IV.2010.73}, doi = {10.1109/IV.2010.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iv/MaVSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vw/MaVRS09, author = {Sha Ma and Martin R. Varley and James Richards and Lik{-}Kwan Shark}, editor = {Hassan Ugail and Rami Qahwaji and Rae A. Earnshaw and Philip J. Willis}, title = {Overcoming the Information Overload Problem in a Multiform Feedback Based Virtual Reality System for Hand Motion Rehabilitation}, booktitle = {2009 International Conference on CyberWorlds, Bradford, West Yorkshire, UK, 7-11 September 2009}, pages = {51--56}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CW.2009.25}, doi = {10.1109/CW.2009.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vw/MaVRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/DongMLY07, author = {Junyu Dong and Sha Ma and Li Li and Zhongda Yu}, title = {Hole Filling on Three-Dimensional Surface Texture}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {1299--1302}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284896}, doi = {10.1109/ICME.2007.4284896}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/DongMLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/MaF94, author = {Sha Ma and Paul D. Franzon}, title = {Energy control and accurate delay estimation in the design of {CMOS} buffers}, journal = {{IEEE} J. Solid State Circuits}, volume = {29}, number = {9}, pages = {1150--1153}, year = {1994}, url = {https://doi.org/10.1109/4.309914}, doi = {10.1109/4.309914}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/MaF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.