BibTeX records: Sha Ma

download as .bib file

@article{DBLP:journals/cj/YangMDJH24,
  author       = {Tian Yang and
                  Sha Ma and
                  Jiaojiao Du and
                  Chengyu Jiang and
                  Qiong Huang},
  title        = {Revocable Public Key Encryption with Equality Test without Pairing
                  in Cloud Storage},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {642--657},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad006},
  doi          = {10.1093/COMJNL/BXAD006},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YangMDJH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LuLHMAH24,
  author       = {Jingwei Lu and
                  Hongbo Li and
                  Jianye Huang and
                  Sha Ma and
                  Man Ho Allen Au and
                  Qiong Huang},
  title        = {An Identity-Based Encryption with Equality Test scheme for healthcare
                  social apps},
  journal      = {Comput. Stand. Interfaces},
  volume       = {87},
  pages        = {103759},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103759},
  doi          = {10.1016/J.CSI.2023.103759},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LuLHMAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/LiWMXH24,
  author       = {Ximing Li and
                  Hao Wang and
                  Sha Ma and
                  Meiyan Xiao and
                  Qiong Huang},
  title        = {Revocable and verifiable weighted attribute-based encryption with
                  collaborative access for electronic health record in cloud},
  journal      = {Cybersecur.},
  volume       = {7},
  number       = {1},
  pages        = {18},
  year         = {2024},
  url          = {https://doi.org/10.1186/s42400-024-00211-1},
  doi          = {10.1186/S42400-024-00211-1},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersec/LiWMXH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MaYHJ24,
  author       = {Sha Ma and
                  Zhiqing Ye and
                  Qiong Huang and
                  Chengyu Jiang},
  title        = {Controllable forward secure identity-based encryption with equality
                  test in privacy-preserving text similarity analysis},
  journal      = {Inf. Sci.},
  volume       = {660},
  pages        = {120099},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120099},
  doi          = {10.1016/J.INS.2024.120099},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/MaYHJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/LuLHMAH23,
  author       = {Jingwei Lu and
                  Hongbo Li and
                  Jianye Huang and
                  Sha Ma and
                  Man Ho Allen Au and
                  Qiong Huang},
  title        = {Certificateless Public Key Authenticated Encryption with Keyword Search
                  Achieving Stronger Security},
  journal      = {Inf.},
  volume       = {14},
  number       = {3},
  pages        = {142},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14030142},
  doi          = {10.3390/INFO14030142},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/LuLHMAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaZHW23,
  author       = {Sha Ma and
                  Pan Zhou and
                  Qiong Huang and
                  Jiajun Wang},
  title        = {{MTER:} An Efficient Multi-User Threshold Equality Retrieval for Double
                  Auction in Smart Grid Market},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4515--4529},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3295950},
  doi          = {10.1109/TIFS.2023.3295950},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaZHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangMLYH23,
  author       = {Guiquan Yang and
                  Sha Ma and
                  Hongbo Li and
                  Husheng Yang and
                  Qiong Huang},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Public Key Authenticated Encryption with Keyword Search Improved:
                  Strong Security Model and Multi-keyword Construction},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_15},
  doi          = {10.1007/978-981-97-0942-7\_15},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YangMLYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangMZYH23,
  author       = {Husheng Yang and
                  Sha Ma and
                  Pan Zhou and
                  Guiquan Yang and
                  Qiong Huang},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Forward Secure Online/Offline Key Policy Attribute-Based Encryption
                  with Keyword Search},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {356--367},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_21},
  doi          = {10.1007/978-981-97-0945-8\_21},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YangMZYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LinWMZ23,
  author       = {Yongbing Lin and
                  Lei Wan and
                  Sha Ma and
                  Peike Zhang},
  title        = {Feature Structure Similarity Index for Hybrid Human and Machine Vision},
  booktitle    = {{IEEE} International Conference on Image Processing, {ICIP} 2023,
                  Kuala Lumpur, Malaysia, October 8-11, 2023},
  pages        = {1480--1484},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICIP49359.2023.10222499},
  doi          = {10.1109/ICIP49359.2023.10222499},
  timestamp    = {Tue, 21 Nov 2023 12:38:06 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LinWMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaZH22,
  author       = {Sha Ma and
                  Yijian Zhong and
                  Qiong Huang},
  title        = {Efficient Public Key Encryption With Outsourced Equality Test for
                  Cloud-Based IoT Environments},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3758--3772},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3212203},
  doi          = {10.1109/TIFS.2022.3212203},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/GuoHMXYS21,
  author       = {Qingwen Guo and
                  Qiong Huang and
                  Sha Ma and
                  Meiyan Xiao and
                  Guomin Yang and
                  Willy Susilo},
  title        = {Functional signatures: new definition and constructions},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {12},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-019-2855-3},
  doi          = {10.1007/S11432-019-2855-3},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/GuoHMXYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LingMHLZL21,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ximing Li and
                  Yijian Zhong and
                  Yunzhi Ling},
  title        = {Efficient Group ID-Based Encryption With Equality Test Against Insider
                  Attack},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {4},
  pages        = {661--674},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa120},
  doi          = {10.1093/COMJNL/BXAA120},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LingMHLZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MaH21,
  author       = {Sha Ma and
                  Qiong Huang},
  title        = {CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation
                  in the Standard Model},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {8},
  pages        = {1239--1252},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa153},
  doi          = {10.1093/COMJNL/BXAA153},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHLXMS21,
  author       = {Yuanhao Wang and
                  Qiong Huang and
                  Hongbo Li and
                  Meiyan Xiao and
                  Sha Ma and
                  Willy Susilo},
  title        = {Private Set Intersection With Authorization Over Outsourced Encrypted
                  Datasets},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4050--4062},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3101059},
  doi          = {10.1109/TIFS.2021.3101059},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangHLXMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbbe/MaPWL21,
  author       = {Sha Ma and
                  Rongchao Peng and
                  Dachao Wei and
                  Yi Li},
  title        = {Development of a Rat-Licking Device for Operant Conditioning Experiments},
  booktitle    = {{ICBBE} 2021: 8th International Conference on Biomedical and Bioinformatics
                  Engineering, Kyoto, Japan, November 12 - 15, 2021},
  pages        = {170--174},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3502871.3502898},
  doi          = {10.1145/3502871.3502898},
  timestamp    = {Mon, 20 Mar 2023 15:26:49 +0100},
  biburl       = {https://dblp.org/rec/conf/icbbe/MaPWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XiangMHL21,
  author       = {Ru Xiang and
                  Sha Ma and
                  Qiong Huang and
                  Ximing Li},
  editor       = {Qiong Huang and
                  Yu Yu},
  title        = {A CCA-Full-Anonymous Group Signature with Verifiable Controllable
                  Linkability in the Standard Model},
  booktitle    = {Provable and Practical Security - 15th International Conference, ProvSec
                  2021, Guangzhou, China, November 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13059},
  pages        = {279--295},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90402-9\_15},
  doi          = {10.1007/978-3-030-90402-9\_15},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/XiangMHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhongMH20,
  author       = {Yijian Zhong and
                  Sha Ma and
                  Qiong Huang},
  title        = {Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server
                  Setting},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {132825--132840},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3007349},
  doi          = {10.1109/ACCESS.2020.3007349},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhongMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MaH20,
  author       = {Sha Ma and
                  Qiong Huang},
  title        = {A New Framework of {IND-CCA} Secure Public Key Encryption with Keyword
                  Search},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {12},
  pages        = {1849--1858},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxaa014},
  doi          = {10.1093/COMJNL/BXAA014},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MaH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LingMHLL20,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ximing Li and
                  Yunzhi Ling},
  title        = {Group public key encryption with equality test against offline message
                  recovery attack},
  journal      = {Inf. Sci.},
  volume       = {510},
  pages        = {16--32},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.09.025},
  doi          = {10.1016/J.INS.2019.09.025},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LingMHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiHMSS19,
  author       = {Hongbo Li and
                  Qiong Huang and
                  Sha Ma and
                  Jian Shen and
                  Willy Susilo},
  title        = {Authorized Equality Test on Identity-Based Ciphertexts for Secret
                  Data Sharing via Cloud Storage},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {25409--25421},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2899680},
  doi          = {10.1109/ACCESS.2019.2899680},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiHMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LingMHXL19,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ru Xiang and
                  Ximing Li},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Group ID-Based Encryption with Equality Test},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_3},
  doi          = {10.1007/978-3-030-21548-4\_3},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LingMHXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/LiCGMH19,
  author       = {Ximing Li and
                  Weizhao Chen and
                  Yubin Guo and
                  Sha Ma and
                  Qiong Huang},
  editor       = {Rui Mao and
                  Hongzhi Wang and
                  Xiaolan Xie and
                  Zeguang Lu},
  title        = {Secure, Efficient and Searchable File System on Distributed Clouds},
  booktitle    = {Data Science - 5th International Conference of Pioneering Computer
                  Scientists, Engineers and Educators, {ICPCSEE} 2019, Guilin, China,
                  September 20-23, 2019, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1059},
  pages        = {246--266},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0121-0\_19},
  doi          = {10.1007/978-981-15-0121-0\_19},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycsee/LiCGMH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MaH19,
  author       = {Sha Ma and
                  Qiong Huang},
  editor       = {Swee{-}Huay Heng and
                  Javier L{\'{o}}pez},
  title        = {Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard
                  Model},
  booktitle    = {Information Security Practice and Experience - 15th International
                  Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28,
                  2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11879},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34339-2\_1},
  doi          = {10.1007/978-3-030-34339-2\_1},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MaH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/MaHLX19,
  author       = {Sha Ma and
                  Qiong Huang and
                  Ximing Li and
                  Meiyan Xiao},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Plaintext-Verifiably-Checkable Encryption},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {149--166},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_9},
  doi          = {10.1007/978-3-030-31919-9\_9},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/MaHLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LaiMGJM18,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Peng Jiang and
                  Sha Ma},
  title        = {Identity-Based Broadcast Encryption for Inner Products},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {8},
  pages        = {1240--1251},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy062},
  doi          = {10.1093/COMJNL/BXY062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LaiMGJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MaMS18,
  author       = {Sha Ma and
                  Yi Mu and
                  Willy Susilo},
  title        = {A Generic Scheme of plaintext-checkable database encryption},
  journal      = {Inf. Sci.},
  volume       = {429},
  pages        = {88--101},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2017.11.010},
  doi          = {10.1016/J.INS.2017.11.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/MaMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MaMSY18,
  author       = {Sha Ma and
                  Yi Mu and
                  Willy Susilo and
                  Bo Yang},
  title        = {Witness-based searchable encryption},
  journal      = {Inf. Sci.},
  volume       = {453},
  pages        = {364--378},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.04.012},
  doi          = {10.1016/J.INS.2018.04.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/MaMSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LaiMGCM18,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Rongmao Chen and
                  Sha Ma},
  title        = {Efficient \emph{k}-out-of-\emph{n} oblivious transfer scheme with
                  the ideal communication cost},
  journal      = {Theor. Comput. Sci.},
  volume       = {714},
  pages        = {15--26},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2017.12.019},
  doi          = {10.1016/J.TCS.2017.12.019},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LaiMGCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LingMHL18,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ximing Li},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A General Two-Server Framework for Ciphertext-Checkable Encryption
                  Against Offline Message Recovery Attack},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11065},
  pages        = {370--382},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00012-7\_34},
  doi          = {10.1007/978-3-030-00012-7\_34},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LingMHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ma18,
  author       = {Sha Ma},
  title        = {Authorized Equality Test of Encrypted Data for Secure Cloud Databases},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {223--230},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00043},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ma18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Ma17,
  author       = {Sha Ma},
  title        = {Authorized Equi-join for Multiple Data Contributors in the PKC-Based
                  Setting},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {12},
  pages        = {1822--1838},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxx061},
  doi          = {10.1093/COMJNL/BXX061},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Ma17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuMMZ17,
  author       = {Tong Wu and
                  Sha Ma and
                  Yi Mu and
                  Shengke Zeng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {ID-Based Encryption with Equality Test Against Insider Attack},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_9},
  doi          = {10.1007/978-3-319-60055-0\_9},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WuMMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/CholeFMSVBMACKO17,
  author       = {Sharad Chole and
                  Andy Fingerhut and
                  Sha Ma and
                  Anirudh Sivaraman and
                  Shay Vargaftik and
                  Alon Berger and
                  Gal Mendelson and
                  Mohammad Alizadeh and
                  Shang{-}Tse Chuang and
                  Isaac Keslassy and
                  Ariel Orda and
                  Tom Edsall},
  title        = {dRMT: Disaggregated Programmable Switching},
  booktitle    = {Proceedings of the Conference of the {ACM} Special Interest Group
                  on Data Communication, {SIGCOMM} 2017, Los Angeles, CA, USA, August
                  21-25, 2017},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098822.3098823},
  doi          = {10.1145/3098822.3098823},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/CholeFMSVBMACKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MaL17,
  author       = {Sha Ma and
                  Yunhao Ling},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {A General Two-Server Cryptosystem Supporting Complex Queries},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_21},
  doi          = {10.1007/978-3-319-93563-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MaL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Ma16,
  author       = {Sha Ma},
  title        = {Identity-based encryption with outsourced equality test in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {328},
  pages        = {389--402},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2015.08.053},
  doi          = {10.1016/J.INS.2015.08.053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Ma16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuYMM16,
  author       = {Shengmin Xu and
                  Guomin Yang and
                  Yi Mu and
                  Sha Ma},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Proxy Signature with Revocation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_2},
  doi          = {10.1007/978-3-319-40367-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuYMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/SangXJLZM16,
  author       = {Chaoqiang Sang and
                  Pengfei Xia and
                  Yao Jiang and
                  Qingwen Liu and
                  Juan Zheng and
                  Sha Ma},
  title        = {Stand-Alone Unlicensed {LTE} (SAiL)},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842294},
  doi          = {10.1109/GLOCOM.2016.7842294},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/SangXJLZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MaZHY15,
  author       = {Sha Ma and
                  Mingwu Zhang and
                  Qiong Huang and
                  Bo Yang},
  title        = {Public Key Encryption with Delegated Equality Test in a Multi-User
                  Setting},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {4},
  pages        = {986--1002},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu026},
  doi          = {10.1093/COMJNL/BXU026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MaZHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaHZY15,
  author       = {Sha Ma and
                  Qiong Huang and
                  Mingwu Zhang and
                  Bo Yang},
  title        = {Efficient Public Key Encryption With Equality Test Supporting Flexible
                  Authorization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {458--470},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2378592},
  doi          = {10.1109/TIFS.2014.2378592},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaHZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaYZ14,
  author       = {Sha Ma and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {{PPGJ:} {A} privacy-preserving general join for outsourced encrypted
                  database},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1232--1244},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.854},
  doi          = {10.1002/SEC.854},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vr/MaVSR12,
  author       = {Sha Ma and
                  Martin R. Varley and
                  Lik{-}Kwan Shark and
                  Jim Richards},
  title        = {Overcoming the information overload problem in a multiform feedback-based
                  virtual reality system for hand motion rehabilitation: healthy subject
                  case study},
  journal      = {Virtual Real.},
  volume       = {16},
  number       = {4},
  pages        = {325--334},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10055-012-0209-2},
  doi          = {10.1007/S10055-012-0209-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vr/MaVSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/SunYHML12,
  author       = {Weiwei Sun and
                  Bo Yang and
                  Qiong Huang and
                  Sha Ma and
                  Ximing Li},
  editor       = {Michael Chau and
                  G. Alan Wang and
                  Wei Thoo Yue and
                  Hsinchun Chen},
  title        = {Multi-Committer Threshold Commitment Scheme from Lattice},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7299},
  pages        = {162--175},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30428-6\_14},
  doi          = {10.1007/978-3-642-30428-6\_14},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paisi/SunYHML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MaYLX11,
  author       = {Sha Ma and
                  Bo Yang and
                  Kangshun Li and
                  Feng Xia},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {A Privacy-Preserving Join on Outsourced Database},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_19},
  doi          = {10.1007/978-3-642-24861-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MaYLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iv/MaVSR10,
  author       = {Sha Ma and
                  Martin R. Varley and
                  Lik{-}Kwan Shark and
                  Jim Richards},
  editor       = {Ebad Banissi and
                  Stefan Bertschi and
                  Remo Aslak Burkhard and
                  John Counsell and
                  Mohammad Dastbaz and
                  Martin J. Eppler and
                  Camilla Forsell and
                  Georges G. Grinstein and
                  Jimmy Johansson and
                  Mikael Jern and
                  Farzad Khosrowshahi and
                  Francis T. Marchese and
                  Carsten Maple and
                  Richard Laing and
                  Urska Cvek and
                  Marjan Trutschl and
                  Muhammad Sarfraz and
                  Liz J. Stuart and
                  Anna Ursyn and
                  Theodor G. Wyeld},
  title        = {{EMG} Biofeedback Based {VR} System for Hand Rotation and Grasping
                  Rehabilitation},
  booktitle    = {14th International Conference on Information Visualisation, {IV} 2010,
                  26-29 July 2010, London, {UK}},
  pages        = {479--484},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IV.2010.73},
  doi          = {10.1109/IV.2010.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iv/MaVSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vw/MaVRS09,
  author       = {Sha Ma and
                  Martin R. Varley and
                  James Richards and
                  Lik{-}Kwan Shark},
  editor       = {Hassan Ugail and
                  Rami Qahwaji and
                  Rae A. Earnshaw and
                  Philip J. Willis},
  title        = {Overcoming the Information Overload Problem in a Multiform Feedback
                  Based Virtual Reality System for Hand Motion Rehabilitation},
  booktitle    = {2009 International Conference on CyberWorlds, Bradford, West Yorkshire,
                  UK, 7-11 September 2009},
  pages        = {51--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CW.2009.25},
  doi          = {10.1109/CW.2009.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vw/MaVRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/DongMLY07,
  author       = {Junyu Dong and
                  Sha Ma and
                  Li Li and
                  Zhongda Yu},
  title        = {Hole Filling on Three-Dimensional Surface Texture},
  booktitle    = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages        = {1299--1302},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICME.2007.4284896},
  doi          = {10.1109/ICME.2007.4284896},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/DongMLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/MaF94,
  author       = {Sha Ma and
                  Paul D. Franzon},
  title        = {Energy control and accurate delay estimation in the design of {CMOS}
                  buffers},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {29},
  number       = {9},
  pages        = {1150--1153},
  year         = {1994},
  url          = {https://doi.org/10.1109/4.309914},
  doi          = {10.1109/4.309914},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/MaF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics