BibTeX records: Yamin Wen

download as .bib file

@article{DBLP:journals/istr/WenGGL23,
  author       = {Yamin Wen and
                  Jinyu Guo and
                  Zheng Gong and
                  Cong Lin},
  title        = {A new Private Mutual Authentication scheme with group discovery},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103558},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103558},
  doi          = {10.1016/J.JISA.2023.103558},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WenGGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AnPWZ23,
  author       = {Zhiyuan An and
                  Jing Pan and
                  Yamin Wen and
                  Fangguo Zhang},
  title        = {Secret handshakes: Full dynamicity, deniability and lattice-based
                  design},
  journal      = {Theor. Comput. Sci.},
  volume       = {940},
  number       = {Part},
  pages        = {14--35},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2022.10.035},
  doi          = {10.1016/J.TCS.2022.10.035},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AnPWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiXWZ22,
  author       = {Wanhua Li and
                  Lingling Xu and
                  Yamin Wen and
                  Fangguo Zhang},
  title        = {Conjunctive multi-key searchable encryption with attribute-based access
                  control for {EHR} systems},
  journal      = {Comput. Stand. Interfaces},
  volume       = {82},
  pages        = {103606},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103606},
  doi          = {10.1016/J.CSI.2021.103606},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiXWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/WeiGYYW22,
  author       = {Yungen Wei and
                  Zheng Gong and
                  Shunzhi Yang and
                  Kai Ye and
                  Yamin Wen},
  title        = {EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement
                  for keyword spotting},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {1525--1535},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12652-021-03022-1},
  doi          = {10.1007/S12652-021-03022-1},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/WeiGYYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/XieGTWW22,
  author       = {Nanjiang Xie and
                  Zheng Gong and
                  Yufeng Tang and
                  Lei Wang and
                  Yamin Wen},
  title        = {Protecting White-Box Block Ciphers with Galois/Counter Mode},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022,
                  Edinburgh, UK, June 22-24, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC54232.2022.9888845},
  doi          = {10.1109/DSC54232.2022.9888845},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/XieGTWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/AnPWZ22,
  author       = {Zhiyuan An and
                  Jing Pan and
                  Yamin Wen and
                  Fangguo Zhang},
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {Forward-Secure Revocable Secret Handshakes from Lattices},
  booktitle    = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  pages        = {453--479},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2\_21},
  doi          = {10.1007/978-3-031-17234-2\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/AnPWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AnZWZ21,
  author       = {Zhiyuan An and
                  Zhuoran Zhang and
                  Yamin Wen and
                  Fangguo Zhang},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Lattice-Based Secret Handshakes with Reusable Credentials},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {231--248},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_14},
  doi          = {10.1007/978-3-030-88052-1\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AnZWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WenZWMG20,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Huaxiong Wang and
                  Yinbin Miao and
                  Zheng Gong},
  title        = {Intersection-policy private mutual authentication from authorized
                  private set intersection},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {2},
  pages        = {122101},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-9907-x},
  doi          = {10.1007/S11432-019-9907-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WenZWMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WenZWGMD20,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Huaxiong Wang and
                  Zheng Gong and
                  Yinbin Miao and
                  Yuqiao Deng},
  title        = {A new secret handshake scheme with multi-symptom intersection for
                  mobile healthcare social networks},
  journal      = {Inf. Sci.},
  volume       = {520},
  pages        = {142--154},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.02.007},
  doi          = {10.1016/J.INS.2020.02.007},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WenZWGMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/WeiGYYW20,
  author       = {Yungen Wei and
                  Zheng Gong and
                  Shunzhi Yang and
                  Kai Ye and
                  Yamin Wen},
  editor       = {Xiaofeng Chen and
                  Hongyang Yan and
                  Qiben Yan and
                  Xiangliang Zhang},
  title        = {A New Lightweight {CRNN} Model for Keyword Spotting with Edge Computing
                  Devices},
  booktitle    = {Machine Learning for Cyber Security - Third International Conference,
                  {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12486},
  pages        = {195--205},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62223-7\_17},
  doi          = {10.1007/978-3-030-62223-7\_17},
  timestamp    = {Wed, 11 Nov 2020 16:33:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/WeiGYYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/WenGHQ18,
  author       = {Yamin Wen and
                  Zheng Gong and
                  Zhengan Huang and
                  Weidong Qiu},
  title        = {A new efficient authorized private set intersection protocol from
                  Schnorr signature and its applications},
  journal      = {Clust. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {287--297},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10586-017-0940-2},
  doi          = {10.1007/S10586-017-0940-2},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/WenGHQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhouSWLG18,
  author       = {Lu Zhou and
                  Chunhua Su and
                  Yamin Wen and
                  Weijie Li and
                  Zheng Gong},
  title        = {Towards practical white-box lightweight block cipher implementations
                  for IoTs},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {507--514},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.04.011},
  doi          = {10.1016/J.FUTURE.2018.04.011},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhouSWLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiLWG17,
  author       = {Weijie Li and
                  Guohong Liao and
                  Yamin Wen and
                  Zheng Gong},
  title        = {SpongeMPH: {A} New Multivariate Polynomial Hash Function based on
                  the Sponge Construction},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {516--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.105},
  doi          = {10.1109/DSC.2017.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiLWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/GongLWLQ16,
  author       = {Zheng Gong and
                  Shusheng Liu and
                  Yamin Wen and
                  Yiyuan Luo and
                  Weidong Qiu},
  title        = {Biclique cryptanalysis using balanced complete bipartite subgraphs},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {4},
  pages        = {049101:1--049101:3},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-5540-x},
  doi          = {10.1007/S11432-016-5540-X},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/GongLWLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/XuZSW16,
  author       = {Lingling Xu and
                  Fangguo Zhang and
                  Willy Susilo and
                  Yamin Wen},
  title        = {Solutions to the anti-piracy problem in oblivious transfer},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {82},
  number       = {3},
  pages        = {466--476},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jcss.2015.11.003},
  doi          = {10.1016/J.JCSS.2015.11.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/XuZSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/ChenZLWG15,
  author       = {Xunjun Chen and
                  Yuelong Zhu and
                  Jiguo Li and
                  Yamin Wen and
                  Zheng Gong},
  title        = {Efficiency and Privacy Enhancement for a Track and Trace System of
                  RFID-Based Supply Chains},
  journal      = {Inf.},
  volume       = {6},
  number       = {2},
  pages        = {258--274},
  year         = {2015},
  url          = {https://doi.org/10.3390/info6020258},
  doi          = {10.3390/INFO6020258},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/ChenZLWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/WenGX15,
  author       = {Yamin Wen and
                  Zheng Gong and
                  Lingling Xu},
  title        = {A Backward Unlinkable Secret Handshake Scheme with Revocation Support
                  in the Standard Model},
  journal      = {Inf.},
  volume       = {6},
  number       = {4},
  pages        = {576--591},
  year         = {2015},
  url          = {https://doi.org/10.3390/info6040576},
  doi          = {10.3390/INFO6040576},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/WenGX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WenLGT18,
  author       = {Yamin Wen and
                  Fengxia Li and
                  Zheng Gong and
                  Shaohua Tang},
  title        = {{\unicode{19968}}{\unicode{31181}}AVR{\unicode{29615}}{\unicode{22659}}{\unicode{19979}}KLEIN{\unicode{20998}}{\unicode{32452}}{\unicode{23494}}{\unicode{30721}}{\unicode{25239}}{\unicode{35745}}{\unicode{26102}}{\unicode{21644}}{\unicode{32531}}{\unicode{23384}}{\unicode{36793}}{\unicode{20449}}{\unicode{36947}}{\unicode{25915}}{\unicode{20987}}{\unicode{30340}}{\unicode{24555}}{\unicode{36895}}{\unicode{20445}}{\unicode{25252}}{\unicode{26041}}{\unicode{27861}}
                  (Fast Implementation of {KLEIN} for Resisting Timing and Cache Side-channel
                  Attacks on {AVR)}},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {3},
  pages        = {148--152},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.03.031},
  doi          = {10.11896/J.ISSN.1002-137X.2015.03.031},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WenLGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpsa/WenG14,
  author       = {Yamin Wen and
                  Zheng Gong},
  title        = {Private mutual authentications with fuzzy matching},
  journal      = {Int. J. High Perform. Syst. Archit.},
  volume       = {5},
  number       = {1},
  pages        = {3--12},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJHPSA.2014.059860},
  doi          = {10.1504/IJHPSA.2014.059860},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhpsa/WenG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WenG14,
  author       = {Yamin Wen and
                  Zheng Gong},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {A Dynamic Matching Secret Handshake Scheme without Random Oracles},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {409--420},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_31},
  doi          = {10.1007/978-3-319-11698-3\_31},
  timestamp    = {Thu, 14 Oct 2021 10:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WenG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/WenG13,
  author       = {Yamin Wen and
                  Zheng Gong},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Dritan Nace and
                  Salvatore Venticinque and
                  Alain Bui},
  title        = {An Unlinkable Secret Handshake with Fuzzy Matching for Social Networks},
  booktitle    = {Eighth International Conference on P2P, Parallel, Grid, Cloud and
                  Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30,
                  2013},
  pages        = {347--353},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/3PGCIC.2013.59},
  doi          = {10.1109/3PGCIC.2013.59},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/3pgcic/WenG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WenZX12,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Lingling Xu},
  title        = {Secret handshakes from ID-based message recovery signatures: {A} new
                  generic approach},
  journal      = {Comput. Electr. Eng.},
  volume       = {38},
  number       = {1},
  pages        = {96--104},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.11.020},
  doi          = {10.1016/J.COMPELECENG.2011.11.020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/WenZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WenZ11,
  author       = {Yamin Wen and
                  Fangguo Zhang},
  title        = {Delegatable secret handshake scheme},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {12},
  pages        = {2284--2292},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2011.06.046},
  doi          = {10.1016/J.JSS.2011.06.046},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/WenZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/WenZ10,
  author       = {Yamin Wen and
                  Fangguo Zhang},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {A New Revocable Secret Handshake Scheme with Backward Unlinkability},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_2},
  doi          = {10.1007/978-3-642-22633-5\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/WenZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics