Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yamin Wen
@article{DBLP:journals/istr/WenGGL23, author = {Yamin Wen and Jinyu Guo and Zheng Gong and Cong Lin}, title = {A new Private Mutual Authentication scheme with group discovery}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103558}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103558}, doi = {10.1016/J.JISA.2023.103558}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WenGGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AnPWZ23, author = {Zhiyuan An and Jing Pan and Yamin Wen and Fangguo Zhang}, title = {Secret handshakes: Full dynamicity, deniability and lattice-based design}, journal = {Theor. Comput. Sci.}, volume = {940}, number = {Part}, pages = {14--35}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2022.10.035}, doi = {10.1016/J.TCS.2022.10.035}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AnPWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiXWZ22, author = {Wanhua Li and Lingling Xu and Yamin Wen and Fangguo Zhang}, title = {Conjunctive multi-key searchable encryption with attribute-based access control for {EHR} systems}, journal = {Comput. Stand. Interfaces}, volume = {82}, pages = {103606}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103606}, doi = {10.1016/J.CSI.2021.103606}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiXWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/WeiGYYW22, author = {Yungen Wei and Zheng Gong and Shunzhi Yang and Kai Ye and Yamin Wen}, title = {EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {3}, pages = {1525--1535}, year = {2022}, url = {https://doi.org/10.1007/s12652-021-03022-1}, doi = {10.1007/S12652-021-03022-1}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/WeiGYYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XieGTWW22, author = {Nanjiang Xie and Zheng Gong and Yufeng Tang and Lei Wang and Yamin Wen}, title = {Protecting White-Box Block Ciphers with Galois/Counter Mode}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888845}, doi = {10.1109/DSC54232.2022.9888845}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/XieGTWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/AnPWZ22, author = {Zhiyuan An and Jing Pan and Yamin Wen and Fangguo Zhang}, editor = {Jung Hee Cheon and Thomas Johansson}, title = {Forward-Secure Revocable Secret Handshakes from Lattices}, booktitle = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, pages = {453--479}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2\_21}, doi = {10.1007/978-3-031-17234-2\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/AnPWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AnZWZ21, author = {Zhiyuan An and Zhuoran Zhang and Yamin Wen and Fangguo Zhang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Lattice-Based Secret Handshakes with Reusable Credentials}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {231--248}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_14}, doi = {10.1007/978-3-030-88052-1\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AnZWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WenZWMG20, author = {Yamin Wen and Fangguo Zhang and Huaxiong Wang and Yinbin Miao and Zheng Gong}, title = {Intersection-policy private mutual authentication from authorized private set intersection}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {2}, pages = {122101}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-9907-x}, doi = {10.1007/S11432-019-9907-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WenZWMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WenZWGMD20, author = {Yamin Wen and Fangguo Zhang and Huaxiong Wang and Zheng Gong and Yinbin Miao and Yuqiao Deng}, title = {A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks}, journal = {Inf. Sci.}, volume = {520}, pages = {142--154}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.02.007}, doi = {10.1016/J.INS.2020.02.007}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WenZWGMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/WeiGYYW20, author = {Yungen Wei and Zheng Gong and Shunzhi Yang and Kai Ye and Yamin Wen}, editor = {Xiaofeng Chen and Hongyang Yan and Qiben Yan and Xiangliang Zhang}, title = {A New Lightweight {CRNN} Model for Keyword Spotting with Edge Computing Devices}, booktitle = {Machine Learning for Cyber Security - Third International Conference, {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12486}, pages = {195--205}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62223-7\_17}, doi = {10.1007/978-3-030-62223-7\_17}, timestamp = {Wed, 11 Nov 2020 16:33:52 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/WeiGYYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/WenGHQ18, author = {Yamin Wen and Zheng Gong and Zhengan Huang and Weidong Qiu}, title = {A new efficient authorized private set intersection protocol from Schnorr signature and its applications}, journal = {Clust. Comput.}, volume = {21}, number = {1}, pages = {287--297}, year = {2018}, url = {https://doi.org/10.1007/s10586-017-0940-2}, doi = {10.1007/S10586-017-0940-2}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/WenGHQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhouSWLG18, author = {Lu Zhou and Chunhua Su and Yamin Wen and Weijie Li and Zheng Gong}, title = {Towards practical white-box lightweight block cipher implementations for IoTs}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {507--514}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.04.011}, doi = {10.1016/J.FUTURE.2018.04.011}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhouSWLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiLWG17, author = {Weijie Li and Guohong Liao and Yamin Wen and Zheng Gong}, title = {SpongeMPH: {A} New Multivariate Polynomial Hash Function based on the Sponge Construction}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {516--520}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.105}, doi = {10.1109/DSC.2017.105}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiLWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/GongLWLQ16, author = {Zheng Gong and Shusheng Liu and Yamin Wen and Yiyuan Luo and Weidong Qiu}, title = {Biclique cryptanalysis using balanced complete bipartite subgraphs}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {4}, pages = {049101:1--049101:3}, year = {2016}, url = {https://doi.org/10.1007/s11432-016-5540-x}, doi = {10.1007/S11432-016-5540-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/GongLWLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/XuZSW16, author = {Lingling Xu and Fangguo Zhang and Willy Susilo and Yamin Wen}, title = {Solutions to the anti-piracy problem in oblivious transfer}, journal = {J. Comput. Syst. Sci.}, volume = {82}, number = {3}, pages = {466--476}, year = {2016}, url = {https://doi.org/10.1016/j.jcss.2015.11.003}, doi = {10.1016/J.JCSS.2015.11.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/XuZSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/ChenZLWG15, author = {Xunjun Chen and Yuelong Zhu and Jiguo Li and Yamin Wen and Zheng Gong}, title = {Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains}, journal = {Inf.}, volume = {6}, number = {2}, pages = {258--274}, year = {2015}, url = {https://doi.org/10.3390/info6020258}, doi = {10.3390/INFO6020258}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/ChenZLWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/WenGX15, author = {Yamin Wen and Zheng Gong and Lingling Xu}, title = {A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model}, journal = {Inf.}, volume = {6}, number = {4}, pages = {576--591}, year = {2015}, url = {https://doi.org/10.3390/info6040576}, doi = {10.3390/INFO6040576}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/WenGX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WenLGT18, author = {Yamin Wen and Fengxia Li and Zheng Gong and Shaohua Tang}, title = {{\unicode{19968}}{\unicode{31181}}AVR{\unicode{29615}}{\unicode{22659}}{\unicode{19979}}KLEIN{\unicode{20998}}{\unicode{32452}}{\unicode{23494}}{\unicode{30721}}{\unicode{25239}}{\unicode{35745}}{\unicode{26102}}{\unicode{21644}}{\unicode{32531}}{\unicode{23384}}{\unicode{36793}}{\unicode{20449}}{\unicode{36947}}{\unicode{25915}}{\unicode{20987}}{\unicode{30340}}{\unicode{24555}}{\unicode{36895}}{\unicode{20445}}{\unicode{25252}}{\unicode{26041}}{\unicode{27861}} (Fast Implementation of {KLEIN} for Resisting Timing and Cache Side-channel Attacks on {AVR)}}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {3}, pages = {148--152}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.03.031}, doi = {10.11896/J.ISSN.1002-137X.2015.03.031}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/WenLGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpsa/WenG14, author = {Yamin Wen and Zheng Gong}, title = {Private mutual authentications with fuzzy matching}, journal = {Int. J. High Perform. Syst. Archit.}, volume = {5}, number = {1}, pages = {3--12}, year = {2014}, url = {https://doi.org/10.1504/IJHPSA.2014.059860}, doi = {10.1504/IJHPSA.2014.059860}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhpsa/WenG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WenG14, author = {Yamin Wen and Zheng Gong}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {A Dynamic Matching Secret Handshake Scheme without Random Oracles}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {409--420}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_31}, doi = {10.1007/978-3-319-11698-3\_31}, timestamp = {Thu, 14 Oct 2021 10:08:32 +0200}, biburl = {https://dblp.org/rec/conf/nss/WenG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/WenG13, author = {Yamin Wen and Zheng Gong}, editor = {Fatos Xhafa and Leonard Barolli and Dritan Nace and Salvatore Venticinque and Alain Bui}, title = {An Unlinkable Secret Handshake with Fuzzy Matching for Social Networks}, booktitle = {Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2013, Compiegne, France, October 28-30, 2013}, pages = {347--353}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/3PGCIC.2013.59}, doi = {10.1109/3PGCIC.2013.59}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/WenG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/WenZX12, author = {Yamin Wen and Fangguo Zhang and Lingling Xu}, title = {Secret handshakes from ID-based message recovery signatures: {A} new generic approach}, journal = {Comput. Electr. Eng.}, volume = {38}, number = {1}, pages = {96--104}, year = {2012}, url = {https://doi.org/10.1016/j.compeleceng.2011.11.020}, doi = {10.1016/J.COMPELECENG.2011.11.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/WenZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WenZ11, author = {Yamin Wen and Fangguo Zhang}, title = {Delegatable secret handshake scheme}, journal = {J. Syst. Softw.}, volume = {84}, number = {12}, pages = {2284--2292}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.06.046}, doi = {10.1016/J.JSS.2011.06.046}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WenZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/WenZ10, author = {Yamin Wen and Fangguo Zhang}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A New Revocable Secret Handshake Scheme with Backward Unlinkability}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {17--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_2}, doi = {10.1007/978-3-642-22633-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/WenZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.