BibTeX records: Tao Wang 0039

download as .bib file

@article{DBLP:journals/istr/LiWQYGWQ21,
  author    = {Haiyu Li and
               Tao Wang and
               Zirui Qiao and
               Bo Yang and
               Yueyang Gong and
               Jingyi Wang and
               Guoyong Qiu},
  title     = {Blockchain-based searchable encryption with efficient result verification
               and fair payment},
  journal   = {J. Inf. Secur. Appl.},
  volume    = {58},
  pages     = {102791},
  year      = {2021},
  url       = {https://doi.org/10.1016/j.jisa.2021.102791},
  doi       = {10.1016/j.jisa.2021.102791},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/istr/LiWQYGWQ21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouYWXH20,
  author    = {Yanwei Zhou and
               Bo Yang and
               Tao Wang and
               Zhe Xia and
               Hong{-}xia Hou},
  title     = {Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without
               Bilinear Pairings},
  journal   = {Comput. J.},
  volume    = {63},
  number    = {4},
  pages     = {508--524},
  year      = {2020},
  url       = {https://doi.org/10.1093/comjnl/bxz085},
  doi       = {10.1093/comjnl/bxz085},
  timestamp = {Wed, 10 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cj/ZhouYWXH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhouYWM20,
  author    = {Yanwei Zhou and
               Bo Yang and
               Tao Wang and
               Yi Mu},
  title     = {Novel updatable identity-based hash proof system and its applications},
  journal   = {Theor. Comput. Sci.},
  volume    = {804},
  pages     = {1--28},
  year      = {2020},
  url       = {https://doi.org/10.1016/j.tcs.2019.10.031},
  doi       = {10.1016/j.tcs.2019.10.031},
  timestamp = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tcs/ZhouYWM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouYHZWH19,
  author    = {Yanwei Zhou and
               Bo Yang and
               Hong{-}xia Hou and
               Lina Zhang and
               Tao Wang and
               Mingxiao Hu},
  title     = {Continuous Leakage-Resilient Identity-Based Encryption with Tight
               Security},
  journal   = {Comput. J.},
  volume    = {62},
  number    = {8},
  pages     = {1092--1105},
  year      = {2019},
  url       = {https://doi.org/10.1093/comjnl/bxy144},
  doi       = {10.1093/comjnl/bxy144},
  timestamp = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cj/ZhouYHZWH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhouYMWW19,
  author    = {Yanwei Zhou and
               Bo Yang and
               Yi Mu and
               Tao Wang and
               Xin Wang},
  title     = {Identity-based encryption resilient to continuous key leakage},
  journal   = {{IET} Inf. Secur.},
  volume    = {13},
  number    = {5},
  pages     = {426--434},
  year      = {2019},
  url       = {https://doi.org/10.1049/iet-ifs.2018.5203},
  doi       = {10.1049/iet-ifs.2018.5203},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-ifs/ZhouYMWW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangYQZYZG19,
  author    = {Tao Wang and
               Bo Yang and
               Guoyong Qiu and
               Lina Zhang and
               Yong Yu and
               Yanwei Zhou and
               Juncai Guo},
  title     = {An Approach Enabling Various Queries on Encrypted Industrial Data
               Stream},
  journal   = {Secur. Commun. Networks},
  volume    = {2019},
  pages     = {6293970:1--6293970:12},
  year      = {2019},
  url       = {https://doi.org/10.1155/2019/6293970},
  doi       = {10.1155/2019/6293970},
  timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/WangYQZYZG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhouYXMW19,
  author    = {Yanwei Zhou and
               Bo Yang and
               Zhe Xia and
               Yi Mu and
               Tao Wang},
  title     = {Anonymous and Updatable Identity-Based Hash Proof System},
  journal   = {{IEEE} Syst. J.},
  volume    = {13},
  number    = {3},
  pages     = {2818--2829},
  year      = {2019},
  url       = {https://doi.org/10.1109/JSYST.2018.2878215},
  doi       = {10.1109/JSYST.2018.2878215},
  timestamp = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/sj/ZhouYXMW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangYLYQX19,
  author    = {Tao Wang and
               Bo Yang and
               Hongyu Liu and
               Yong Yu and
               Guoyong Qiu and
               Zhe Xia},
  title     = {An alternative approach to public cloud data auditing supporting data
               dynamics},
  journal   = {Soft Comput.},
  volume    = {23},
  number    = {13},
  pages     = {4939--4953},
  year      = {2019},
  url       = {https://doi.org/10.1007/s00500-018-3155-4},
  doi       = {10.1007/s00500-018-3155-4},
  timestamp = {Fri, 30 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/soco/WangYLYQX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics