BibTeX records: Tianjie Cao

download as .bib file

@article{DBLP:journals/mis/PengC21,
  author       = {Fei Peng and
                  Tianjie Cao},
  title        = {Software-Defined Network Resource Optimization of the Data Center
                  Based on {P4} Programming Language},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {3601104:1--3601104:7},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/3601104},
  doi          = {10.1155/2021/3601104},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/PengC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChenCDZ17,
  author       = {Xiuqing Chen and
                  Tianjie Cao and
                  Robin Doss and
                  Jingxuan Zhai},
  title        = {Attacks on and Countermeasures for Two {RFID} Protocols},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {4},
  pages        = {5825--5848},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4449-z},
  doi          = {10.1007/S11277-017-4449-Z},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ChenCDZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CaoCDZWZ16,
  author       = {Tianjie Cao and
                  Xiuqing Chen and
                  Robin Doss and
                  Jingxuan Zhai and
                  Lucas J. Wise and
                  Qiang Zhao},
  title        = {{RFID} ownership transfer protocol based on cloud},
  journal      = {Comput. Networks},
  volume       = {105},
  pages        = {47--59},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.05.017},
  doi          = {10.1016/J.COMNET.2016.05.017},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CaoCDZWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WuCZ15,
  author       = {Jijie Wu and
                  Tianjie Cao and
                  Jingxuan Zhai},
  title        = {BlindLock: {\unicode{19968}}{\unicode{31181}}{\unicode{26377}}{\unicode{25928}}{\unicode{38450}}{\unicode{33539}}{\unicode{27745}}{\unicode{36857}}{\unicode{25915}}{\unicode{20987}}{\unicode{30340}}{\unicode{22270}}{\unicode{26696}}{\unicode{38145}}{\unicode{31995}}{\unicode{32479}}
                  (BlindLock: An Effective Pattern Lock System Against Smudge Attack)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {{Z11}},
  pages        = {364--367},
  year         = {2015},
  url          = {http://www.jsjkx.com/CN/Y2015/V42/IZ11/364},
  doi          = {Y2015/V42/IZ11/364},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WuCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/ChenCZLG14,
  author       = {Xiuqing Chen and
                  Tianjie Cao and
                  Mingxiang Zhu and
                  Wenzhuo Liu and
                  Yu Guo},
  title        = {Traceability Attack Algorithm on {EOHLCAP} {RFID} Authentication Protocol},
  journal      = {J. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {938--946},
  year         = {2014},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=83\&\#38;id=1160},
  doi          = {10.4304/JCP.9.4.938-946},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/ChenCZLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/ZhuCJ14,
  author       = {Mingxiang Zhu and
                  Tianjie Cao and
                  Xiangying Jiang},
  title        = {Using clustering coefficient to construct weighted networks for supervised
                  link prediction},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {4},
  number       = {1},
  pages        = {215},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13278-014-0215-3},
  doi          = {10.1007/S13278-014-0215-3},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/ZhuCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/CaoZ13,
  author       = {Tianjie Cao and
                  Jingxuan Zhai},
  title        = {Improved Dynamic ID-based Authentication Scheme for Telecare Medical
                  Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {37},
  number       = {2},
  pages        = {9912},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10916-012-9912-5},
  doi          = {10.1007/S10916-012-9912-5},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/CaoZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiC11,
  author       = {Hui Cui and
                  Tianjie Cao},
  title        = {A Secure Anonymous Identity-based Key Agreement Protocol for Distributed
                  Computer Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1337--1343},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1337-1343},
  doi          = {10.4304/JNW.6.9.1337-1343},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/CuiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/BaoCZ11,
  author       = {Yu Bao and
                  Tianjie Cao and
                  Guosun Zeng},
  title        = {Multistage Filtering for Collusion Detection in {P2P} Network},
  booktitle    = {{IEEE} Ninth International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia},
  pages        = {911--916},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DASC.2011.152},
  doi          = {10.1109/DASC.2011.152},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/BaoCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdma/DingC11,
  author       = {Fang Ding and
                  Tianjie Cao},
  title        = {Application of Daubechies Wavelet Transform in the Estimation of Standard
                  Deviation of White Noise},
  booktitle    = {Second International Conference on Digital Manufacturing and Automation,
                  {ICDMA} 2011, Zhangjiajie, Hunan, China, August 5-7, 2011},
  pages        = {212--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDMA.2011.59},
  doi          = {10.1109/ICDMA.2011.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdma/DingC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/BaoCZ11,
  author       = {Yu Bao and
                  Tianjie Cao and
                  Guosun Zeng},
  editor       = {Sumitra Reddy and
                  Samir Tata},
  title        = {Resisting Collusion by Game in Culture Web},
  booktitle    = {20th {IEEE} International Workshops on Enabling Technologies: Infrastructures
                  for Collaborative Enterprises, {WETICE} 2011, Paris, France, 27-29
                  June 2011, Proceedings},
  pages        = {262--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WETICE.2011.45},
  doi          = {10.1109/WETICE.2011.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/BaoCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/GaoC10,
  author       = {Yuhang Gao and
                  Tianjie Cao},
  title        = {Memory Forensics for {QQ} from a Live System},
  journal      = {J. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {541--548},
  year         = {2010},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=128\&\#38;id=1861},
  doi          = {10.4304/JCP.5.4.541-548},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/GaoC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoS09,
  author       = {Tianjie Cao and
                  Peng Shen},
  title        = {Cryptanalysis of Two {RFID} Authentication Protocols},
  journal      = {Int. J. Netw. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {95--100},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n1/ijns-2009-v9-n1-p95-100.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/ZhaoC09,
  author       = {Qian Zhao and
                  Tianjie Cao},
  title        = {Collecting Sensitive Information from Windows Physical Memory},
  journal      = {J. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {3--10},
  year         = {2009},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=108\&\#38;id=1717},
  doi          = {10.4304/JCP.4.1.3-10},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/ZhaoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/CaoHCWL09,
  author       = {Tianjie Cao and
                  Shi Huang and
                  Hui Cui and
                  Yipeng Wu and
                  Qihan Luo},
  title        = {Controlled Secret Leakage},
  journal      = {J. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {61--68},
  year         = {2009},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=108\&\#38;id=1734},
  doi          = {10.4304/JCP.4.1.61-68},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/CaoHCWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoQZ09,
  author       = {Tianjie Cao and
                  Tao Quan and
                  Bo Zhang},
  title        = {Cryptanalysis of Some Client-to-Client Password-Authenticated Key
                  Exchange Protocols},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {263--270},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.263-270},
  doi          = {10.4304/JNW.4.4.263-270},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaoQZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiC09,
  author       = {Hui Cui and
                  Tianjie Cao},
  title        = {An Novel Anonymous Authenticated and Key Exchange Protocol},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {985--992},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.985-992},
  doi          = {10.4304/JNW.4.10.985-992},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/CuiC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaoBL09,
  author       = {Tianjie Cao and
                  Elisa Bertino and
                  Hong Lei},
  title        = {Security Analysis of the {SASI} Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {6},
  number       = {1},
  pages        = {73--77},
  year         = {2009},
  url          = {https://doi.org/10.1109/TDSC.2008.32},
  doi          = {10.1109/TDSC.2008.32},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaoBL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/CaoSB08,
  author       = {Tianjie Cao and
                  Peng Shen and
                  Elisa Bertino},
  title        = {Cryptanalysis of Some {RFID} Authentication Protocols},
  journal      = {J. Commun.},
  volume       = {3},
  number       = {7},
  pages        = {20--27},
  year         = {2008},
  url          = {https://doi.org/10.4304/jcm.3.7.20-27},
  doi          = {10.4304/JCM.3.7.20-27},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/CaoSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscsct/CaoHL08,
  author       = {Tianjie Cao and
                  Tao He and
                  Qihan Luo},
  title        = {Smart-Phone Based Server-Aided Computation},
  booktitle    = {2008 International Symposium on Computer Science and Computational
                  Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2
                  Volumes},
  pages        = {295--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCSCT.2008.75},
  doi          = {10.1109/ISCSCT.2008.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscsct/CaoHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isecs/CaoSB08,
  author       = {Tianjie Cao and
                  Peng Shen and
                  Elisa Bertino},
  editor       = {Fei Yu and
                  Qi Luo and
                  Yongjun Chen and
                  Zhigang Chen},
  title        = {Cryptanalysis of the {LCSS} {RFID} Authentication Protocol},
  booktitle    = {Proceedings of The International Symposium on Electronic Commerce
                  and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  pages        = {305--309},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISECS.2008.73},
  doi          = {10.1109/ISECS.2008.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isecs/CaoSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoM07,
  author       = {Tianjie Cao and
                  Xianping Mao},
  title        = {Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy
                  Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {355--360},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p355-360.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/ZhangWC07,
  author       = {Yongping Zhang and
                  Wei Wei and
                  Tianjie Cao},
  editor       = {Kevin Chen{-}Chuan Chang and
                  Wei Wang and
                  Lei Chen and
                  Clarence A. Ellis and
                  Ching{-}Hsien Hsu and
                  Ah Chung Tsoi and
                  Haixun Wang},
  title        = {Improvement of an Authenticated Key Agreement Protocol},
  booktitle    = {Advances in Web and Network Technologies, and Information Management,
                  APWeb/WAIM 2007 International Workshops: {DBMAN} 2007, WebETrends
                  2007, {PAIS} 2007 and {ASWAN} 2007, Huang Shan, China, June 16-18,
                  2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4537},
  pages        = {593--601},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72909-9\_66},
  doi          = {10.1007/978-3-540-72909-9\_66},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/ZhangWC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaoHCWL07,
  author       = {Tianjie Cao and
                  Shi Huang and
                  Hui Cui and
                  Yipeng Wu and
                  Qihan Luo},
  title        = {Controlled Secret Leakage},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {868--872},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.79},
  doi          = {10.1109/CIS.2007.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaoHCWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/LeiC07,
  author       = {Hong Lei and
                  Tianjie Cao},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Richard Chbeir and
                  Albert Dipanda},
  title        = {Cryptanalysis of {SPA} Protocol},
  booktitle    = {Third International {IEEE} Conference on Signal-Image Technologies
                  and Internet-Based System, {SITIS} 2007, Shanghai, China, December
                  16-18, 2007},
  pages        = {1049--1052},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SITIS.2007.51},
  doi          = {10.1109/SITIS.2007.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/LeiC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/CaoL06,
  author       = {Tianjie Cao and
                  Dongdai Lin},
  title        = {Cryptanalysis of two password authenticated key exchange protocols
                  based on {RSA}},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {10},
  number       = {8},
  pages        = {623--625},
  year         = {2006},
  url          = {https://doi.org/10.1109/LCOMM.2006.1665131},
  doi          = {10.1109/LCOMM.2006.1665131},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/CaoL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoLX06,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {Security Analysis of Some Batch Verifying Signatures from Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {138--143},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p138-143.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoLX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaoML06,
  author       = {Tianjie Cao and
                  Xianping Mao and
                  Dongdai Lin},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Security Analysis of a Server-Aided {RSA} Key Generation Protocol},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {314--320},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_29},
  doi          = {10.1007/11689522\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CaoML06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoLX05,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {A randomized RSA-based partially blind signature scheme for electronic
                  cash},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {44--49},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2004.05.008},
  doi          = {10.1016/J.COSE.2004.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoLX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CaoLX05,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {An Efficient ID-Based Deniable Authentication Protocol from Pairings},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {388--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.100},
  doi          = {10.1109/AINA.2005.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CaoLX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CaoLX05a,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  title        = {ID-Based Ring Authenticated Encryption},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {591--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.203},
  doi          = {10.1109/AINA.2005.203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CaoLX05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaoLX05,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Universal Designated-Verifier Proxy Blind Signatures for E-Commerce},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {1036--1041},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_154},
  doi          = {10.1007/11596981\_154},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaoLX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CaoL05,
  author       = {Tianjie Cao and
                  Dongdai Lin},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Security Analysis of Some Threshold Signature Schemes and Multi-signature
                  Schemes},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {233--241},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_20},
  doi          = {10.1007/11599548\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CaoL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WuZC05,
  author       = {Ying Wu and
                  Yongping Zhang and
                  Tianjie Cao},
  editor       = {Hamid R. Arabnia},
  title        = {Security Analysis of {A} Proxy Signature Scheme Based on the Elliptic
                  Curve Cryptosystem},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {58--64},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WuZC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awcc/CaoLX04,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  editor       = {Chi{-}Hung Chi and
                  Kwok{-}Yan Lam},
  title        = {Security Analysis of User Efficient Blind Signatures},
  booktitle    = {Content Computing, Advanced Workshop on Content Computing, {AWCC}
                  2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3309},
  pages        = {167--172},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30483-8\_21},
  doi          = {10.1007/978-3-540-30483-8\_21},
  timestamp    = {Sun, 02 Jun 2019 21:13:11 +0200},
  biburl       = {https://dblp.org/rec/conf/awcc/CaoLX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awcc/CaoLX04a,
  author       = {Tianjie Cao and
                  Dongdai Lin and
                  Rui Xue},
  editor       = {Chi{-}Hung Chi and
                  Kwok{-}Yan Lam},
  title        = {Improved Privacy-Protecting Proxy Signature Scheme},
  booktitle    = {Content Computing, Advanced Workshop on Content Computing, {AWCC}
                  2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3309},
  pages        = {208--213},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30483-8\_25},
  doi          = {10.1007/978-3-540-30483-8\_25},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/awcc/CaoLX04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics