Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rongmao Chen
@article{DBLP:journals/isci/JinQCYW24, author = {Renjie Jin and Longjiang Qu and Rongmao Chen and Zhichao Yang and Yi Wang}, title = {A lattice-based forward secure {IBE} scheme for Internet of things}, journal = {Inf. Sci.}, volume = {660}, pages = {120083}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.120083}, doi = {10.1016/J.INS.2023.120083}, timestamp = {Thu, 14 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/JinQCYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BemmannBC24, author = {Pascal Bemmann and Sebastian Berndt and Rongmao Chen}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Subversion-Resilient Signatures Without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {351--375}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_14}, doi = {10.1007/978-3-031-54770-6\_14}, timestamp = {Mon, 11 Mar 2024 15:20:49 +0100}, biburl = {https://dblp.org/rec/conf/acns/BemmannBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiuSLCHKF23, author = {Lin Liu and Jinshu Su and Ximeng Liu and Rongmao Chen and Xinyi Huang and Guang Kou and Shaojing Fu}, title = {Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {3211--3225}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3269510}, doi = {10.1109/TCC.2023.3269510}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/LiuSLCHKF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangCHY23, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Moti Yung}, editor = {Jian Guo and Ron Steinfeld}, title = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14443}, pages = {135--167}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8736-8\_5}, doi = {10.1007/978-981-99-8736-8\_5}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangCHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangCWWP23, author = {Hang Yang and Rongmao Chen and Qiong Wang and Zixuan Wu and Wei Peng}, editor = {Chunpeng Ge and Moti Yung}, title = {Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {111--129}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_7}, doi = {10.1007/978-981-97-0945-8\_7}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YangCWWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SongLCPW23, author = {Shang Song and Lin Liu and Rongmao Chen and Wei Peng and Yi Wang}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {411--430}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_21}, doi = {10.1007/978-3-031-51479-1\_21}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SongLCPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BemmannBC23, author = {Pascal Bemmann and Sebastian Berndt and Rongmao Chen}, title = {Subversion-Resilient Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1491}, year = {2023}, url = {https://eprint.iacr.org/2023/1491}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BemmannBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCHY23, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Moti Yung}, title = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1828}, year = {2023}, url = {https://eprint.iacr.org/2023/1828}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangCHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/WangCLWW22, author = {Yi Wang and Rongmao Chen and Chi Liu and Baosheng Wang and Yongjun Wang}, title = {Asymmetric subversion attacks on signature and identification schemes}, journal = {Pers. Ubiquitous Comput.}, volume = {26}, number = {3}, pages = {849--862}, year = {2022}, url = {https://doi.org/10.1007/s00779-018-01193-x}, doi = {10.1007/S00779-018-01193-X}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/WangCLWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenLCPH22, author = {Jinrong Chen and Lin Liu and Rongmao Chen and Wei Peng and Xinyi Huang}, title = {SecRec: {A} Privacy-Preserving Method for the Context-Aware Recommendation System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3168--3182}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3085562}, doi = {10.1109/TDSC.2021.3085562}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenLCPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangCHW22, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Baosheng Wang}, title = {Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3837--3854}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3107463}, doi = {10.1109/TDSC.2021.3107463}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangCHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/LiuYSTCL22, author = {Xueqiao Liu and Guomin Yang and Willy Susilo and Joseph Tonien and Rongmao Chen and Xixiang Lv}, title = {Message-Locked Searchable Encryption: {A} New Versatile Tool for Secure Cloud Storage}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1664--1677}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3006532}, doi = {10.1109/TSC.2020.3006532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/LiuYSTCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/LinCWWL22, author = {Yuliang Lin and Rongmao Chen and Yi Wang and Baosheng Wang and Lin Liu}, editor = {Xiaofeng Chen and Jian Shen and Willy Susilo}, title = {Substitution Attacks Against Sigma Protocols}, booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS} 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13547}, pages = {192--208}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18067-5\_14}, doi = {10.1007/978-3-031-18067-5\_14}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/LinCWWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiaCSZ21, author = {Yusheng Xia and Rongmao Chen and Jinshu Su and Hongcheng Zou}, title = {Balancing anonymity and resilience in anonymous communication networks}, journal = {Comput. Secur.}, volume = {101}, pages = {102106}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102106}, doi = {10.1016/J.COSE.2020.102106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiaCSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaSCH21, author = {Yusheng Xia and Jinshu Su and Rongmao Chen and Xinyi Huang}, title = {{APGS:} An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1245--1260}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3032294}, doi = {10.1109/TIFS.2020.3032294}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaSCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangCHNWY21, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Jianting Ning and Baosheng Wang and Moti Yung}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure {IBE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {427--455}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_15}, doi = {10.1007/978-3-030-92075-3\_15}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangCHNWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangCYHWY21, author = {Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung}, editor = {Tal Malkin and Chris Peikert}, title = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {270--300}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_10}, doi = {10.1007/978-3-030-84259-8\_10}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangCYHWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BemmannCJ21, author = {Pascal Bemmann and Rongmao Chen and Tibor Jager}, editor = {Juan A. Garay}, title = {Subversion-Resilient Public Key Encryption with Practical Watchdogs}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {627--658}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_23}, doi = {10.1007/978-3-030-75245-3\_23}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BemmannCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BemmannCJ21, author = {Pascal Bemmann and Rongmao Chen and Tibor Jager}, title = {Subversion-Resilient Public Key Encryption with Practical Watchdogs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2021}, url = {https://eprint.iacr.org/2021/230}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BemmannCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCYHWY21, author = {Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung}, title = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {862}, year = {2021}, url = {https://eprint.iacr.org/2021/862}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangCYHWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCHNWY21, author = {Yi Wang and Rongmao Chen and Xinyi Huang and Jianting Ning and Baosheng Wang and Moti Yung}, title = {Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1261}, year = {2021}, url = {https://eprint.iacr.org/2021/1261}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangCHNWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangCLQY20, author = {Zhichao Yang and Rongmao Chen and Chao Li and Longjiang Qu and Guomin Yang}, title = {On the Security of {LWE} Cryptosystem against Subversion Attacks}, journal = {Comput. J.}, volume = {63}, number = {4}, pages = {495--507}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz084}, doi = {10.1093/COMJNL/BXZ084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangCLQY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangDSYLC20, author = {Zhichao Yang and Dung Hoang Duong and Willy Susilo and Guomin Yang and Chao Li and Rongmao Chen}, title = {Hierarchical Identity-Based Signature in Polynomial Rings}, journal = {Comput. J.}, volume = {63}, number = {10}, pages = {1490--1499}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxaa033}, doi = {10.1093/COMJNL/BXAA033}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangDSYLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/LvWSCW20, author = {Jiaxian Lv and Yi Wang and Jinshu Su and Rongmao Chen and Wenjun Wu}, title = {Security of Auditing Protocols Against Subversion Attacks}, journal = {Int. J. Found. Comput. Sci.}, volume = {31}, number = {2}, pages = {193--206}, year = {2020}, url = {https://doi.org/10.1142/S0129054120500033}, doi = {10.1142/S0129054120500033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/LvWSCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiCSHW20, author = {Jie Li and Rongmao Chen and Jinshu Su and Xinyi Huang and Xiaofeng Wang}, title = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {2}, pages = {1216--1229}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2953715}, doi = {10.1109/JIOT.2019.2953715}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiCSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WuYMCX20, author = {Tong Wu and Guomin Yang and Yi Mu and Rongmao Chen and Shengmin Xu}, title = {Privacy-enhanced remote data integrity checking with updatable timestamp}, journal = {Inf. Sci.}, volume = {527}, pages = {210--226}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.03.057}, doi = {10.1016/J.INS.2020.03.057}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WuYMCX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCLSQ20, author = {Lin Liu and Rongmao Chen and Ximeng Liu and Jinshu Su and Linbo Qiao}, title = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2914--2929}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980192}, doi = {10.1109/TIFS.2020.2980192}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenLCP20, author = {Jinrong Chen and Lin Liu and Rongmao Chen and Wei Peng}, editor = {Joseph K. Liu and Hui Cui}, title = {{SHOSVD:} Secure Outsourcing of High-Order Singular Value Decomposition}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {309--329}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_16}, doi = {10.1007/978-3-030-55304-3\_16}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenLCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenHY20, author = {Rongmao Chen and Xinyi Huang and Moti Yung}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks on Public-Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {98--128}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_4}, doi = {10.1007/978-3-030-64834-3\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XiaCSPS20, author = {Yusheng Xia and Rongmao Chen and Jinshu Su and Chen Pan and Han Su}, title = {Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149166}, doi = {10.1109/ICC40277.2020.9149166}, timestamp = {Tue, 04 Aug 2020 10:37:23 +0200}, biburl = {https://dblp.org/rec/conf/icc/XiaCSPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHY20, author = {Rongmao Chen and Xinyi Huang and Moti Yung}, title = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks on Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1079}, year = {2020}, url = {https://eprint.iacr.org/2020/1079}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiSCWC19, author = {Jie Li and Jinshu Su and Rongmao Chen and Xiaofeng Wang and Shuhui Chen}, title = {Practical privacy-preserving deep packet inspection outsourcing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.4435}, doi = {10.1002/CPE.4435}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiSCWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YangCMSGL19, author = {Guomin Yang and Rongmao Chen and Yi Mu and Willy Susilo and Fuchun Guo and Jie Li}, title = {Strongly leakage resilient authenticated key exchange, revisited}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2885--2911}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00656-3}, doi = {10.1007/S10623-019-00656-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YangCMSGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuSLCHDW19, author = {Lin Liu and Jinshu Su and Ximeng Liu and Rongmao Chen and Kai Huang and Robert H. Deng and Xiaofeng Wang}, title = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on Outsourced Cloud Data}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {6}, pages = {9841--9852}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2932444}, doi = {10.1109/JIOT.2019.2932444}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JiangLGSAYMC19, author = {Peng Jiang and Jianchang Lai and Fuchun Guo and Willy Susilo and Man Ho Au and Guomin Yang and Yi Mu and Rongmao Chen}, title = {Identity-based revocation system: Enhanced security model and scalable bounded {IBRS} construction with short parameters}, journal = {Inf. Sci.}, volume = {472}, pages = {35--52}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.09.020}, doi = {10.1016/J.INS.2018.09.020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JiangLGSAYMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWC19, author = {Baosheng Wang and Yi Wang and Rongmao Chen}, title = {A Practical Authentication Framework for VANETs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4752612:1--4752612:11}, year = {2019}, url = {https://doi.org/10.1155/2019/4752612}, doi = {10.1155/2019/4752612}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiuSCCSL19, author = {Lin Liu and Jinshu Su and Rongmao Chen and Jinrong Chen and Guangliang Sun and Jie Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {361--377}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_26}, doi = {10.1007/978-3-030-30619-9\_26}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/LiuSCCSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LaiMGCM18, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Rongmao Chen and Sha Ma}, title = {Efficient \emph{k}-out-of-\emph{n} oblivious transfer scheme with the ideal communication cost}, journal = {Theor. Comput. Sci.}, volume = {714}, pages = {15--26}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2017.12.019}, doi = {10.1016/J.TCS.2017.12.019}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LaiMGCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuCWW18, author = {Chi Liu and Rongmao Chen and Yi Wang and Yongjun Wang}, editor = {Willy Susilo and Guomin Yang}, title = {Asymmetric Subversion Attacks on Signature Schemes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {376--395}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_22}, doi = {10.1007/978-3-319-93638-3\_22}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18, author = {Lin Liu and Jinshu Su and Rongmao Chen and Ximeng Liu and Xiaofeng Wang and Shuhui Chen and Ho{-}fung Leung}, editor = {Willy Susilo and Guomin Yang}, title = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {431--451}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_25}, doi = {10.1007/978-3-319-93638-3\_25}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/XiaSCLC18, author = {Yusheng Xia and Jinshu Su and Rongmao Chen and Yaping Liu and Shuhui Chen}, title = {A Real-Time Aware Routing Strategy in Smart City Environments}, booktitle = {2018 {IEEE} International Conference on Sensing, Communication and Networking, {SECON} Workshops 2018, Hong Kong, Hong Kong, June 11, 2018}, pages = {9--14}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SECONW.2018.8396343}, doi = {10.1109/SECONW.2018.8396343}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secon/XiaSCLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TianLCLLCY18, author = {Yangguang Tian and Yingjiu Li and Rongmao Chen and Nan Li and Ximeng Liu and Bing Chang and Xingjie Yu}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {112--132}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_7}, doi = {10.1007/978-3-030-01701-9\_7}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/TianLCLLCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LaiMGC17, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Rongmao Chen}, title = {Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization}, journal = {Comput. J.}, volume = {60}, number = {12}, pages = {1809--1821}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxx060}, doi = {10.1093/COMJNL/BXX060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LaiMGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WangMC17, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {Privacy-preserving data search and sharing protocol for social networks through wireless applications}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {7}, year = {2017}, url = {https://doi.org/10.1002/cpe.3870}, doi = {10.1002/CPE.3870}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/WangMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMYSG17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strong authenticated key exchange with auxiliary inputs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {145--173}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0295-3}, doi = {10.1007/S10623-016-0295-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMYSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMYSGZ17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Zheng Yang}, title = {A note on the strong authenticated key exchange with auxiliary inputs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {175--178}, year = {2017}, url = {https://doi.org/10.1007/s10623-017-0386-9}, doi = {10.1007/S10623-017-0386-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMYSGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/LaiMGSC17, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Willy Susilo and Rongmao Chen}, title = {Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city}, journal = {Pers. Ubiquitous Comput.}, volume = {21}, number = {5}, pages = {855--868}, year = {2017}, url = {https://doi.org/10.1007/s00779-017-1045-x}, doi = {10.1007/S00779-017-1045-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/LaiMGSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/WangMC17, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {Privacy-Preserving Data Packet Filtering Protocol with Source {IP} Authentication}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {4}, pages = {3509--3537}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4010-0}, doi = {10.1007/S11277-017-4010-0}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/WangMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunSWCLH17, author = {Hao Sun and Jinshu Su and Xiaofeng Wang and Rongmao Chen and Yujing Liu and Qiaolin Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {153--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_9}, doi = {10.1007/978-3-319-59870-3\_9}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoCSLYM17, author = {Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {517--547}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_18}, doi = {10.1007/978-3-319-63715-0\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuoCSLYM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GrittiCSP17, author = {Cl{\'{e}}mentine Gritti and Rongmao Chen and Willy Susilo and Thomas Plantard}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {485--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_29}, doi = {10.1007/978-3-319-72359-4\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GrittiCSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08434, author = {Cl{\'{e}}mentine Gritti and Rongmao Chen and Willy Susilo and Thomas Plantard}, title = {Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy}, journal = {CoRR}, volume = {abs/1709.08434}, year = {2017}, url = {http://arxiv.org/abs/1709.08434}, eprinttype = {arXiv}, eprint = {1709.08434}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSG17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strong Authenticated Key Exchange with Auxiliary Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2017}, url = {http://eprint.iacr.org/2017/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoCSLYM17, author = {Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu}, title = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with {A} Counterexample}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2017}, url = {http://eprint.iacr.org/2017/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoCSLYM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/WangMCZ16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen and Xiaosong Zhang}, title = {Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {5}, pages = {1012--1027}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1676-9}, doi = {10.1007/S11390-016-1676-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/WangMCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangMC16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {An efficient privacy-preserving aggregation and billing protocol for smart grid}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4536--4547}, year = {2016}, url = {https://doi.org/10.1002/sec.1645}, doi = {10.1002/SEC.1645}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYGW16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, title = {Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {789--798}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510822}, doi = {10.1109/TIFS.2015.2510822}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangMC16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1712--1721}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2549508}, doi = {10.1109/TIFS.2016.2549508}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYGHWW16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xinyi Huang and Xiaofen Wang and Yongjun Wang}, title = {Server-Aided Public Key Encryption With Keyword Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2833--2842}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2599293}, doi = {10.1109/TIFS.2016.2599293}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYGHWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16, author = {Rongmao Chen and Yi Mu and Willy Susilo and Guomin Yang and Fuchun Guo and Mingwu Zhang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {One-Round Strong Oblivious Signature-Based Envelope}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {3--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_1}, doi = {10.1007/978-3-319-40367-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiMGSC16, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Willy Susilo and Rongmao Chen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {223--239}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_14}, doi = {10.1007/978-3-319-40367-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiMGSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoSMCLY16, author = {Fuchun Guo and Willy Susilo and Yi Mu and Rongmao Chen and Jianchang Lai and Guomin Yang}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in Security Reduction}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {745--776}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_25}, doi = {10.1007/978-3-662-53890-6\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoSMCLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenMYSGZ16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {844--876}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_31}, doi = {10.1007/978-3-662-53887-6\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenMYSGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SusiloCGYMC16, author = {Willy Susilo and Rongmao Chen and Fuchun Guo and Guomin Yang and Yi Mu and Yang{-}Wai Chow}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in {IBBE} without Knowledge of the Plaintext}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {201--210}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897848}, doi = {10.1145/2897845.2897848}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SusiloCGYMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChenMYSG16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, editor = {Kazue Sako}, title = {Strongly Leakage-Resilient Authenticated Key Exchange}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {19--36}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_2}, doi = {10.1007/978-3-319-29485-8\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChenMYSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/JiangWLGC16, author = {Peng Jiang and Xiaofen Wang and Jianchang Lai and Fuchun Guo and Rongmao Chen}, editor = {Liqun Chen and Jinguang Han}, title = {Oblivious Keyword Search with Authorization}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {173--190}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_10}, doi = {10.1007/978-3-319-47422-9\_10}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/JiangWLGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSG16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strongly Leakage-Resilient Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2016}, url = {http://eprint.iacr.org/2016/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoSMCLY16, author = {Fuchun Guo and Willy Susilo and Yi Mu and Rongmao Chen and Jianchang Lai and Guomin Yang}, title = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2016}, url = {http://eprint.iacr.org/2016/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoSMCLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSGZ16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang}, title = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2016}, url = {http://eprint.iacr.org/2016/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYG15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo}, title = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File Deduplication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2643--2652}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2470221}, doi = {10.1109/TIFS.2015.2470221}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMYGW15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, editor = {Ernest Foo and Douglas Stebila}, title = {A New General Framework for Secure Public Key Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {59--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_4}, doi = {10.1007/978-3-319-19962-7\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.