BibTeX records: Jian-bin Hu

download as .bib file

@inproceedings{DBLP:conf/sose/YuTHLHD17,
  author       = {Lian Yu and
                  Wei{-}Tek Tsai and
                  Chenjian Hu and
                  Baijie Li and
                  Jian{-}bin Hu and
                  Enyan Deng},
  title        = {Modeling Context-aware Legal Computing with Bigraphs},
  booktitle    = {2017 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE}
                  2017, San Francisco, CA, USA, April 6-9, 2017},
  pages        = {145--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SOSE.2017.31},
  doi          = {10.1109/SOSE.2017.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/YuTHLHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfi/MengCHG16,
  author       = {Hongwei Meng and
                  Zhong Chen and
                  Jian{-}bin Hu and
                  Zhi Guan},
  title        = {Establish the Intrinsic Binding in Naming Space for Future Internet
                  Using Combined Public Key},
  booktitle    = {Proceedings of the 11th International Conference on Future Internet
                  Technologies, {CFI} 2016, Nanjing, China, June 15-17, 2016},
  pages        = {62--68},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2935663.2935676},
  doi          = {10.1145/2935663.2935676},
  timestamp    = {Tue, 06 Nov 2018 16:57:06 +0100},
  biburl       = {https://dblp.org/rec/conf/cfi/MengCHG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/LiTHC15,
  author       = {Zhou Li and
                  Cong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Making Tagging Systems Resistant to Tricky Spam Attacks},
  booktitle    = {2015 {IEEE} 12th Intl Conf on Ubiquitous Intelligence and Computing
                  and 2015 {IEEE} 12th Intl Conf on Autonomic and Trusted Computing
                  and 2015 {IEEE} 15th Intl Conf on Scalable Computing and Communications
                  and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August
                  10-14, 2015},
  pages        = {871--879},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.169},
  doi          = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP.2015.169},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/LiTHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/LiTHC15a,
  author       = {Zhou Li and
                  Cong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Vulnerabilities Scoring Approach for Cloud SaaS},
  booktitle    = {2015 {IEEE} 12th Intl Conf on Ubiquitous Intelligence and Computing
                  and 2015 {IEEE} 12th Intl Conf on Autonomic and Trusted Computing
                  and 2015 {IEEE} 15th Intl Conf on Scalable Computing and Communications
                  and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August
                  10-14, 2015},
  pages        = {1339--1347},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.242},
  doi          = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP.2015.242},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/LiTHC15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/YuWWZHC14,
  author       = {Liangwen Yu and
                  Yonggang Wang and
                  Zhengang Wu and
                  Jiawei Zhu and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Feifei Li and
                  Guoliang Li and
                  Seung{-}won Hwang and
                  Bin Yao and
                  Zhenjie Zhang},
  title        = {Edges Protection in Multiple Releases of Social Network Data},
  booktitle    = {Web-Age Information Management - 15th International Conference, {WAIM}
                  2014, Macau, China, June 16-18, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8485},
  pages        = {669--680},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08010-9\_71},
  doi          = {10.1007/978-3-319-08010-9\_71},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/YuWWZHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongHC13,
  author       = {Hu Xiong and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Security Flaw of an ECC-based Signcryption Scheme with Anonymity},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {317--320},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n4/ijns-2013-v15-n4-p317-320.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEwisa/YuJJHDY13,
  author       = {Lian Yu and
                  Yingnan Ju and
                  Qi Jing and
                  Jian{-}bin Hu and
                  Feng Ding and
                  Kun You},
  title        = {Context-Aware Service Modeling and Rule Evolution},
  booktitle    = {2013 10th Web Information System and Application Conference, Yangzhou,
                  China, November 10-15, 2013},
  pages        = {71--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WISA.2013.22},
  doi          = {10.1109/WISA.2013.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEwisa/YuJJHDY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/YangXYYHC13,
  author       = {Tao Yang and
                  Wei Xin and
                  Liangwen Yu and
                  Yong Yang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Yoshiharu Ishikawa and
                  Jianzhong Li and
                  Wei Wang and
                  Rui Zhang and
                  Wenjie Zhang},
  title        = {MisDis: An Efficent Misbehavior Discovering Method Based on Accountability
                  and State Machine in {VANET}},
  booktitle    = {Web Technologies and Applications - 15th Asia-Pacific Web Conference,
                  APWeb 2013, Sydney, Australia, April 4-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7808},
  pages        = {583--594},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37401-2\_57},
  doi          = {10.1007/978-3-642-37401-2\_57},
  timestamp    = {Mon, 28 Aug 2023 21:17:33 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/YangXYYHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/YuYWZHC13,
  author       = {Liangwen Yu and
                  Tao Yang and
                  Zhengang Wu and
                  Jiawei Zhu and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Jianyong Wang and
                  Hui Xiong and
                  Yoshiharu Ishikawa and
                  Jianliang Xu and
                  Junfeng Zhou},
  title        = {Sensitive Edges Protection in Social Networks},
  booktitle    = {Web-Age Information Management - 14th International Conference, {WAIM}
                  2013, Beidaihe, China, June 14-16, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7923},
  pages        = {564--569},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38562-9\_57},
  doi          = {10.1007/978-3-642-38562-9\_57},
  timestamp    = {Thu, 28 Jan 2021 11:41:18 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/YuYWZHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuXC12,
  author       = {Jian{-}bin Hu and
                  Hu Xiong and
                  Zhong Chen},
  title        = {Further Improvement of An Authentication Scheme with User Anonymity
                  for Wireless Communications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {297--300},
  year         = {2012},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n5/ijns-2012-v14-n5-p297-300.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuXC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/YangKXHC12,
  author       = {Tao Yang and
                  Lingbo Kong and
                  Wei Xin and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Resisting relay attacks on vehicular Passive Keyless Entry and start
                  systems},
  booktitle    = {9th International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2012, 29-31 May 2012, Chongqing, China},
  pages        = {2232--2236},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/FSKD.2012.6234155},
  doi          = {10.1109/FSKD.2012.6234155},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/YangKXHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YuZWYHC12,
  author       = {Liangwen Yu and
                  Jiawei Zhu and
                  Zhengang Wu and
                  Tao Yang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Privacy Protection in Social Networks Using l-Diversity},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {435--444},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_42},
  doi          = {10.1007/978-3-642-34129-8\_42},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YuZWYHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/WangZLHC12,
  author       = {Yonggang Wang and
                  Ennan Zhai and
                  Eng Keong Lua and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Bernady O. Apduhan and
                  Ching{-}Hsien Hsu and
                  Tadashi Dohi and
                  Kenji Ishida and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {iSac: Intimacy Based Access Control for Social Network Sites},
  booktitle    = {9th International Conference on Ubiquitous Intelligence and Computing
                  and 9th International Conference on Autonomic and Trusted Computing,
                  {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012},
  pages        = {517--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/UIC-ATC.2012.49},
  doi          = {10.1109/UIC-ATC.2012.49},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/WangZLHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/YangKWHC12,
  author       = {Tao Yang and
                  Lingbo Kong and
                  Yinyang Wang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Bernady O. Apduhan and
                  Ching{-}Hsien Hsu and
                  Tadashi Dohi and
                  Kenji Ishida and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {{PKU-STRAW-L:} {A} Simulative Platform Evaluate the Power-Saving Rate
                  of the Intelligent Street Lamp System},
  booktitle    = {9th International Conference on Ubiquitous Intelligence and Computing
                  and 9th International Conference on Autonomic and Trusted Computing,
                  {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012},
  pages        = {525--532},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/UIC-ATC.2012.116},
  doi          = {10.1109/UIC-ATC.2012.116},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/YangKWHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/YangKYHC12,
  author       = {Tao Yang and
                  Lingbo Kong and
                  Liangwen Yu and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Hong Gao and
                  Lipyeow Lim and
                  Wei Wang and
                  Chuan Li and
                  Lei Chen},
  title        = {{RGH:} An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement
                  Protocol for VANETs},
  booktitle    = {Web-Age Information Management - 13th International Conference, {WAIM}
                  2012, Harbin, China, August 18-20, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7418},
  pages        = {352--362},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32281-5\_35},
  doi          = {10.1007/978-3-642-32281-5\_35},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/YangKYHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/XiongHCL11,
  author       = {Hu Xiong and
                  Jian{-}bin Hu and
                  Zhong Chen and
                  Fagen Li},
  title        = {On the security of an identity based multi-proxy signature scheme},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {2},
  pages        = {129--135},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.01.006},
  doi          = {10.1016/J.COMPELECENG.2011.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/XiongHCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/TangWXYHSC11,
  author       = {Cong Tang and
                  Yonggang Wang and
                  Hu Xiong and
                  Tao Yang and
                  Jian{-}bin Hu and
                  Qingni Shen and
                  Zhong Chen},
  title        = {Need for Symmetry: Addressing Privacy Risks in Online Social Networks},
  booktitle    = {25th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2011, Biopolis, Singapore, March 22-25, 2011},
  pages        = {534--541},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/AINA.2011.57},
  doi          = {10.1109/AINA.2011.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/TangWXYHSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/YangXHWDXC11,
  author       = {Tao Yang and
                  Hu Xiong and
                  Jian{-}bin Hu and
                  Yonggang Wang and
                  Yong Deng and
                  Biao Xiao and
                  Zhong Chen},
  editor       = {Xiaoyong Du and
                  Wenfei Fan and
                  Jianmin Wang and
                  Zhiyong Peng and
                  Mohamed A. Sharaf},
  title        = {A Traceable Certificateless Threshold Proxy Signature Scheme from
                  Bilinear Pairings},
  booktitle    = {Web Technologies and Applications - 13th Asia-Pacific Web Conference,
                  APWeb 2011, Beijing, China, April 18-20, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6612},
  pages        = {376--381},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20291-9\_39},
  doi          = {10.1007/978-3-642-20291-9\_39},
  timestamp    = {Mon, 26 Jun 2023 20:48:23 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/YangXHWDXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/HuWYGGC11,
  author       = {Jian{-}bin Hu and
                  Yonggang Wang and
                  Tao Yang and
                  Zhi Guan and
                  Nike Gui and
                  Zhong Chen},
  editor       = {{\'{A}}lvaro Herrero and
                  Emilio Corchado},
  title        = {Produre: {A} Novel Proximity Discovery Mechanism in Location Tagging
                  System},
  booktitle    = {Computational Intelligence in Security for Information Systems - 4th
                  International Conference, {CISIS} 2011, Held at {IWANN} 2011, Torremolinos-M{\'{a}}laga,
                  Spain, June 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6694},
  pages        = {238--245},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21323-6\_30},
  doi          = {10.1007/978-3-642-21323-6\_30},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/HuWYGGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/ChenLHC11,
  author       = {Yu Chen and
                  Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Pascal Lafourcade},
  title        = {A Novel Commutative Blinding Identity Based Encryption Scheme},
  booktitle    = {Foundations and Practice of Security - 4th Canada-France {MITACS}
                  Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6888},
  pages        = {73--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27901-0\_7},
  doi          = {10.1007/978-3-642-27901-0\_7},
  timestamp    = {Fri, 27 Dec 2019 21:23:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/ChenLHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/YangXHWXDC11,
  author       = {Tao Yang and
                  Hu Xiong and
                  Jian{-}bin Hu and
                  Yonggang Wang and
                  Wei Xin and
                  Yong Deng and
                  Zhong Chen},
  title        = {A traceable privacy-preserving authentication protocol for VANETs
                  based on proxy re-signature},
  booktitle    = {Eighth International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2011, 26-28 July 2011, Shanghai, China},
  pages        = {2217--2221},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/FSKD.2011.6020025},
  doi          = {10.1109/FSKD.2011.6020025},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/YangXHWXDC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/DuWHC11,
  author       = {Longzhi Du and
                  Yonggang Wang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging
                  Behavior},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2011, Busan, Korea, 26-28 May, 2011},
  pages        = {270--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISPA.2011.35},
  doi          = {10.1109/ISPA.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/DuWHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoCHC11,
  author       = {Song Luo and
                  Yu Chen and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {New Fully Secure Hierarchical Identity-Based Encryption with Constant
                  Size Ciphertexts},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_5},
  doi          = {10.1007/978-3-642-21031-0\_5},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoCHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/CaoKGCH10,
  author       = {Zhen Cao and
                  Jiejun Kong and
                  Mario Gerla and
                  Zhong Chen and
                  Jian{-}bin Hu},
  title        = {Filtering false data via authentic consensus in vehicle ad hoc networks},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {3},
  number       = {2},
  pages        = {217--235},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJAACS.2010.031092},
  doi          = {10.1504/IJAACS.2010.031092},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaacs/CaoKGCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/CaoGCHT10,
  author       = {Zhen Cao and
                  Zhi Guan and
                  Zhong Chen and
                  Jian{-}bin Hu and
                  Liyong Tang},
  title        = {Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security
                  Protocols},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {25},
  number       = {2},
  pages        = {375--387},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11390-010-9330-4},
  doi          = {10.1007/S11390-010-9330-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/CaoGCHT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuiHC10,
  author       = {Nike Gui and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {A Secure Routing Protocol and its application in Multi-sink Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {5},
  number       = {5},
  pages        = {535--542},
  year         = {2010},
  url          = {https://doi.org/10.4304/jnw.5.5.535-542},
  doi          = {10.4304/JNW.5.5.535-542},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuiHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenCGHC10,
  author       = {Yu Chen and
                  Manuel Charlemagne and
                  Zhi Guan and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Identity-based encryption based on {DHIES}},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {82--88},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755699},
  doi          = {10.1145/1755688.1755699},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenCGHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChenKHC10,
  author       = {Yu Chen and
                  Hyun Sung Kim and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {When {ABE} Meets {RSS}},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {319--326},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_23},
  doi          = {10.1007/978-3-642-13739-6\_23},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChenKHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LuoHC10,
  author       = {Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {New construction of identity-based proxy re-encryption},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {47--50},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866880},
  doi          = {10.1145/1866870.1866880},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LuoHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/WangZHC10,
  author       = {Yonggang Wang and
                  Ennan Zhai and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Maozhen Li and
                  Qilian Liang and
                  Lipo Wang and
                  Yibin Song},
  title        = {Claper: Recommend classical papers to beginners},
  booktitle    = {Seventh International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2010, 10-12 August 2010, Yantai, Shandong, China},
  pages        = {2777--2781},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/FSKD.2010.5569227},
  doi          = {10.1109/FSKD.2010.5569227},
  timestamp    = {Sat, 25 Jun 2022 17:37:25 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/WangZHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/LiHG10,
  author       = {Mingming Li and
                  Jian{-}bin Hu and
                  Nike Gui},
  editor       = {Paolo Bellavista and
                  Ruay{-}Shiung Chang and
                  Han{-}Chieh Chao and
                  Shin{-}Feng Lin and
                  Peter M. A. Sloot},
  title        = {Data-Centric Trust Framework for High Integrity Wireless Sensor Networks},
  booktitle    = {Advances in Grid and Pervasive Computing, 5th International Conference,
                  {GPC} 2010, Hualien, Taiwan, May 10-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6104},
  pages        = {593--602},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13067-0\_61},
  doi          = {10.1007/978-3-642-13067-0\_61},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/LiHG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XieTGCHC10,
  author       = {Anmin Xie and
                  Cong Tang and
                  Nike Gui and
                  Zhuhua Cai and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {An Adjacency Matrixes-Based Model for Network Security Analysis},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502655},
  doi          = {10.1109/ICC.2010.5502655},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/XieTGCHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LuoHC10,
  author       = {Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Ciphertext Policy Attribute-Based Proxy Re-encryption},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {401--415},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_28},
  doi          = {10.1007/978-3-642-17650-0\_28},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LuoHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WangZCXWHC10,
  author       = {Yonggang Wang and
                  Ennan Zhai and
                  Cui Cao and
                  Yongqiang Xie and
                  Zhaojun Wang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {DSpam: Defending Against Spam in Tagging Systems via Users' Reliability},
  booktitle    = {16th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2010, Shanghai, China, December 8-10, 2010},
  pages        = {139--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPADS.2010.63},
  doi          = {10.1109/ICPADS.2010.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/WangZCXWHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/LuoHC10,
  author       = {Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Implementing Attribute-Based Encryption in Web Services},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami,
                  Florida, USA, July 5-10, 2010},
  pages        = {658--659},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICWS.2010.82},
  doi          = {10.1109/ICWS.2010.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/LuoHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/GuiZHC10,
  author       = {Nike Gui and
                  Ennan Zhai and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Lei Chen and
                  Changjie Tang and
                  Jun Yang and
                  Yunjun Gao},
  title        = {{SWORDS:} Improving Sensor Networks Immunity under Worm Attacks},
  booktitle    = {Web-Age Information Management, 11th International Conference, {WAIM}
                  2010, Jiuzhaigou, China, July 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6184},
  pages        = {86--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14246-8\_11},
  doi          = {10.1007/978-3-642-14246-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/GuiZHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-5015,
  author       = {Hu Xiong and
                  Jian{-}bin Hu and
                  Tao Yang and
                  Wei Xin and
                  Zhong Chen},
  title        = {Efficient Privacy-Preserving Authentication Protocol for Vehicular
                  Communications with Trustworthy},
  journal      = {CoRR},
  volume       = {abs/1008.5015},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.5015},
  eprinttype    = {arXiv},
  eprint       = {1008.5015},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-5015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoHC10,
  author       = {Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {New Construction of Identity-based Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieCTHC09,
  author       = {Anmin Xie and
                  Zhuhua Cai and
                  Cong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Evaluating Network Security With Two-Layer Attack Graphs},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.22},
  doi          = {10.1109/ACSAC.2009.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieCTHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/LiTHC09,
  author       = {Suke Li and
                  Liyong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Automatic Data Extraction from Web Discussion Forums},
  booktitle    = {Fourth International Conference on Frontier of Computer Science and
                  Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009},
  pages        = {219--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FCST.2009.20},
  doi          = {10.1109/FCST.2009.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcst/LiTHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icns/TangCCXHTC09,
  author       = {Cong Tang and
                  Ruichuan Chen and
                  Zhuhua Cai and
                  Anmin Xie and
                  Jian{-}bin Hu and
                  Liyong Tang and
                  Zhong Chen},
  editor       = {Jaime Lloret Mauri and
                  Vicente Casares Giner and
                  Rafael Tomas and
                  Tomeu Serra and
                  Oana Dini},
  title        = {{SKIP:} {A} Secure Key Issuing Scheme for Peer-to-Peer Networks},
  booktitle    = {The Fifth International Conference on Networking and Services, {ICNS}
                  2009, 20-25 April 2009, Valencia, Spain},
  pages        = {296--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICNS.2009.64},
  doi          = {10.1109/ICNS.2009.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icns/TangCCXHTC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CaiCFTCH09,
  author       = {Zhuhua Cai and
                  Ruichuan Chen and
                  Jianqiao Feng and
                  Cong Tang and
                  Zhong Chen and
                  Jian{-}bin Hu},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {A holistic mechanism against file pollution in peer-to-peer networks},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {28--34},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529288},
  doi          = {10.1145/1529282.1529288},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/CaiCFTCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/TangCCXHTC09,
  author       = {Cong Tang and
                  Ruichuan Chen and
                  Zhuhua Cai and
                  Anmin Xie and
                  Jian{-}bin Hu and
                  Liyong Tang and
                  Zhong Chen},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {Securing key issuing in peer-to-peer networks},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {84--85},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529298},
  doi          = {10.1145/1529282.1529298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/TangCCXHTC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XieCWCH09,
  author       = {Anmin Xie and
                  Guodong Chen and
                  Yonggang Wang and
                  Zhong Chen and
                  Jian{-}bin Hu},
  title        = {A New Method to Generate Attack Graphs},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {401--406},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.32},
  doi          = {10.1109/SSIRI.2009.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XieCWCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/CaoHCXZ08,
  author       = {Zhen Cao and
                  Jian{-}bin Hu and
                  Zhong Chen and
                  Maoxing Xu and
                  Xia Zhou},
  title        = {{FBSR:} feedback-based secure routing protocol for wireless sensor
                  networks},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {4},
  number       = {1},
  pages        = {61--76},
  year         = {2008},
  url          = {https://doi.org/10.1108/17427370810873110},
  doi          = {10.1108/17427370810873110},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/CaoHCXZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisse/WangGHC08,
  author       = {Yonggang Wang and
                  Nike Gui and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Tarek M. Sobh and
                  Khaled M. Elleithy and
                  Ausif Mahmood},
  title        = {Automatic Construction and Optimization of Layered Network Attack
                  Graph},
  booktitle    = {Novel Algorithms and Techniques in Telecommunications and Networking,
                  proceedings of the 2008 International Conference on Telecommunications
                  and Networking (TeNe), part of the International Joint Conferences
                  on Computer, Information, and Systems Sciences, and Engineering, {CISSE}
                  2008, Bridgeport, Connecticut, {USA}},
  pages        = {135--138},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-90-481-3662-9\_22},
  doi          = {10.1007/978-90-481-3662-9\_22},
  timestamp    = {Tue, 29 Dec 2020 18:38:51 +0100},
  biburl       = {https://dblp.org/rec/conf/cisse/WangGHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/ChenGTHC08,
  author       = {Ruichuan Chen and
                  Wenjia Guo and
                  Liyong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Emilio Luque and
                  Tom{\`{a}}s Margalef and
                  Domingo Benitez},
  title        = {Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer
                  Networks},
  booktitle    = {Euro-Par 2008 - Parallel Processing, 14th International Euro-Par Conference,
                  Las Palmas de Gran Canaria, Spain, August 26-29, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5168},
  pages        = {601--610},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85451-7\_64},
  doi          = {10.1007/978-3-540-85451-7\_64},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/ChenGTHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/ChenZTHC07,
  author       = {Ruichuan Chen and
                  Xuan Zhao and
                  Liyong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {CuboidTrust: {A} Global Reputation-Based Trust Model in Peer-to-Peer
                  Networks},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {203--215},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_22},
  doi          = {10.1007/978-3-540-73547-2\_22},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/ChenZTHC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ChenGTHC07,
  author       = {Ruichuan Chen and
                  Wenjia Guo and
                  Liyong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Hybrid Overlay Structure Based on Virtual Node},
  booktitle    = {Proceedings of the 12th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2007), July 1-4, Aveiro, Portugal},
  pages        = {1091--1098},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCC.2007.4381519},
  doi          = {10.1109/ISCC.2007.4381519},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/ChenGTHC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaoGCHT07,
  author       = {Zhen Cao and
                  Zhi Guan and
                  Zhong Chen and
                  Jian{-}bin Hu and
                  Liyong Tang},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {An Economical Model for the Risk Evaluation of DoS Vulnerabilities
                  in Cryptography Protocols},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_12},
  doi          = {10.1007/978-3-540-72163-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CaoGCHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CaoHCXZ06,
  author       = {Zhen Cao and
                  Jian{-}bin Hu and
                  Zhong Chen and
                  Maoxing Xu and
                  Xia Zhou},
  title        = {Feedback: Towards Dynamic Behavior and Secure Routing forWireless
                  Sensor Networks},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {160--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.179},
  doi          = {10.1109/AINA.2006.179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CaoHCXZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/JingHC06,
  author       = {Qi Jing and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {{C4W:} An Energy Efficient Public Key Cryptosystem for Large-Scale
                  Wireless Sensor Networks},
  booktitle    = {{IEEE} 3rd International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2006, 9-12 October 2006, Vancouver, BC, Canada},
  pages        = {827--832},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MOBHOC.2006.278660},
  doi          = {10.1109/MOBHOC.2006.278660},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/JingHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/LiuHC05,
  author       = {Peng Liu and
                  Jian{-}bin Hu and
                  Zhong Chen},
  editor       = {Andrzej Skowron and
                  Rakesh Agrawal and
                  Michael Luck and
                  Takahira Yamaguchi and
                  Pierre Morizet{-}Mahoudeaux and
                  Jiming Liu and
                  Ning Zhong},
  title        = {A Formal Language for Access Control Policies in Distributed Environment},
  booktitle    = {2005 {IEEE} / {WIC} / {ACM} International Conference on Web Intelligence
                  {(WI} 2005), 19-22 September 2005, Compiegne, France},
  pages        = {766--769},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WI.2005.2},
  doi          = {10.1109/WI.2005.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/webi/LiuHC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics