BibTeX records: Fagen Li

download as .bib file

@article{DBLP:journals/apin/HeY0KN0L24,
  author       = {Junpeng He and
                  Lingfeng Yao and
                  Xiong Li and
                  Muhammad Khurram Khan and
                  Weina Niu and
                  Xiaosong Zhang and
                  Fagen Li},
  title        = {Model-agnostic generation-enhanced technology for few-shot intrusion
                  detection},
  journal      = {Appl. Intell.},
  volume       = {54},
  number       = {4},
  pages        = {3181--3204},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10489-024-05290-8},
  doi          = {10.1007/S10489-024-05290-8},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/HeY0KN0L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XieHYLL24,
  author       = {Ying Xie and
                  Ke Huang and
                  Sheng Yuan and
                  Xiong Li and
                  Fagen Li},
  title        = {Versatile Remote Data Checking Scheme for Cloud-Assisted Internet
                  of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {12346--12361},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3332873},
  doi          = {10.1109/JIOT.2023.3332873},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XieHYLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangXSLL24,
  author       = {Tianyuan Zhang and
                  Xiangjun Xin and
                  Lei Sun and
                  Chaoyang Li and
                  Fagen Li},
  title        = {Secure quantum signature scheme without entangled state},
  journal      = {Quantum Inf. Process.},
  volume       = {23},
  number       = {2},
  pages        = {49},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11128-024-04257-5},
  doi          = {10.1007/S11128-024-04257-5},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangXSLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HeXLL24,
  author       = {Fan He and
                  Xiangjun Xin and
                  Chaoyang Li and
                  Fagen Li},
  title        = {Security analysis of the semi-quantum secret-sharing protocol of specific
                  bits and its improvement},
  journal      = {Quantum Inf. Process.},
  volume       = {23},
  number       = {2},
  pages        = {51},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11128-023-04255-z},
  doi          = {10.1007/S11128-023-04255-Z},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/HeXLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/SenouciSL24,
  author       = {Mohammed Raouf Senouci and
                  Abdelkader Senouci and
                  Fagen Li},
  title        = {A pairing-free certificateless authenticated searchable encryption
                  with multi-trapdoor indistinguishability {(MTP-IND)} guarantees},
  journal      = {Telecommun. Syst.},
  volume       = {85},
  number       = {3},
  pages        = {443--460},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11235-023-01095-1},
  doi          = {10.1007/S11235-023-01095-1},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/SenouciSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/ShiDLCL23,
  author       = {Zhaosen Shi and
                  Xuyang Ding and
                  Fagen Li and
                  Yingni Chen and
                  Canran Li},
  title        = {Mitigation of a poisoning attack in federated learning by using historical
                  distance detection},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {78},
  number       = {3-4},
  pages        = {135--147},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12243-022-00929-4},
  doi          = {10.1007/S12243-022-00929-4},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/ShiDLCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWQL23,
  author       = {Zeyu Yang and
                  Ziqing Wang and
                  Fei Qiu and
                  Fagen Li},
  title        = {A group key agreement protocol based on {ECDH} and short signature},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103388},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103388},
  doi          = {10.1016/J.JISA.2022.103388},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangWQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/PanJL23,
  author       = {Xiangyu Pan and
                  Yuqiao Jin and
                  Fagen Li},
  title        = {An efficient heterogeneous authenticated key agreement scheme for
                  unmanned aerial vehicles},
  journal      = {J. Syst. Archit.},
  volume       = {136},
  pages        = {102821},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102821},
  doi          = {10.1016/J.SYSARC.2022.102821},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/PanJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WuWYL23,
  author       = {Xinyan Wu and
                  Huanwei Wang and
                  Yangkai Yuan and
                  Fagen Li},
  title        = {A lightweight encrypted deduplication scheme supporting backup},
  journal      = {J. Syst. Archit.},
  volume       = {138},
  pages        = {102858},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102858},
  doi          = {10.1016/J.SYSARC.2023.102858},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/WuWYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ZhangXLNW23,
  author       = {Yin Zhang and
                  Ling Xiong and
                  Fagen Li and
                  Xianhua Niu and
                  Hanzhou Wu},
  title        = {A blockchain-based privacy-preserving auditable authentication scheme
                  with hierarchical access control for mobile cloud computing},
  journal      = {J. Syst. Archit.},
  volume       = {142},
  pages        = {102949},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102949},
  doi          = {10.1016/J.SYSARC.2023.102949},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ZhangXLNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LiAZG23,
  author       = {Fagen Li and
                  Emmanuel Ahene and
                  Mingwu Zhang and
                  Fuchun Guo},
  title        = {Guest editorial: Special issue on frontiers in cyber security},
  journal      = {J. Syst. Archit.},
  volume       = {145},
  pages        = {103027},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103027},
  doi          = {10.1016/J.SYSARC.2023.103027},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/LiAZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/LiaoZKHL23,
  author       = {Xiaojuan Liao and
                  Hui Zhang and
                  Miyuki Koshimura and
                  Rong Huang and
                  Fagen Li},
  title        = {Solving Restricted Preemptive Scheduling on Parallel Machines with
                  {SAT} and {PMS}},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {29},
  number       = {8},
  pages        = {911--937},
  year         = {2023},
  url          = {https://doi.org/10.3897/jucs.97743},
  doi          = {10.3897/JUCS.97743},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/LiaoZKHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/GebryeWL23,
  author       = {Hayelom Gebrye and
                  Yong Wang and
                  Fagen Li},
  title        = {Traffic data extraction and labeling for machine learning based attack
                  detection in IoT networks},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {14},
  number       = {7},
  pages        = {2317--2332},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13042-022-01765-7},
  doi          = {10.1007/S13042-022-01765-7},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlc/GebryeWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/NkurunzizaL23,
  author       = {Egide Nkurunziza and
                  Fagen Li},
  title        = {{HAP-SG:} Heterogeneous authentication protocol for smart grid},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {3},
  pages        = {1365--1379},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01485-x},
  doi          = {10.1007/S12083-023-01485-X},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/NkurunzizaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/XueSLZL23,
  author       = {Jingting Xue and
                  Lingjie Shi and
                  Liang Liu and
                  Xiaojun Zhang and
                  Fagen Li},
  title        = {Anonymity-enhancing decentralized protocol for coin mixing based on
                  ring signatures and key derivation},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {6},
  pages        = {2761--2774},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01567-w},
  doi          = {10.1007/S12083-023-01567-W},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/XueSLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NkurunzizaTEL23,
  author       = {Egide Nkurunziza and
                  Lawrence Tandoh and
                  Issameldeen Elfadul and
                  Fagen Li},
  title        = {{ECAAP-SG:} Efficient certificateless anonymous authentication protocol
                  for {SG}},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.273},
  doi          = {10.1002/SPY2.273},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/NkurunzizaTEL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/XiongPLZW23,
  author       = {Ling Xiong and
                  Tu Peng and
                  Fagen Li and
                  Shengke Zeng and
                  Hanzhou Wu},
  title        = {Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN
                  in Industrial IoT},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {1},
  pages        = {38--49},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2022.3221959},
  doi          = {10.1109/JSYST.2022.3221959},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/XiongPLZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhouHL23,
  author       = {Yuyang Zhou and
                  Zhebin Hu and
                  Fagen Li},
  title        = {Searchable Public-Key Encryption With Cryptographic Reverse Firewalls
                  for Cloud Storage},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {383--396},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3095498},
  doi          = {10.1109/TCC.2021.3095498},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhouHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/ShiYHLD23,
  author       = {Zhaosen Shi and
                  Zeyu Yang and
                  Alzubair Hassan and
                  Fagen Li and
                  Xuyang Ding},
  title        = {A privacy preserving federated learning scheme using homomorphic encryption
                  and secret sharing},
  journal      = {Telecommun. Syst.},
  volume       = {82},
  number       = {3},
  pages        = {419--433},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11235-022-00982-3},
  doi          = {10.1007/S11235-022-00982-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/ShiYHLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/XieCAPLH23,
  author       = {Zhan Xie and
                  Yong Chen and
                  Ikram Ali and
                  Chengwei Pan and
                  Fagen Li and
                  Wen He},
  title        = {Efficient and Secure Certificateless Signcryption Without Pairing
                  for Edge Computing-Based Internet of Vehicles},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {5},
  pages        = {5642--5653},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3230442},
  doi          = {10.1109/TVT.2022.3230442},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/XieCAPLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhuLLZLM23,
  author       = {Hao Zhu and
                  Fagen Li and
                  Lihui Liu and
                  Yong Zeng and
                  Xiaoli Li and
                  Jianfeng Ma},
  editor       = {Mingwu Zhang and
                  Man Ho Au and
                  Yudi Zhang},
  title        = {Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing
                  Secure Connections},
  booktitle    = {Provable and Practical Security - 17th International Conference, ProvSec
                  2023, Wuhan, China, October 20-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14217},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45513-1\_3},
  doi          = {10.1007/978-3-031-45513-1\_3},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhuLLZLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HassanHLABATY22,
  author       = {Alzubair Hassan and
                  Rafik Hamza and
                  Fagen Li and
                  Awad Ali and
                  Mohammed Bakri Bashir and
                  Samar M. Alqhtani and
                  Tawfeeg Mohmmed Tawfeeg and
                  Adil Yousif},
  title        = {A Secure User Authentication Protocol for Heterogeneous Mobile Environments},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {69757--69770},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3186683},
  doi          = {10.1109/ACCESS.2022.3186683},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HassanHLABATY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/FuD0NWL22,
  author       = {Xingbing Fu and
                  Yong Ding and
                  Haifeng Li and
                  Jianting Ning and
                  Ting Wu and
                  Fagen Li},
  title        = {A survey of lattice based expressive attribute based encryption},
  journal      = {Comput. Sci. Rev.},
  volume       = {43},
  pages        = {100438},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cosrev.2021.100438},
  doi          = {10.1016/J.COSREV.2021.100438},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/FuD0NWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DingWXL22,
  author       = {Xuyang Ding and
                  Xiaoxiang Wang and
                  Ying Xie and
                  Fagen Li},
  title        = {A Lightweight Anonymous Authentication Protocol for Resource-Constrained
                  Devices in Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {3},
  pages        = {1818--1829},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3088641},
  doi          = {10.1109/JIOT.2021.3088641},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/DingWXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PanJWL22,
  author       = {Xiangyu Pan and
                  Yuqiao Jin and
                  Ziqing Wang and
                  Fagen Li},
  title        = {A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial
                  Vehicles},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {19},
  pages        = {19426--19437},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3167102},
  doi          = {10.1109/JIOT.2022.3167102},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PanJWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhouZJL22,
  author       = {Yuyang Zhou and
                  Liang Zhao and
                  Yuqiao Jin and
                  Fagen Li},
  title        = {Backdoor-resistant identity-based proxy re-encryption for cloud-assisted
                  wireless body area networks},
  journal      = {Inf. Sci.},
  volume       = {604},
  pages        = {80--96},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.05.007},
  doi          = {10.1016/J.INS.2022.05.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhouZJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/FuWYNHL22,
  author       = {Xingbing Fu and
                  Yinglun Wang and
                  Lin You and
                  Jianting Ning and
                  Ziquan Hu and
                  Fagen Li},
  title        = {Offline/Online lattice-based ciphertext policy attribute-based encryption},
  journal      = {J. Syst. Archit.},
  volume       = {130},
  pages        = {102684},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102684},
  doi          = {10.1016/J.SYSARC.2022.102684},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/FuWYNHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WangYL22,
  author       = {Ziqing Wang and
                  Zeyu Yang and
                  Fagen Li},
  title        = {A two rounds dynamic authenticated group key agreement protocol based
                  on {LWE}},
  journal      = {J. Syst. Archit.},
  volume       = {133},
  pages        = {102756},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102756},
  doi          = {10.1016/J.SYSARC.2022.102756},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/WangYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XinDLSYL22,
  author       = {Xiangjun Xin and
                  Li Ding and
                  Chaoyang Li and
                  Yongxuan Sang and
                  Qinglan Yang and
                  Fagen Li},
  title        = {Quantum public-key designated verifier signature},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {1},
  pages        = {33},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-021-03387-4},
  doi          = {10.1007/S11128-021-03387-4},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XinDLSYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiongLHLP22,
  author       = {Ling Xiong and
                  Fagen Li and
                  Mingxing He and
                  Zhicai Liu and
                  Tu Peng},
  title        = {An Efficient Privacy-Aware Authentication Scheme With Hierarchical
                  Access Control for Mobile Cloud Computing Services},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {4},
  pages        = {2309--2323},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.3029878},
  doi          = {10.1109/TCC.2020.3029878},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/XiongLHLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LawrenceLAHKC22,
  author       = {Tandoh Lawrence and
                  Fagen Li and
                  Ikram Ali and
                  Charles R. Haruna and
                  Michael Y. Kpiebaareh and
                  Tandoh Christopher},
  title        = {A computationally efficient HMAC-based authentication scheme for network
                  coding},
  journal      = {Telecommun. Syst.},
  volume       = {79},
  number       = {1},
  pages        = {47--69},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11235-021-00842-6},
  doi          = {10.1007/S11235-021-00842-6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LawrenceLAHKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/SenouciBSL22,
  author       = {Mohammed Raouf Senouci and
                  Ilyas Benkhaddra and
                  Abdelkader Senouci and
                  Fagen Li},
  title        = {A provably secure free-pairing certificateless searchable encryption
                  scheme},
  journal      = {Telecommun. Syst.},
  volume       = {80},
  number       = {3},
  pages        = {383--395},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11235-022-00912-3},
  doi          = {10.1007/S11235-022-00912-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/SenouciBSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fcs2/2022,
  editor       = {Emmanuel Ahene and
                  Fagen Li},
  title        = {Frontiers in Cyber Security - 5th International Conference, {FCS}
                  2022, Kumasi, Ghana, December 13-15, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1726},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-8445-7},
  doi          = {10.1007/978-981-19-8445-7},
  isbn         = {978-981-19-8444-0},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DingZSDL21,
  author       = {Xuyang Ding and
                  Shuai Zhang and
                  Mengkai Song and
                  Xiaocong Ding and
                  Fagen Li},
  title        = {Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage
                  for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {2},
  pages        = {802--812},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3008232},
  doi          = {10.1109/JIOT.2020.3008232},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/DingZSDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KarLL21,
  author       = {Jayaprakash Kar and
                  Xiaoguang Liu and
                  Fagen Li},
  title        = {{CL-ASS:} An efficient and low-cost certificateless aggregate signature
                  scheme for wireless sensor networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102905},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102905},
  doi          = {10.1016/J.JISA.2021.102905},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KarLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0009WFLWL021,
  author       = {Haifeng Li and
                  Yuxin Wang and
                  Xingbing Fu and
                  Caihui Lan and
                  Caifen Wang and
                  Fagen Li and
                  He Guo},
  title        = {{PSCPAC:} Post-quantum secure certificateless public auditing scheme
                  in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102927},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102927},
  doi          = {10.1016/J.JISA.2021.102927},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/0009WFLWL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/EltayiebEHL21,
  author       = {Nabeil Eltayieb and
                  Rashad Elhabob and
                  Alzubair Hassan and
                  Fagen Li},
  title        = {Secure mobile health system supporting search function and decryption
                  verification},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {2221--2231},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12652-020-02321-3},
  doi          = {10.1007/S12652-020-02321-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/EltayiebEHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/SongXZL21,
  author       = {Yaqing Song and
                  Chunxiang Xu and
                  Yuan Zhang and
                  Fagen Li},
  title        = {Comments on an identity-based signature scheme for VANETs},
  journal      = {J. Syst. Archit.},
  volume       = {112},
  pages        = {101851},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2020.101851},
  doi          = {10.1016/J.SYSARC.2020.101851},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/SongXZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/PanL21,
  author       = {Xiangyu Pan and
                  Fagen Li},
  title        = {Public-key authenticated encryption with keyword search achieving
                  both multi-ciphertext and multi-trapdoor indistinguishability},
  journal      = {J. Syst. Archit.},
  volume       = {115},
  pages        = {102075},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102075},
  doi          = {10.1016/J.SYSARC.2021.102075},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/PanL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/OuyangWL21,
  author       = {Mengdi Ouyang and
                  Ziqing Wang and
                  Fagen Li},
  title        = {Digital signature with cryptographic reverse firewalls},
  journal      = {J. Syst. Archit.},
  volume       = {116},
  pages        = {102029},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102029},
  doi          = {10.1016/J.SYSARC.2021.102029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/OuyangWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LawrenceLAKHC21,
  author       = {Tandoh Lawrence and
                  Fagen Li and
                  Ikram Ali and
                  Michael Y. Kpiebaareh and
                  Charles R. Haruna and
                  Tandoh Christopher},
  title        = {An HMAC-based authentication scheme for network coding with support
                  for error correction and rogue node identification},
  journal      = {J. Syst. Archit.},
  volume       = {116},
  pages        = {102051},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102051},
  doi          = {10.1016/J.SYSARC.2021.102051},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/LawrenceLAKHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WangTYL21,
  author       = {Ziqing Wang and
                  Dianhua Tang and
                  Haomiao Yang and
                  Fagen Li},
  title        = {A public key encryption scheme based on a new variant of {LWE} with
                  small cipher size},
  journal      = {J. Syst. Archit.},
  volume       = {117},
  pages        = {102165},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102165},
  doi          = {10.1016/J.SYSARC.2021.102165},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/WangTYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/SenouciBSL21,
  author       = {Mohammed Raouf Senouci and
                  Ilyas Benkhaddra and
                  Abdelkader Senouci and
                  Fagen Li},
  title        = {An efficient and secure certificateless searchable encryption scheme
                  against keyword guessing attacks},
  journal      = {J. Syst. Archit.},
  volume       = {119},
  pages        = {102271},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102271},
  doi          = {10.1016/J.SYSARC.2021.102271},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/SenouciBSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csnet/ShiDLCL21,
  author       = {Zhaosen Shi and
                  Xuyang Ding and
                  Fagen Li and
                  Yingni Chen and
                  Canran Li},
  title        = {Mitigation of poisoning attack in federated learning by using historical
                  distance detection},
  booktitle    = {5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi,
                  United Arab Emirates, October 12-14, 2021},
  pages        = {10--17},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSNet52717.2021.9614278},
  doi          = {10.1109/CSNET52717.2021.9614278},
  timestamp    = {Fri, 03 Dec 2021 17:36:15 +0100},
  biburl       = {https://dblp.org/rec/conf/csnet/ShiDLCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/NkurunzizaGTL21,
  author       = {Egide Nkurunziza and
                  Mwitende Gervais and
                  Lawrence Tandoh and
                  Fagen Li},
  editor       = {Chunjie Cao and
                  Yuqing Zhang and
                  Yuan Hong and
                  Ding Wang},
  title        = {Certificateless Authentication and Consensus for the Blockchain-Based
                  Smart Grid},
  booktitle    = {Frontiers in Cyber Security - 4th International Conference, {FCS}
                  2021, Haikou, China, December 17-19, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1558},
  pages        = {134--151},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0523-0\_9},
  doi          = {10.1007/978-981-19-0523-0\_9},
  timestamp    = {Tue, 06 Dec 2022 11:39:09 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/NkurunzizaGTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/TandohLAHKT21,
  author       = {Lawrence Tandoh and
                  Fagen Li and
                  Ikram Ali and
                  Charles Roland Haruna and
                  Michael Y. Kpiebaareh and
                  Christopher Tandoh},
  editor       = {Chunjie Cao and
                  Yuqing Zhang and
                  Yuan Hong and
                  Ding Wang},
  title        = {Requirements for Total Resistance to Pollution Attacks in HMAC-Based
                  Authentication Schemes for Network Coding},
  booktitle    = {Frontiers in Cyber Security - 4th International Conference, {FCS}
                  2021, Haikou, China, December 17-19, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1558},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0523-0\_12},
  doi          = {10.1007/978-981-19-0523-0\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/TandohLAHKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RamadanLLZ20,
  author       = {Mohammed Ramadan and
                  Yongjian Liao and
                  Fagen Li and
                  Shijie Zhou},
  title        = {Identity-Based Signature With Server-Aided Verification Scheme for
                  5G Mobile Systems},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {51810--51820},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2980213},
  doi          = {10.1109/ACCESS.2020.2980213},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RamadanLLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiuWYL20,
  author       = {Xiaoguang Liu and
                  Ziqing Wang and
                  Yalan Ye and
                  Fagen Li},
  title        = {An efficient and practical certificateless signcryption scheme for
                  wireless body area networks},
  journal      = {Comput. Commun.},
  volume       = {162},
  pages        = {169--178},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.014},
  doi          = {10.1016/J.COMCOM.2020.08.014},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiuWYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangWDFLW20,
  author       = {Kang Yang and
                  Guohua Wu and
                  Chengcheng Dong and
                  Xingbing Fu and
                  Fagen Li and
                  Ting Wu},
  title        = {Attribute Based Encryption with Efficient Revocation from Lattices},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {161--170},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p161-170.pdf},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangWDFLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LawrenceACL20,
  author       = {Tandoh Lawrence and
                  Ikram Ali and
                  Tandoh Christopher and
                  Fagen Li},
  title        = {A bandwidth efficient HMAC-based authentication scheme for network
                  coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102658},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102658},
  doi          = {10.1016/J.JISA.2020.102658},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LawrenceACL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/EltayiebEHL20,
  author       = {Nabeil Eltayieb and
                  Rashad Elhabob and
                  Alzubair Hassan and
                  Fagen Li},
  title        = {A blockchain-based attribute-based signcryption scheme to secure data
                  sharing in the cloud},
  journal      = {J. Syst. Archit.},
  volume       = {102},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2019.101653},
  doi          = {10.1016/J.SYSARC.2019.101653},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/EltayiebEHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ZhengZYL20,
  author       = {Xiaoyu Zheng and
                  Yuyang Zhou and
                  Yalan Ye and
                  Fagen Li},
  title        = {A cloud data deduplication scheme based on certificateless proxy re-encryption},
  journal      = {J. Syst. Archit.},
  volume       = {102},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2019.101666},
  doi          = {10.1016/J.SYSARC.2019.101666},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ZhengZYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/AliLL20,
  author       = {Ikram Ali and
                  Tandoh Lawrence and
                  Fagen Li},
  title        = {An efficient identity-based signature scheme without bilinear pairing
                  for vehicle-to-vehicle communication in VANETs},
  journal      = {J. Syst. Archit.},
  volume       = {103},
  pages        = {101692},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2019.101692},
  doi          = {10.1016/J.SYSARC.2019.101692},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/AliLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ZhouGL20,
  author       = {Yuyang Zhou and
                  Jing Guo and
                  Fagen Li},
  title        = {Certificateless public key encryption with cryptographic reverse firewalls},
  journal      = {J. Syst. Archit.},
  volume       = {109},
  pages        = {101754},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2020.101754},
  doi          = {10.1016/J.SYSARC.2020.101754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ZhouGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/HassanWEEL20,
  author       = {Abdelrhman Hassan and
                  Yong Wang and
                  Rashad Elhabob and
                  Nabeil Eltayieb and
                  Fagen Li},
  title        = {An efficient certificateless public key encryption scheme with authorized
                  equality test in healthcare environments},
  journal      = {J. Syst. Archit.},
  volume       = {109},
  pages        = {101776},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2020.101776},
  doi          = {10.1016/J.SYSARC.2020.101776},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/HassanWEEL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/GervaisYAL20,
  author       = {Mwitende Gervais and
                  Yalan Ye and
                  Ikram Ali and
                  Fagen Li},
  title        = {Certificateless authenticated key agreement for blockchain-based WBANs},
  journal      = {J. Syst. Archit.},
  volume       = {110},
  pages        = {101777},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2020.101777},
  doi          = {10.1016/J.SYSARC.2020.101777},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/GervaisYAL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/RamadanLLZA20,
  author       = {Mohammed Ramadan and
                  Yongjian Liao and
                  Fagen Li and
                  Shijie Zhou and
                  Hisham Abdalla},
  title        = {{IBEET-RSA:} Identity-Based Encryption with Equality Test over {RSA}
                  for Wireless Body Area Networks},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {1},
  pages        = {223--233},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-019-01215-9},
  doi          = {10.1007/S11036-019-01215-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/RamadanLLZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XinWYL20,
  author       = {Xiangjun Xin and
                  Zhuo Wang and
                  Qinglan Yang and
                  Fagen Li},
  title        = {Quantum designated verifier signature based on Bell states},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {3},
  pages        = {79},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-019-2574-1},
  doi          = {10.1007/S11128-019-2574-1},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XinWYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XinYL20,
  author       = {Xiangjun Xin and
                  Qinglan Yang and
                  Fagen Li},
  title        = {Quantum public-key signature scheme based on asymmetric quantum encryption
                  with trapdoor information},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {8},
  pages        = {233},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02736-z},
  doi          = {10.1007/S11128-020-02736-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XinYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiLFWLG20,
  author       = {Haifeng Li and
                  Caihui Lan and
                  Xingbing Fu and
                  Caifen Wang and
                  Fagen Li and
                  He Guo},
  title        = {A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile
                  Cloud Computing},
  journal      = {Sensors},
  volume       = {20},
  number       = {17},
  pages        = {4720},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20174720},
  doi          = {10.3390/S20174720},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiLFWLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/GervaisAEWL20,
  author       = {Mwitende Gervais and
                  Ikram Ali and
                  Nabeil Eltayieb and
                  Baocang Wang and
                  Fagen Li},
  title        = {Authenticated key agreement for blockchain-based {WBAN}},
  journal      = {Telecommun. Syst.},
  volume       = {74},
  number       = {3},
  pages        = {347--365},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11235-020-00662-0},
  doi          = {10.1007/S11235-020-00662-0},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/GervaisAEWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/AliLOL20,
  author       = {Ikram Ali and
                  Tandoh Lawrence and
                  Anyembe Andrew Omala and
                  Fagen Li},
  title        = {An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation
                  for Heterogeneous Vehicular Communication in VANETs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {10},
  pages        = {11266--11280},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.3008781},
  doi          = {10.1109/TVT.2020.3008781},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/AliLOL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/AliL20,
  author       = {Ikram Ali and
                  Fagen Li},
  title        = {An efficient conditional privacy-preserving authentication scheme
                  for Vehicle-To-Infrastructure communication in VANETs},
  journal      = {Veh. Commun.},
  volume       = {22},
  pages        = {100228},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.vehcom.2019.100228},
  doi          = {10.1016/J.VEHCOM.2019.100228},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/AliL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LiWZJI20,
  author       = {Fagen Li and
                  Jiye Wang and
                  Yuyang Zhou and
                  Chunhua Jin and
                  SK Hafizul Islam},
  title        = {A heterogeneous user authentication and key establishment for mobile
                  client-server environment},
  journal      = {Wirel. Networks},
  volume       = {26},
  number       = {2},
  pages        = {913--924},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11276-018-1839-4},
  doi          = {10.1007/S11276-018-1839-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/LiWZJI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoWFLWL20,
  author       = {Hailong Yao and
                  Caifen Wang and
                  Xingbing Fu and
                  Chao Liu and
                  Bin Wu and
                  Fagen Li},
  title        = {Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange
                  Scheme for IoT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/143},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoWFLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YaoWFLWL19,
  author       = {Hailong Yao and
                  Caifen Wang and
                  Xingbing Fu and
                  Chao Liu and
                  Bin Wu and
                  Fagen Li},
  title        = {A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme
                  for Single and Multi-Server Environments},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {109597--109611},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2933576},
  doi          = {10.1109/ACCESS.2019.2933576},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YaoWFLWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FanLLZZ19,
  author       = {Yu Fan and
                  Yongjian Liao and
                  Fagen Li and
                  Shijie Zhou and
                  Ganglin Zhang},
  title        = {Identity-Based Auditing for Shared Cloud Data With Efficient and Secure
                  Sensitive Information Hiding},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {114246--114260},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2932430},
  doi          = {10.1109/ACCESS.2019.2932430},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FanLLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWJLL19,
  author       = {Xiaoguang Liu and
                  Ziqing Wang and
                  Chunhua Jin and
                  Fagen Li and
                  Gaoping Li},
  title        = {A Blockchain-Based Medical Data Sharing and Protection Scheme},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {118943--118953},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2937685},
  doi          = {10.1109/ACCESS.2019.2937685},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWJLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiongLZPL19,
  author       = {Ling Xiong and
                  Fagen Li and
                  Shengke Zeng and
                  Tu Peng and
                  Zhicai Liu},
  title        = {A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient
                  Revocation for Multi-Server Architectures},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {125840--125853},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2939368},
  doi          = {10.1109/ACCESS.2019.2939368},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiongLZPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/UwizeyeWCL19,
  author       = {Erneste Uwizeye and
                  Jiye Wang and
                  Zhihua Cheng and
                  Fagen Li},
  title        = {Certificateless public key encryption with conjunctive keyword search
                  and its application to cloud-based reliable smart grid system},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {74},
  number       = {7-8},
  pages        = {435--449},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12243-019-00716-8},
  doi          = {10.1007/S12243-019-00716-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/UwizeyeWCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AheneQAL19,
  author       = {Emmanuel Ahene and
                  Zhangchi Qin and
                  Akua Konadu Adusei and
                  Fagen Li},
  title        = {Efficient Signcryption With Proxy Re-Encryption and its Application
                  in Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9722--9737},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2930742},
  doi          = {10.1109/JIOT.2019.2930742},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AheneQAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/EltayiebEHL19,
  author       = {Nabeil Eltayieb and
                  Rashad Elhabob and
                  Alzubair Hassan and
                  Fagen Li},
  title        = {An efficient attribute-based online/offline searchable encryption
                  and its application in cloud-based reliable smart grid},
  journal      = {J. Syst. Archit.},
  volume       = {98},
  pages        = {165--172},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.sysarc.2019.07.005},
  doi          = {10.1016/J.SYSARC.2019.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/EltayiebEHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/AliGAL19,
  author       = {Ikram Ali and
                  Mwitende Gervais and
                  Emmanuel Ahene and
                  Fagen Li},
  title        = {A blockchain-based certificateless public key signature scheme for
                  vehicle-to-infrastructure communication in VANETs},
  journal      = {J. Syst. Archit.},
  volume       = {99},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.sysarc.2019.101636},
  doi          = {10.1016/J.SYSARC.2019.101636},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/AliGAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/HassanOAJL19,
  author       = {Alzubair Hassan and
                  Anyembe Andrew Omala and
                  Mohamed Ali and
                  Chunhua Jin and
                  Fagen Li},
  title        = {Identity-Based User Authenticated Key Agreement Protocol for Multi-Server
                  Environment with Anonymity},
  journal      = {Mob. Networks Appl.},
  volume       = {24},
  number       = {3},
  pages        = {890--902},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11036-018-1145-5},
  doi          = {10.1007/S11036-018-1145-5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/HassanOAJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/EltayiebWHEL19,
  author       = {Nabeil Eltayieb and
                  Ping Wang and
                  Alzubair Hassan and
                  Rashad Elhabob and
                  Fagen Li},
  title        = {{ASDS:} Attribute-based secure data sharing scheme for reliable cloud
                  environment},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.57},
  doi          = {10.1002/SPY2.57},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/EltayiebWHEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/AheneJL19,
  author       = {Emmanuel Ahene and
                  Chunhua Jin and
                  Fagen Li},
  title        = {Certificateless deniably authenticated encryption and its application
                  to e-voting system},
  journal      = {Telecommun. Syst.},
  volume       = {70},
  number       = {3},
  pages        = {417--434},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11235-018-0496-3},
  doi          = {10.1007/S11235-018-0496-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/AheneJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/AheneDFL19,
  author       = {Emmanuel Ahene and
                  Junfeng Dai and
                  Hao Feng and
                  Fagen Li},
  title        = {A certificateless signcryption with proxy re-encryption for practical
                  access control in cloud-based reliable smart grid},
  journal      = {Telecommun. Syst.},
  volume       = {70},
  number       = {4},
  pages        = {491--510},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11235-018-0530-5},
  doi          = {10.1007/S11235-018-0530-5},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/AheneDFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/AliHL19,
  author       = {Ikram Ali and
                  Alzubair Hassan and
                  Fagen Li},
  title        = {Authentication and privacy schemes for vehicular ad hoc networks (VANETs):
                  {A} survey},
  journal      = {Veh. Commun.},
  volume       = {16},
  pages        = {45--61},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.vehcom.2019.02.002},
  doi          = {10.1016/J.VEHCOM.2019.02.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/AliHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/HongLSL19,
  author       = {Jiaojiao Hong and
                  Bo Liu and
                  Qianyuan Sun and
                  Fagen Li},
  title        = {A combined public-key scheme in the case of attribute-based for wireless
                  body area networks},
  journal      = {Wirel. Networks},
  volume       = {25},
  number       = {2},
  pages        = {845--859},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11276-017-1597-8},
  doi          = {10.1007/S11276-017-1597-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/HongLSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/SaeedLTGL19,
  author       = {Mutaz Elradi S. Saeed and
                  Qun{-}Ying Liu and
                  GuiYun Tian and
                  Bin Gao and
                  Fagen Li},
  title        = {AKAIoTs: authenticated key agreement for Internet of Things},
  journal      = {Wirel. Networks},
  volume       = {25},
  number       = {6},
  pages        = {3081--3101},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11276-018-1704-5},
  doi          = {10.1007/S11276-018-1704-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/SaeedLTGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/ZhouGZL19,
  author       = {Yuyang Zhou and
                  Yuanfeng Guan and
                  Zhiwei Zhang and
                  Fagen Li},
  editor       = {Bazhong Shen and
                  Baocang Wang and
                  Jinguang Han and
                  Yong Yu},
  title        = {Cryptographic Reverse Firewalls for Identity-Based Encryption},
  booktitle    = {Frontiers in Cyber Security - Second International Conference, {FCS}
                  2019, Xi'an, China, November 15-17, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1105},
  pages        = {36--52},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0818-9\_3},
  doi          = {10.1007/978-981-15-0818-9\_3},
  timestamp    = {Wed, 07 Dec 2022 10:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/ZhouGZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/AheneGZL19,
  author       = {Emmanuel Ahene and
                  Yuanfeng Guan and
                  Zhiwei Zhang and
                  Fagen Li},
  editor       = {Bazhong Shen and
                  Baocang Wang and
                  Jinguang Han and
                  Yong Yu},
  title        = {{CLIBDA:} {A} Deniable Authentication Scheme for Pervasive Computing
                  Environment},
  booktitle    = {Frontiers in Cyber Security - Second International Conference, {FCS}
                  2019, Xi'an, China, November 15-17, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1105},
  pages        = {67--83},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0818-9\_5},
  doi          = {10.1007/978-981-15-0818-9\_5},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/AheneGZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/GervaisSWL19,
  author       = {Mwitende Gervais and
                  Liang Sun and
                  Ke Wang and
                  Fagen Li},
  editor       = {Bazhong Shen and
                  Baocang Wang and
                  Jinguang Han and
                  Yong Yu},
  title        = {Certificateless Authenticated Key Agreement for Decentralized WBANs},
  booktitle    = {Frontiers in Cyber Security - Second International Conference, {FCS}
                  2019, Xi'an, China, November 15-17, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1105},
  pages        = {268--290},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0818-9\_18},
  doi          = {10.1007/978-981-15-0818-9\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/GervaisSWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/EltayiebSWL19,
  author       = {Nabeil Eltayieb and
                  Liang Sun and
                  Ke Wang and
                  Fagen Li},
  editor       = {Bazhong Shen and
                  Baocang Wang and
                  Jinguang Han and
                  Yong Yu},
  title        = {A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain},
  booktitle    = {Frontiers in Cyber Security - Second International Conference, {FCS}
                  2019, Xi'an, China, November 15-17, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1105},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0818-9\_19},
  doi          = {10.1007/978-981-15-0818-9\_19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fcs2/EltayiebSWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/HassanHMPL19,
  author       = {Alzubair Hassan and
                  Rafik Hamza and
                  Vittor Gift Mawutor and
                  Akash Suresh Patil and
                  Fagen Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Lightweight Certificateless User Authentication Scheme for Mobile
                  Environment},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {112--122},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_9},
  doi          = {10.1007/978-3-030-30619-9\_9},
  timestamp    = {Tue, 27 Sep 2022 14:19:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/HassanHMPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/ZhouGZL19,
  author       = {Yuyang Zhou and
                  Yuanfeng Guan and
                  Zhiwei Zhang and
                  Fagen Li},
  title        = {A Blockchain-Based Access Control Scheme for Smart Grids},
  booktitle    = {2019 International Conference on Networking and Network Applications,
                  NaNA 2019, Daegu, Korea (South), October 10-13, 2019},
  pages        = {368--373},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NaNA.2019.00070},
  doi          = {10.1109/NANA.2019.00070},
  timestamp    = {Tue, 17 Mar 2020 16:10:26 +0100},
  biburl       = {https://dblp.org/rec/conf/nana/ZhouGZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitam/2017,
  editor       = {Peeyush Chandra and
                  Debasis Giri and
                  Fagen Li and
                  Samarjit Kar and
                  Dipak Kumar Jana},
  title        = {Information Technology and Applied Mathematics - {ICITAM} 2017, Haldia,
                  Purba Medinipur, West Bengal, India, October 30 - November 1, 2017},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {699},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-10-7590-2},
  doi          = {10.1007/978-981-10-7590-2},
  isbn         = {978-981-10-7589-6},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitam/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouGZL19,
  author       = {Yuyang Zhou and
                  Yuanfeng Guan and
                  Zhiwei Zhang and
                  Fagen Li},
  title        = {A Blockchain-Based Access Control Scheme for Smart Grids},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouGZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiaoCLJZR18,
  author       = {Yongjian Liao and
                  Hongjie Chen and
                  Fagen Li and
                  Shaoquan Jiang and
                  Shijie Zhou and
                  Mohammed Ramadan},
  title        = {Insecurity of {A} Key-Policy Attribute Based Encryption Scheme With
                  Equality Test},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {10189--10196},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2808944},
  doi          = {10.1109/ACCESS.2018.2808944},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiaoCLJZR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiaoHLZ18,
  author       = {Yongjian Liao and
                  Yichuan He and
                  Fagen Li and
                  Shijie Zhou},
  title        = {Analysis of a mobile payment protocol with outsourced verification
                  in cloud server and the improvement},
  journal      = {Comput. Stand. Interfaces},
  volume       = {56},
  pages        = {101--106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.csi.2017.09.008},
  doi          = {10.1016/J.CSI.2017.09.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiaoHLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/IslamOVALR18,
  author       = {SK Hafizul Islam and
                  Mohammad S. Obaidat and
                  Pandi Vijayakumar and
                  Enas W. Abdulhay and
                  Fagen Li and
                  M. Krishna Chaitanya Reddy},
  title        = {A robust and efficient password-based conditional privacy preserving
                  authentication and group-key agreement protocol for VANETs},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {84},
  pages        = {216--227},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.07.002},
  doi          = {10.1016/J.FUTURE.2017.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/IslamOVALR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/GuoFMWLW18,
  author       = {Chen Guo and
                  Xingbing Fu and
                  Yaojun Mao and
                  Guohua Wu and
                  Fagen Li and
                  Ting Wu},
  title        = {Multi-User Searchable Symmetric Encryption with Dynamic Updates for
                  Cloud Computing},
  journal      = {Inf.},
  volume       = {9},
  number       = {10},
  pages        = {242},
  year         = {2018},
  url          = {https://doi.org/10.3390/info9100242},
  doi          = {10.3390/INFO9100242},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/GuoFMWLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SaeedLTGL18,
  author       = {Mutaz Elradi S. Saeed and
                  Qingyin Liu and
                  Gui Yun Tian and
                  Bin Gao and
                  Fagen Li},
  title        = {Remote Authentication Schemes for Wireless Body Area Networks Based
                  on the Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {6},
  pages        = {4926--4944},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2876133},
  doi          = {10.1109/JIOT.2018.2876133},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SaeedLTGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/HassanEEL18,
  author       = {Alzubair Hassan and
                  Nabeil Eltayieb and
                  Rashad Elhabob and
                  Fagen Li},
  title        = {An efficient certificateless user authentication and key exchange
                  protocol for client-server environment},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {1713--1727},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12652-017-0622-1},
  doi          = {10.1007/S12652-017-0622-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/HassanEEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/OmalaMMJL18,
  author       = {Anyembe Andrew Omala and
                  Angolo Shem Mbandu and
                  Kamenyi Domenic Mutiria and
                  Chunhua Jin and
                  Fagen Li},
  title        = {Provably Secure Heterogeneous Access Control Scheme for Wireless Body
                  Area Network},
  journal      = {J. Medical Syst.},
  volume       = {42},
  number       = {6},
  pages        = {108},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10916-018-0964-z},
  doi          = {10.1007/S10916-018-0964-Z},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/OmalaMMJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/LiuJL18,
  author       = {Xiaoguang Liu and
                  Chunhua Jin and
                  Fagen Li},
  title        = {An Improved Two-Layer Authentication Scheme for Wireless Body Area
                  Networks},
  journal      = {J. Medical Syst.},
  volume       = {42},
  number       = {8},
  pages        = {143:1--143:14},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10916-018-0990-x},
  doi          = {10.1007/S10916-018-0990-X},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/LiuJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/FuNWL18,
  author       = {Xingbing Fu and
                  Xuyun Nie and
                  Ting Wu and
                  Fagen Li},
  title        = {Large universe attribute based access control with efficient decryption
                  in cloud storage system},
  journal      = {J. Syst. Softw.},
  volume       = {135},
  pages        = {157--164},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jss.2017.10.020},
  doi          = {10.1016/J.JSS.2017.10.020},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/FuNWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OmalaAL18,
  author       = {Anyembe Andrew Omala and
                  Ikram Ali and
                  Fagen Li},
  title        = {Heterogeneous signcryption with keyword search for wireless body area
                  network},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.25},
  doi          = {10.1002/SPY2.25},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/OmalaAL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiaoHLJZ18,
  author       = {Yongjian Liao and
                  Yichuan He and
                  Fagen Li and
                  Shaoquan Jiang and
                  Shijie Zhou},
  title        = {Analysis of an {ABE} Scheme with Verifiable Outsourced Decryption},
  journal      = {Sensors},
  volume       = {18},
  number       = {1},
  pages        = {176},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18010176},
  doi          = {10.3390/S18010176},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LiaoHLJZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiHJ18,
  author       = {Fagen Li and
                  Yanan Han and
                  Chunhua Jin},
  title        = {Cost-Effective and Anonymous Access Control for Wireless Body Area
                  Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {1},
  pages        = {747--758},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2016.2557850},
  doi          = {10.1109/JSYST.2016.2557850},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LiHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/WangLW18,
  author       = {Qihua Wang and
                  Fagen Li and
                  Huaqun Wang},
  title        = {An Anonymous Multireceiver with Online/Offline Identity-Based Encryption},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {5702068:1--5702068:10},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5702068},
  doi          = {10.1155/2018/5702068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/WangLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LiHO18,
  author       = {Fagen Li and
                  Jiaojiao Hong and
                  Anyembe Andrew Omala},
  title        = {Practical deniable authentication for pervasive computing environments},
  journal      = {Wirel. Networks},
  volume       = {24},
  number       = {1},
  pages        = {139--149},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11276-016-1317-9},
  doi          = {10.1007/S11276-016-1317-9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/LiHO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/SaeedLTGL18,
  author       = {Mutaz Elradi S. Saeed and
                  Qingyin Liu and
                  GuiYun Tian and
                  Bin Gao and
                  Fagen Li},
  title        = {{HOOSC:} heterogeneous online/offline signcryption for the Internet
                  of Things},
  journal      = {Wirel. Networks},
  volume       = {24},
  number       = {8},
  pages        = {3141--3160},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11276-017-1524-z},
  doi          = {10.1007/S11276-017-1524-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/SaeedLTGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/EltayiebEHL18,
  author       = {Nabeil Eltayieb and
                  Rashad Elhabob and
                  Alzubair Hassan and
                  Fagen Li},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Fine-Grained Attribute-Based Encryption Scheme Supporting Equality
                  Test},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_18},
  doi          = {10.1007/978-3-030-05063-4\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/EltayiebEHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fcs2/2018,
  editor       = {Fagen Li and
                  Tsuyoshi Takagi and
                  Chunxiang Xu and
                  Xiaosong Zhang},
  title        = {Frontiers in Cyber Security - First International Conference, {FCS}
                  2018, Chengdu, China, November 5-7, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {879},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-3095-7},
  doi          = {10.1007/978-981-13-3095-7},
  isbn         = {978-981-13-3094-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/LiLH17,
  author       = {Fagen Li and
                  Bo Liu and
                  Jiaojiao Hong},
  title        = {An efficient signcryption for data access control in cloud computing},
  journal      = {Computing},
  volume       = {99},
  number       = {5},
  pages        = {465--479},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00607-017-0548-7},
  doi          = {10.1007/S00607-017-0548-7},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/LiLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiHO17,
  author       = {Fagen Li and
                  Jiaojiao Hong and
                  Anyembe Andrew Omala},
  title        = {Efficient certificateless access control for industrial Internet of
                  Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {76},
  pages        = {285--292},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.12.036},
  doi          = {10.1016/J.FUTURE.2016.12.036},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FuNL17,
  author       = {Xingbing Fu and
                  Xunyun Nie and
                  Fagen Li},
  title        = {Outsource the Ciphertext Decryption of Inner Product Predicate Encryption
                  Scheme Based on Prime Order Bilinear Map},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {313--322},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p313-322.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FuNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangYLX17,
  author       = {Yilei Wang and
                  Dongjie Yan and
                  Fagen Li and
                  Hu Xiong},
  title        = {A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud
                  Environment},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {623--630},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p623-630.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangYLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WahballaWLIX17,
  author       = {Osman Wahballa and
                  Abubaker Wahaballa and
                  Fagen Li and
                  Idris Ibn Idris and
                  Chunxiang Xu},
  title        = {Medical Image Encryption Scheme Based on Arnold Transformation and
                  {ID-AK} Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {776--784},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p776-784.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WahballaWLIX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/OmalaKL17,
  author       = {Anyembe Andrew Omala and
                  Kittur P. Kibiwott and
                  Fagen Li},
  title        = {An Efficient Remote Authentication Scheme for Wireless Body Area Network},
  journal      = {J. Medical Syst.},
  volume       = {41},
  number       = {2},
  pages        = {25:1--25:9},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10916-016-0670-7},
  doi          = {10.1007/S10916-016-0670-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/OmalaKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LiHJ17,
  author       = {Fagen Li and
                  Yanan Han and
                  Chunhua Jin},
  title        = {Certificateless online/offline signcryption for the Internet of Things},
  journal      = {Wirel. Networks},
  volume       = {23},
  number       = {1},
  pages        = {145--158},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11276-015-1145-3},
  doi          = {10.1007/S11276-015-1145-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/LiHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/HassanEEL17,
  author       = {Alzubair Hassan and
                  Nabeil Eltayieb and
                  Rashad Elhabob and
                  Fagen Li},
  editor       = {Leonard Barolli and
                  Mingwu Zhang and
                  Xu An Wang},
  title        = {A Provably Secure Certificateless User Authentication Protocol for
                  Mobile Client-Server Environment},
  booktitle    = {Advances in Internetworking, Data {\&} Web Technologies, The 5th
                  International Conference on Emerging Internetworking, Data {\&}
                  Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {6},
  pages        = {592--602},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59463-7\_59},
  doi          = {10.1007/978-3-319-59463-7\_59},
  timestamp    = {Mon, 03 Apr 2023 12:49:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eidwt/HassanEEL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitam/ZhouLHL17,
  author       = {Yuyang Zhou and
                  Zhaoqi Li and
                  Fei Hu and
                  Fagen Li},
  editor       = {Peeyush Chandra and
                  Debasis Giri and
                  Fagen Li and
                  Samarjit Kar and
                  Dipak Kumar Jana},
  title        = {Identity-Based Combined Public Key Schemes for Signature, Encryption,
                  and Signcryption},
  booktitle    = {Information Technology and Applied Mathematics - {ICITAM} 2017, Haldia,
                  Purba Medinipur, West Bengal, India, October 30 - November 1, 2017},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {699},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-7590-2\_1},
  doi          = {10.1007/978-981-10-7590-2\_1},
  timestamp    = {Sat, 02 Feb 2019 10:37:17 +0100},
  biburl       = {https://dblp.org/rec/conf/icitam/ZhouLHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiHJ16,
  author       = {Fagen Li and
                  Yanan Han and
                  Chunhua Jin},
  title        = {Practical access control for sensor networks in the context of the
                  Internet of Things},
  journal      = {Comput. Commun.},
  volume       = {89-90},
  pages        = {154--164},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2016.03.007},
  doi          = {10.1016/J.COMCOM.2016.03.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/LiHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RamadanLXMAA16,
  author       = {Mohammed Ramadan and
                  Fagen Li and
                  Chunxiang Xu and
                  Abdeldime Mohamed and
                  Hisham Abdalla and
                  Ahmed Abdalla Ali},
  title        = {User-to-User Mutual Authentication and Key Agreement Scheme for {LTE}
                  Cellular System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {769--781},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p769-781.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RamadanLXMAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WahballaWLX16,
  author       = {Osman Wahballa and
                  Abubaker Wahaballa and
                  Fagen Li and
                  Chunxiang Xu},
  title        = {A Secure and Robust Certificateless Public Key Steganography Based
                  on {SVD-DDWT}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {888--899},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n5/ijns-2016-v18-n5-p888-899.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WahballaWLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WahaballaXLQQ16,
  author       = {Abubaker Wahaballa and
                  Hu Xiong and
                  Fagen Li and
                  Zhen Qin and
                  Zhiguang Qin},
  title        = {Secure mobile agent-based English auction protocol using identity-based
                  signature scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {175--187},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079281},
  doi          = {10.1504/IJSN.2016.079281},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WahaballaXLQQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/JinXZL16,
  author       = {Chunhua Jin and
                  Chunxiang Xu and
                  Xiaojun Zhang and
                  Fagen Li},
  title        = {A Secure ECC-based {RFID} Mutual Authentication Protocol to Enhance
                  Patient Medication Safety},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {1},
  pages        = {12:1--12:6},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-015-0362-8},
  doi          = {10.1007/S10916-015-0362-8},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/JinXZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/OmalaRL16,
  author       = {Anyembe Andrew Omala and
                  Niyifasha Robert and
                  Fagen Li},
  title        = {A Provably-Secure Transmission Scheme for Wireless Body Area Networks},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {11},
  pages        = {247:1--247:14},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-016-0615-1},
  doi          = {10.1007/S10916-016-0615-1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/OmalaRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangYLWC16,
  author       = {Qihua Wang and
                  Chang Wu Yu and
                  Fagen Li and
                  Huaqun Wang and
                  Lijie Cao},
  title        = {A group key-policy attribute-based encryption with partial outsourcing
                  decryption in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4138--4150},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1594},
  doi          = {10.1002/SEC.1594},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangYLWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/RamadanDLX16,
  author       = {Mohammed Ramadan and
                  Guo{-}hong Du and
                  Fagen Li and
                  Chunxiang Xu},
  title        = {A Survey of Public Key Infrastructure-Based Security for Mobile Communication
                  Systems},
  journal      = {Symmetry},
  volume       = {8},
  number       = {9},
  pages        = {85},
  year         = {2016},
  url          = {https://doi.org/10.3390/sym8090085},
  doi          = {10.3390/SYM8090085},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/RamadanDLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LiZJ16,
  author       = {Fagen Li and
                  Zhaohui Zheng and
                  Chunhua Jin},
  title        = {Secure and efficient data transmission in the Internet of Things},
  journal      = {Telecommun. Syst.},
  volume       = {62},
  number       = {1},
  pages        = {111--122},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11235-015-0065-y},
  doi          = {10.1007/S11235-015-0065-Y},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LiZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LiZJ16a,
  author       = {Fagen Li and
                  Zhaohui Zheng and
                  Chunhua Jin},
  title        = {Identity-based deniable authenticated encryption and its application
                  to e-mail system},
  journal      = {Telecommun. Syst.},
  volume       = {62},
  number       = {4},
  pages        = {625--639},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11235-015-0099-1},
  doi          = {10.1007/S11235-015-0099-1},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LiZJ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZT16,
  author       = {Fagen Li and
                  Di Zhong and
                  Tsuyoshi Takagi},
  title        = {Efficient Deniably Authenticated Encryption and Its Application to
                  E-Mail},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2477--2486},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585086},
  doi          = {10.1109/TIFS.2016.2585086},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiHJ16,
  author       = {Fagen Li and
                  Yanan Han and
                  Chunhua Jin},
  title        = {Practical Signcryption for Secure Communication of Wireless Sensor
                  Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {89},
  number       = {4},
  pages        = {1391--1412},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-016-3327-4},
  doi          = {10.1007/S11277-016-3327-4},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/DengHYJLLSLG15,
  author       = {Jizhong Deng and
                  Huasheng Huang and
                  Xiaoli Yu and
                  Ji Jin and
                  Weisen Lin and
                  Fagen Li and
                  Zhijiao Song and
                  Mei Li and
                  Siming Gan},
  title        = {DiSNPindel: improved intra-individual {SNP} and InDel detection in
                  direct amplicon sequencing of a diploid},
  journal      = {{BMC} Bioinform.},
  volume       = {16},
  pages        = {343:1--343:8},
  year         = {2015},
  url          = {https://doi.org/10.1186/s12859-015-0790-y},
  doi          = {10.1186/S12859-015-0790-Y},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/DengHYJLLSLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/IslamL15,
  author       = {SK Hafizul Islam and
                  Fagen Li},
  title        = {Leakage-Free and Provably Secure Certificateless Signcryption Scheme
                  Using Bilinear Pairings},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2636--2648},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv002},
  doi          = {10.1093/COMJNL/BXV002},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/IslamL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JinXZL15,
  author       = {Chunhua Jin and
                  Chunxiang Xu and
                  Xiaojun Zhang and
                  Fagen Li},
  title        = {An efficient certificateless deniable authentication protocol without
                  pairings},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {7},
  number       = {2},
  pages        = {179--196},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJESDF.2015.069611},
  doi          = {10.1504/IJESDF.2015.069611},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/JinXZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GengXQL15,
  author       = {Ji Geng and
                  Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {On the Security of a Provably Secure Certificate Based Ring Signature
                  Without Pairing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {129--134},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p129-134.pdf},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GengXQL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FuZL15,
  author       = {Xingbing Fu and
                  Shengke Zeng and
                  Fagen Li},
  title        = {Blind Expressive Ciphertext Policy Attribute Based Encryption for
                  Fine Grained Access Control on the Encrypted Data},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {661--671},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p661-671.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/FuNL15,
  author       = {Xingbing Fu and
                  Xuyun Nie and
                  Fagen Li},
  title        = {Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme},
  journal      = {Inf.},
  volume       = {6},
  number       = {3},
  pages        = {481--493},
  year         = {2015},
  url          = {https://doi.org/10.3390/info6030481},
  doi          = {10.3390/INFO6030481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/FuNL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WuL15,
  author       = {Weifeng Wu and
                  Fagen Li},
  title        = {An Efficient Identity-Based Deniable Authenticated Encryption Scheme},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {9},
  number       = {5},
  pages        = {1904--1919},
  year         = {2015},
  url          = {https://doi.org/10.3837/tiis.2015.05.020},
  doi          = {10.3837/TIIS.2015.05.020},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/XiongWLQ15,
  author       = {Hu Xiong and
                  Songyang Wu and
                  Fagen Li and
                  Zhiguang Qin},
  title        = {Compact Leakage-Free ID-Based Signature Scheme with Applications to
                  Secret Handshakes},
  journal      = {Wirel. Pers. Commun.},
  volume       = {80},
  number       = {4},
  pages        = {1671--1685},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-014-2106-3},
  doi          = {10.1007/S11277-014-2106-3},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/XiongWLQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/JinXJL15,
  author       = {Chunhua Jin and
                  Chunxiang Xu and
                  Linzhi Jiang and
                  Fagen Li},
  title        = {ID-Based Deniable Threshold Ring Authentication},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1779--1784},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.149},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.149},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/JinXJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/LiXJ14,
  author       = {Fagen Li and
                  Pan Xiong and
                  Chunhua Jin},
  title        = {Identity-based deniable authentication for ad hoc networks},
  journal      = {Computing},
  volume       = {96},
  number       = {9},
  pages        = {843--853},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00607-013-0321-5},
  doi          = {10.1007/S00607-013-0321-5},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/LiXJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangLH14,
  author       = {Baocang Wang and
                  Fagen Li and
                  Yupu Hu},
  title        = {Improvement on a Knapsack-Based Probabilistic Encryption Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {421--424},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.421},
  doi          = {10.1587/TRANSFUN.E97.A.421},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NiePBL14,
  author       = {Xuyun Nie and
                  Albrecht Petzoldt and
                  Johannes Buchmann and
                  Fagen Li},
  title        = {Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {9},
  pages        = {1952--1961},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1952},
  doi          = {10.1587/TRANSFUN.E97.A.1952},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NiePBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/QinXL14,
  author       = {Zhiguang Qin and
                  Hu Xiong and
                  Fagen Li},
  title        = {A Provably Secure Certificate Based Ring Signature Without Pairing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {278--285},
  year         = {2014},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n4/ijns-2014-v16-n4-p278-285.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/QinXL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/AliAZLQA14,
  author       = {Mohamed Ali and
                  Hamza Ali and
                  Ting Zhong and
                  Fagen Li and
                  Zhiguan Qin and
                  Ahmed Abdelrahaman A. A.},
  editor       = {Xingang Liu and
                  Didier El Baz and
                  Ching{-}Hsien Hsu and
                  Kai Kang and
                  Weifeng Chen},
  title        = {Broadcast Searchable Keyword Encryption},
  booktitle    = {17th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014},
  pages        = {1010--1016},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSE.2014.201},
  doi          = {10.1109/CSE.2014.201},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/AliAZLQA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/XiongZCL13,
  author       = {Hu Xiong and
                  Guobin Zhu and
                  Zhong Chen and
                  Fagen Li},
  title        = {Efficient communication scheme with confidentiality and privacy for
                  vehicular networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {6},
  pages        = {1717--1725},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2012.11.009},
  doi          = {10.1016/J.COMPELECENG.2012.11.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/XiongZCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiMKT13,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  Tsuyoshi Takagi},
  title        = {Lattice-based signcryption},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {25},
  number       = {14},
  pages        = {2112--2122},
  year         = {2013},
  url          = {https://doi.org/10.1002/cpe.2826},
  doi          = {10.1002/CPE.2826},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiMKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoXLZ13,
  author       = {Jining Zhao and
                  Chunxiang Xu and
                  Fagen Li and
                  Wenzheng Zhang},
  title        = {Identity-Based Public Verification with Privacy-Preserving for Data
                  Storage Security in Cloud Computing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {12},
  pages        = {2709--2716},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.2709},
  doi          = {10.1587/TRANSFUN.E96.A.2709},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoXLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XiongGCL13,
  author       = {Hu Xiong and
                  Zhi Guan and
                  Zhong Chen and
                  Fagen Li},
  title        = {An efficient certificateless aggregate signature with constant pairing
                  computations},
  journal      = {Inf. Sci.},
  volume       = {219},
  pages        = {225--235},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.07.004},
  doi          = {10.1016/J.INS.2012.07.004},
  timestamp    = {Wed, 21 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/XiongGCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XiongLQ13,
  author       = {Hu Xiong and
                  Fagen Li and
                  Zhiguang Qin},
  title        = {Certificateless threshold signature secure in the standard model},
  journal      = {Inf. Sci.},
  volume       = {237},
  pages        = {73--81},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2010.06.010},
  doi          = {10.1016/J.INS.2010.06.010},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/XiongLQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XiongCL13,
  author       = {Hu Xiong and
                  Zhong Chen and
                  Fagen Li},
  title        = {New identity-based three-party authenticated key agreement protocol
                  with provable security},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {927--932},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.001},
  doi          = {10.1016/J.JNCA.2012.10.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XiongCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiST13,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Certificateless hybrid signcryption},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {3-4},
  pages        = {324--343},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.06.011},
  doi          = {10.1016/J.MCM.2012.06.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiT13,
  author       = {Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Secure identity-based signcryption in the standard model},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {11-12},
  pages        = {2685--2694},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2011.06.043},
  doi          = {10.1016/J.MCM.2011.06.043},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiZT13,
  author       = {Fagen Li and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Identity-based partially blind signature in the standard model for
                  electronic cash},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {196--203},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.07.009},
  doi          = {10.1016/J.MCM.2012.07.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuHZL13,
  author       = {Zhenhua Liu and
                  Yupu Hu and
                  Xiangsong Zhang and
                  Fagen Li},
  title        = {Efficient and strongly unforgeable identity-based signature scheme
                  from lattices in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {69--77},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.531},
  doi          = {10.1002/SEC.531},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuHZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiZT13,
  author       = {Fagen Li and
                  Hui Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient Signcryption for Heterogeneous Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {420--429},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221897},
  doi          = {10.1109/JSYST.2012.2221897},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LiZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiT13,
  author       = {Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis and Improvement of Robust Deniable Authentication Protocol},
  journal      = {Wirel. Pers. Commun.},
  volume       = {69},
  number       = {4},
  pages        = {1391--1398},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11277-012-0640-4},
  doi          = {10.1007/S11277-012-0640-4},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinXZXL13,
  author       = {Chunhua Jin and
                  Chunxiang Xu and
                  Xiaojun Zhang and
                  Qianna Xie and
                  Fagen Li},
  title        = {A novel certificateless deniable authentication protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinXZXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiLQT12,
  author       = {Fagen Li and
                  Yongjian Liao and
                  Zhiguang Qin and
                  Tsuyoshi Takagi},
  title        = {Further improvement of an identity-based signcryption scheme in the
                  standard model},
  journal      = {Comput. Electr. Eng.},
  volume       = {38},
  number       = {2},
  pages        = {413--421},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.11.001},
  doi          = {10.1016/J.COMPELECENG.2011.11.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LiLQT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/XiongCL12,
  author       = {Hu Xiong and
                  Zhong Chen and
                  Fagen Li},
  title        = {Efficient and multi-level privacy-preserving communication protocol
                  for {VANET}},
  journal      = {Comput. Electr. Eng.},
  volume       = {38},
  number       = {3},
  pages        = {573--581},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.11.009},
  doi          = {10.1016/J.COMPELECENG.2011.11.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/XiongCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiZT12,
  author       = {Fagen Li and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient signcryption in the standard model},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {17},
  pages        = {1977--1989},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1823},
  doi          = {10.1002/CPE.1823},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/XiongCL12,
  author       = {Hu Xiong and
                  Zhong Chen and
                  Fagen Li},
  title        = {Bidder-anonymous English auction protocol based on revocable ring
                  signature},
  journal      = {Expert Syst. Appl.},
  volume       = {39},
  number       = {8},
  pages        = {7062--7066},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.eswa.2012.01.040},
  doi          = {10.1016/J.ESWA.2012.01.040},
  timestamp    = {Wed, 21 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/XiongCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiK12,
  author       = {Fagen Li and
                  Muhammad Khurram Khan},
  title        = {A biometric identity-based signcryption scheme},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {306--310},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.future.2010.11.004},
  doi          = {10.1016/J.FUTURE.2010.11.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/XiongWL12,
  author       = {Hu Xiong and
                  Xiaofeng Wang and
                  Fagen Li},
  title        = {Security Flaw of an Improved User Authentication Scheme with User
                  Anonymity for Wireless Communications},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {256--258},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.256},
  doi          = {10.1587/TRANSFUN.E95.A.256},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/XiongWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangTYL12,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi and
                  Bo Yang and
                  Fagen Li},
  title        = {Cryptanalysis of Strong Designated Verifier Signature Scheme with
                  Non-delegatability and Non-transferability},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {259--262},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.259},
  doi          = {10.1587/TRANSFUN.E95.A.259},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangTYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangLT12,
  author       = {Mingwu Zhang and
                  Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Analysis and Improvement of a Secret Broadcast with Binding Encryption
                  in Broadcasting Networks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {2},
  pages        = {686--689},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.686},
  doi          = {10.1587/TRANSINF.E95.D.686},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiKAT12,
  author       = {Fagen Li and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Tsuyoshi Takagi},
  title        = {Identity-based online/offline signcryption for low power devices},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {1},
  pages        = {340--347},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.08.001},
  doi          = {10.1016/J.JNCA.2011.08.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiKAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/XiongCL12,
  author       = {Hu Xiong and
                  Zhong Chen and
                  Fagen Li},
  title        = {Provably secure and efficient certificateless authenticated tripartite
                  key agreement protocol},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {3-4},
  pages        = {1213--1221},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.10.001},
  doi          = {10.1016/J.MCM.2011.10.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/XiongCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiongCL12,
  author       = {Hu Xiong and
                  Zhong Chen and
                  Fagen Li},
  title        = {Efficient privacy-preserving authentication protocol for vehicular
                  communications with trustworthy},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1441--1451},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.515},
  doi          = {10.1002/SEC.515},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiongCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/LiZT12,
  author       = {Fagen Li and
                  Di Zhong and
                  Tsuyoshi Takagi},
  title        = {Practical Identity-Based Signature for Wireless Sensor Networks},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {1},
  number       = {6},
  pages        = {637--640},
  year         = {2012},
  url          = {https://doi.org/10.1109/WCL.2012.091312.120488},
  doi          = {10.1109/WCL.2012.091312.120488},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/LiZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/XiongHCL11,
  author       = {Hu Xiong and
                  Jian{-}bin Hu and
                  Zhong Chen and
                  Fagen Li},
  title        = {On the security of an identity based multi-proxy signature scheme},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {2},
  pages        = {129--135},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.01.006},
  doi          = {10.1016/J.COMPELECENG.2011.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/XiongHCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/XiongQL11,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {Cryptanalysis of an Identity Based Signcryption without Random Oracles},
  journal      = {Fundam. Informaticae},
  volume       = {107},
  number       = {1},
  pages        = {105--109},
  year         = {2011},
  url          = {https://doi.org/10.3233/FI-2011-395},
  doi          = {10.3233/FI-2011-395},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/XiongQL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiLQ11,
  author       = {Fagen Li and
                  Yongjian Liao and
                  Zhiguang Qin},
  title        = {Analysis of an Identity-Based Signcryption Scheme in the Standard
                  Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {268--269},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.268},
  doi          = {10.1587/TRANSFUN.E94.A.268},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiLQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiDT11,
  author       = {Fagen Li and
                  Jiang Deng and
                  Tsuyoshi Takagi},
  title        = {An Improved Authenticated Encryption Scheme},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {11},
  pages        = {2171--2172},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.2171},
  doi          = {10.1587/TRANSINF.E94.D.2171},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongQL11,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {A Certificateless Proxy Ring Signature Scheme with Provable Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {92--106},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p92-106.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongQL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiMZT11,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Efficient Identity-Based Signcryption in the Standard Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_10},
  doi          = {10.1007/978-3-642-24316-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiMZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiST10,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis of efficient proxy signature schemes for mobile communication},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {10},
  pages        = {2016--2021},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-4012-y},
  doi          = {10.1007/S11432-010-4012-Y},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongQL10,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {Identity-based Threshold Signature Secure in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {75--80},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p75-80.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongQL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/XiongLQ10,
  author       = {Hu Xiong and
                  Fagen Li and
                  Zhiguang Qin},
  title        = {A Provably Secure Proxy Signature Scheme in Certificateless Cryptography},
  journal      = {Informatica},
  volume       = {21},
  number       = {2},
  pages        = {277--294},
  year         = {2010},
  url          = {http://content.iospress.com/articles/informatica/info21-2-09},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/XiongLQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongQL09,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {An Anonymous Sealed-bid Electronic Auction Based on Ring Signature},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {235--242},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n3/ijns-2009-v8-n3-p235-242.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongQL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiST09,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Identity-Based Hybrid Signcryption},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {534--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.44},
  doi          = {10.1109/ARES.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SunXLY09,
  author       = {Ying Sun and
                  Chunxiang Xu and
                  Fagen Li and
                  Yong Yu},
  title        = {Identity Based Multi-proxy Multi-signcryption Scheme for Electronic
                  Commerce},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {281--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.166},
  doi          = {10.1109/IAS.2009.166},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SunXLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/FanZL09,
  author       = {Chengyu Fan and
                  Shijie Zhou and
                  Fagen Li},
  title        = {An Identity-Based Restricted Deniable Authentication Protocol},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
                  2009},
  pages        = {474--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISPA.2009.113},
  doi          = {10.1109/ISPA.2009.113},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/FanZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiST09,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Certificateless Hybrid Signcryption},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_11},
  doi          = {10.1007/978-3-642-00843-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST09,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Certificateless Hybrid Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST09a,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Identity-Based Hybrid Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiXH08,
  author       = {Fagen Li and
                  Xiangjun Xin and
                  Yupu Hu},
  title        = {Indentity-based broadcast signcryption},
  journal      = {Comput. Stand. Interfaces},
  volume       = {30},
  number       = {1-2},
  pages        = {89--94},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.csi.2007.08.005},
  doi          = {10.1016/J.CSI.2007.08.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/XiongQL08,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {An Improved Certificateless Signature Scheme Secure in the Standard
                  Model},
  journal      = {Fundam. Informaticae},
  volume       = {88},
  number       = {1-2},
  pages        = {193--206},
  year         = {2008},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi88-1-2-09},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/XiongQL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiZS08,
  author       = {Fagen Li and
                  Shijie Zhou and
                  Rong Sun},
  title        = {Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {7},
  pages        = {1820--1823},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.7.1820},
  doi          = {10.1093/IETFEC/E91-A.7.1820},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiXH08,
  author       = {Fagen Li and
                  Xiangjun Xin and
                  Yupu Hu},
  title        = {ID-based threshold proxy signcryption scheme from bilinear pairings},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {206--215},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020095},
  doi          = {10.1504/IJSN.2008.020095},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {On the Security of Online/Offline Signatures and Multisignatures from
                  ACISP'06},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {108--119},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_8},
  doi          = {10.1007/978-3-540-89641-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XiongQL08,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {Simulatability and Security of Certificateless Threshold Signatures
                  without Random Oracles},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop
                  Papers},
  pages        = {308--313},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.104},
  doi          = {10.1109/CIS.2008.104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XiongQL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Signcryption Key Encapsulation without Random Oracles},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_6},
  doi          = {10.1007/978-3-642-01440-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiST08a,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_23},
  doi          = {10.1007/978-3-642-01440-6\_23},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiST08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/FanZL08,
  author       = {Chengyu Fan and
                  Shijie Zhou and
                  Fagen Li},
  title        = {Deniable Proxy-Anonymous Signatures},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2131--2136},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.297},
  doi          = {10.1109/ICYCS.2008.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/FanZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Jian Cao and
                  Minglu Li and
                  Min{-}You Wu and
                  Jinjun Chen},
  title        = {Key Management Using Certificateless Public Key Cryptography in Ad
                  Hoc Networks},
  booktitle    = {Network and Parallel Computing, {IFIP} International Conference, {NPC}
                  2008, Shanghai, China, October 18-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5245},
  pages        = {116--126},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88140-7\_11},
  doi          = {10.1007/978-3-540-88140-7\_11},
  timestamp    = {Sun, 28 Feb 2021 15:43:32 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiY08,
  author       = {Fagen Li and
                  Yong Yu},
  title        = {An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Analysis and Improvement of Authenticatable Ring Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYL08,
  author       = {Xu An Wang and
                  Xiaoyuan Yang and
                  Fagen Li},
  title        = {On the Role of {PKG} for Proxy Re-encryption in Identity Based Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/410},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LiH07,
  author       = {Fagen Li and
                  Yupu Hu},
  title        = {Security Analysis of the Pomykala-Barabasz Scheme},
  journal      = {Fundam. Informaticae},
  volume       = {80},
  number       = {4},
  pages        = {453--459},
  year         = {2007},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi80-4-06},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/LiH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/LiXH07,
  author       = {Fagen Li and
                  Xiangjun Xin and
                  Yupu Hu},
  title        = {Key management in ad hoc networks using self-certified public key
                  system},
  journal      = {Int. J. Mob. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {94--106},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJMC.2007.011491},
  doi          = {10.1504/IJMC.2007.011491},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmc/LiXH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiHZ07,
  author       = {Fagen Li and
                  Yupu Hu and
                  Chuanrong Zhang},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {373--384},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_24},
  doi          = {10.1007/978-3-540-72738-5\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiHZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/YangYLS07,
  author       = {Bo Yang and
                  Yong Yu and
                  Fagen Li and
                  Ying Sun},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {Provably Secure Identity-Based Threshold Unsigncryption Scheme},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {114--122},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_14},
  doi          = {10.1007/978-3-540-73547-2\_14},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/YangYLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiXH06,
  author       = {Fagen Li and
                  Xiangjun Xin and
                  Yupu Hu},
  title        = {ID-based Signcryption Scheme with (t, n) Shared Unsigncryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {155--159},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n2/ijns-2006-v3-n2-p155-159.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiXH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiHL06a,
  author       = {Fagen Li and
                  Yupu Hu and
                  Shuanggen Liu},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {ID-Based {(} \emph{t} , \emph{n} {)} Threshold Proxy Signcryption
                  for Multi-agent Systems},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {406--416},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_43},
  doi          = {10.1007/978-3-540-74377-4\_43},
  timestamp    = {Tue, 19 Nov 2019 12:34:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiHL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiHL06,
  author       = {Fagen Li and
                  Yupu Hu and
                  Shuanggen Liu},
  title        = {Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiGH05,
  author       = {Fagen Li and
                  Juntao Gao and
                  Yupu Hu},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {ID-Based Threshold Unsigncryption Scheme from Pairings},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {242--253},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_21},
  doi          = {10.1007/11599548\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics