BibTeX records: Feng Bao 0001

download as .bib file

@article{DBLP:journals/fgcs/LopezRBW17,
  author    = {Javier L{\'{o}}pez and
               Ruben Rios and
               Feng Bao and
               Guilin Wang},
  title     = {Evolving privacy: From sensors to the Internet of Things},
  journal   = {Future Generation Comp. Syst.},
  volume    = {75},
  pages     = {46--57},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.future.2017.04.045},
  doi       = {10.1016/j.future.2017.04.045},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/LopezRBW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/SuhendraWSZB16,
  author    = {Vivy Suhendra and
               Yongdong Wu and
               Hendra Saputra and
               Zhigang Zhao and
               Feng Bao},
  title     = {Lightweight Key Management Protocols for Smart Grids},
  booktitle = {2016 {IEEE} International Conference on Internet of Things (iThings)
               and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
               Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
               (SmartData), Chengdu, China, December 15-18, 2016},
  pages     = {345--348},
  year      = {2016},
  crossref  = {DBLP:conf/ithings/2016},
  url       = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.82},
  doi       = {10.1109/iThings-GreenCom-CPSCom-SmartData.2016.82},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ithings/SuhendraWSZB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2016,
  editor    = {Feng Bao and
               Liqun Chen and
               Robert H. Deng and
               Guojun Wang},
  title     = {Information Security Practice and Experience - 12th International
               Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10060},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49151-6},
  doi       = {10.1007/978-3-319-49151-6},
  isbn      = {978-3-319-49150-9},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiBFGMNCW16,
  author    = {Simon Cogliani and
               Feng Bao and
               Houda Ferradi and
               R{\'{e}}mi G{\'{e}}raud and
               Diana Maimut and
               David Naccache and
               Rodrigo Portella do Canto and
               Guilin Wang},
  title     = {Public-Key Based Lightweight Swarm Authentication},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {750},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/750},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CoglianiBFGMNCW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZBD15,
  author    = {Yongdong Wu and
               Zhigang Zhao and
               Feng Bao and
               Robert H. Deng},
  title     = {Software Puzzle: {A} Countermeasure to Resource-Inflated Denial-of-Service
               Attacks},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {1},
  pages     = {168--177},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2014.2366293},
  doi       = {10.1109/TIFS.2014.2366293},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/WuZBD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015asia,
  editor    = {Feng Bao and
               Steven Miller and
               Jianying Zhou and
               Gail{-}Joon Ahn},
  title     = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2714576},
  isbn      = {978-1-4503-3245-3},
  timestamp = {Tue, 21 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015scc,
  editor    = {Feng Bao and
               Steven Miller and
               Sherman S. M. Chow and
               Danfeng Yao},
  title     = {Proceedings of the 3rd International Workshop on Security in Cloud
               Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
               14, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2732516},
  doi       = {10.1145/2732516},
  isbn      = {978-1-4503-3447-1},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015scc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuZBTS14,
  author    = {Chunhua Su and
               Jianying Zhou and
               Feng Bao and
               Tsuyoshi Takagi and
               Kouichi Sakurai},
  title     = {Collaborative agglomerative document clustering with limited information
               disclosure},
  journal   = {Security and Communication Networks},
  volume    = {7},
  number    = {6},
  pages     = {964--978},
  year      = {2014},
  url       = {https://doi.org/10.1002/sec.811},
  doi       = {10.1002/sec.811},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/scn/SuZBTS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HanKYBDGLZ13,
  author    = {Jin Han and
               Su Mon Kywe and
               Qiang Yan and
               Feng Bao and
               Robert H. Deng and
               Debin Gao and
               Yingjiu Li and
               Jianying Zhou},
  title     = {Launching Generic Attacks on iOS with Approved Third-Party Applications},
  booktitle = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  pages     = {272--289},
  year      = {2013},
  crossref  = {DBLP:conf/acns/2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1\_17},
  doi       = {10.1007/978-3-642-38980-1\_17},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/HanKYBDGLZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TanakaWLYB13,
  author    = {Naoki Tanaka and
               Marianne Winslett and
               Adam J. Lee and
               David K. Y. Yau and
               Feng Bao},
  title     = {Insured access: an approach to ad-hoc information sharing for virtual
               organizations},
  booktitle = {Third {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages     = {301--308},
  year      = {2013},
  crossref  = {DBLP:conf/codaspy/2013},
  url       = {https://doi.org/10.1145/2435349.2435393},
  doi       = {10.1145/2435349.2435393},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/TanakaWLYB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhuZDB12,
  author    = {Wen Tao Zhu and
               Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Detecting node replication attacks in wireless sensor networks: {A}
               survey},
  journal   = {J. Network and Computer Applications},
  volume    = {35},
  number    = {3},
  pages     = {1022--1034},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jnca.2012.01.002},
  doi       = {10.1016/j.jnca.2012.01.002},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/ZhuZDB12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuZDB12,
  author    = {Wen Tao Zhu and
               Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Detecting node replication attacks in mobile sensor networks: theory
               and approaches},
  journal   = {Security and Communication Networks},
  volume    = {5},
  number    = {5},
  pages     = {496--507},
  year      = {2012},
  url       = {https://doi.org/10.1002/sec.338},
  doi       = {10.1002/sec.338},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ZhuZDB12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2012,
  editor    = {Feng Bao and
               Pierangela Samarati and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7341},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31284-7},
  doi       = {10.1007/978-3-642-31284-7},
  isbn      = {978-3-642-31283-0},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PengDB11,
  author    = {Kun Peng and
               Ed Dawson and
               Feng Bao},
  title     = {Modification and optimisation of a shuffling scheme: stronger security,
               formal analysis and higher efficiency},
  journal   = {Int. J. Inf. Sec.},
  volume    = {10},
  number    = {1},
  pages     = {33--47},
  year      = {2011},
  url       = {https://doi.org/10.1007/s10207-010-0117-y},
  doi       = {10.1007/s10207-010-0117-y},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/PengDB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhuXZDB11,
  author    = {Wen Tao Zhu and
               Yang Xiang and
               Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Secure localization with attack detection in wireless sensor networks},
  journal   = {Int. J. Inf. Sec.},
  volume    = {10},
  number    = {3},
  pages     = {155--171},
  year      = {2011},
  url       = {https://doi.org/10.1007/s10207-011-0127-4},
  doi       = {10.1007/s10207-011-0127-4},
  timestamp = {Sun, 11 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/ZhuXZDB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangZDB11,
  author    = {Yanjiang Yang and
               Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Better security enforcement in trusted computing enabled heterogeneous
               wireless sensor networks},
  journal   = {Security and Communication Networks},
  volume    = {4},
  number    = {1},
  pages     = {11--22},
  year      = {2011},
  url       = {https://doi.org/10.1002/sec.179},
  doi       = {10.1002/sec.179},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/scn/YangZDB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/GuoWBCM11,
  author    = {Huaqun Guo and
               Yongdong Wu and
               Feng Bao and
               Hongmei Chen and
               Maode Ma},
  title     = {{UBAPV2G:} {A} Unique Batch Authentication Protocol for Vehicle-to-Grid
               Communications},
  journal   = {{IEEE} Trans. Smart Grid},
  volume    = {2},
  number    = {4},
  pages     = {707--714},
  year      = {2011},
  url       = {https://doi.org/10.1109/TSG.2011.2168243},
  doi       = {10.1109/TSG.2011.2168243},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tsg/GuoWBCM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaoDDLZ11,
  author    = {Feng Bao and
               Robert H. Deng and
               Xuhua Ding and
               Junzuo Lai and
               Yunlei Zhao},
  title     = {Hierarchical Identity-Based Chameleon Hash and Its Applications},
  booktitle = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  pages     = {201--219},
  year      = {2011},
  crossref  = {DBLP:conf/acns/2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4\_12},
  doi       = {10.1007/978-3-642-21554-4\_12},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/BaoDDLZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/PengB11,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Analysing a Batch Range Proof to Address a Security Concern},
  booktitle = {14th {IEEE} International Conference on Computational Science and
               Engineering, {CSE} 2011, Dalian, China, August 24-26, 2011},
  pages     = {68--72},
  year      = {2011},
  crossref  = {DBLP:conf/cse/2011},
  url       = {https://doi.org/10.1109/CSE.2011.26},
  doi       = {10.1109/CSE.2011.26},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cse/PengB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhuDZB11,
  author    = {Wen Tao Zhu and
               Robert H. Deng and
               Jianying Zhou and
               Feng Bao},
  title     = {Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor
               Networks},
  booktitle = {Information and Communications Security - 13th International Conference,
               {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  pages     = {306--318},
  year      = {2011},
  crossref  = {DBLP:conf/icics/2011},
  url       = {https://doi.org/10.1007/978-3-642-25243-3\_25},
  doi       = {10.1007/978-3-642-25243-3\_25},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhuDZB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/ZhangZWB11,
  author    = {Kun Zhang and
               Hong Zhang and
               Yongdong Wu and
               Feng Bao},
  title     = {Evaluating the importance of nodes in complex networks based on principal
               component analysis and grey relational analysis},
  booktitle = {Proceedings of the 17th {IEEE} International Conference on Networks,
               {ICON} 2011, Singapore, December 14-16, 2011},
  pages     = {231--235},
  year      = {2011},
  crossref  = {DBLP:conf/icon/2011},
  url       = {https://doi.org/10.1109/ICON.2011.6168480},
  doi       = {10.1109/ICON.2011.6168480},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icon/ZhangZWB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/LiuBZ11,
  author    = {Joseph K. Liu and
               Feng Bao and
               Jianying Zhou},
  title     = {Short and Efficient Certificate-Based Signature},
  booktitle = {{NETWORKING} 2011 Workshops - International {IFIP} {TC} 6 Workshops,
               PE-CRN, NC-Pro, WCNS, and {SUNSET} 2011, Held at {NETWORKING} 2011,
               Valencia, Spain, May 13, 2011, Revised Selected Papers},
  pages     = {167--178},
  year      = {2011},
  crossref  = {DBLP:conf/networking/2011w},
  url       = {https://doi.org/10.1007/978-3-642-23041-7\_17},
  doi       = {10.1007/978-3-642-23041-7\_17},
  timestamp = {Fri, 02 Nov 2018 09:39:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/networking/LiuBZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2009,
  editor    = {Feng Bao and
               Moti Yung and
               Dongdai Lin and
               Jiwu Jing},
  title     = {Information Security and Cryptology - 5th International Conference,
               Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6151},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-16342-5},
  doi       = {10.1007/978-3-642-16342-5},
  isbn      = {978-3-642-16341-8},
  timestamp = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2011,
  editor    = {Feng Bao and
               Jian Weng},
  title     = {Information Security Practice and Experience - 7th International Conference,
               {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6672},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21031-0},
  doi       = {10.1007/978-3-642-21031-0},
  isbn      = {978-3-642-21030-3},
  timestamp = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZ11,
  author    = {Joseph K. Liu and
               Feng Bao and
               Jianying Zhou},
  title     = {Short and Efficient Certificate-Based Signature},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {192},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/192},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LiuBZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WengCYDCB10,
  author    = {Jian Weng and
               Min{-}Rong Chen and
               Yanjiang Yang and
               Robert H. Deng and
               Kefei Chen and
               Feng Bao},
  title     = {CCA-secure unidirectional proxy re-encryption in the adaptive corruption
               model without random oracles},
  journal   = {{SCIENCE} {CHINA} Information Sciences},
  volume    = {53},
  number    = {3},
  pages     = {593--606},
  year      = {2010},
  url       = {https://doi.org/10.1007/s11432-010-0047-3},
  doi       = {10.1007/s11432-010-0047-3},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/chinaf/WengCYDCB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhuDZB10,
  author    = {Wen Tao Zhu and
               Robert H. Deng and
               Jianying Zhou and
               Feng Bao},
  title     = {Time-Bound Hierarchical Key Assignment: An Overview},
  journal   = {{IEICE} Transactions},
  volume    = {93-D},
  number    = {5},
  pages     = {1044--1052},
  year      = {2010},
  url       = {https://doi.org/10.1587/transinf.E93.D.1044},
  doi       = {10.1587/transinf.E93.D.1044},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/ZhuDZB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLDB10,
  author    = {Yanjiang Yang and
               Yingjiu Li and
               Robert H. Deng and
               Feng Bao},
  title     = {Shifting Inference Control to User Side: Architecture and Protocol},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {189--202},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.70},
  doi       = {10.1109/TDSC.2008.70},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/YangLDB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/YangB10,
  author    = {Yanjiang Yang and
               Feng Bao},
  title     = {Enabling Use of Single Password over Multiple Servers in Two-Server
               Model},
  booktitle = {10th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages     = {846--850},
  year      = {2010},
  crossref  = {DBLP:conf/IEEEcit/2010},
  url       = {https://doi.org/10.1109/CIT.2010.159},
  doi       = {10.1109/CIT.2010.159},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/YangB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Achieving High Efficiency in Membership Proof without Compromising
               or Weakening any Security Property},
  booktitle = {10th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages     = {1044--1049},
  year      = {2010},
  crossref  = {DBLP:conf/IEEEcit/2010},
  url       = {https://doi.org/10.1109/CIT.2010.191},
  doi       = {10.1109/CIT.2010.191},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB10,
  author    = {Yanjiang Yang and
               Jianying Zhou and
               Jun Wen Wong and
               Feng Bao},
  title     = {Towards practical anonymous password authentication},
  booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
               2010, Austin, Texas, USA, 6-10 December 2010},
  pages     = {59--68},
  year      = {2010},
  crossref  = {DBLP:conf/acsac/2010},
  url       = {https://doi.org/10.1145/1920261.1920271},
  doi       = {10.1145/1920261.1920271},
  timestamp = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/YangZWB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Batch Range Proof for Practical Small Ranges},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  pages     = {114--130},
  year      = {2010},
  crossref  = {DBLP:conf/africacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9\_8},
  doi       = {10.1007/978-3-642-12678-9\_8},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuLZBD10,
  author    = {Cheng{-}Kang Chu and
               Joseph K. Liu and
               Jianying Zhou and
               Feng Bao and
               Robert H. Deng},
  title     = {Practical ID-based encryption for wireless sensor network},
  booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
               2010},
  pages     = {337--340},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010asia},
  url       = {https://doi.org/10.1145/1755688.1755734},
  doi       = {10.1145/1755688.1755734},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChuLZBD10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhuB10,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Error-free, Multi-bit Non-committing Encryption with Constant Round
               Complexity},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  pages     = {52--61},
  year      = {2010},
  crossref  = {DBLP:conf/cisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-21518-6\_4},
  doi       = {10.1007/978-3-642-21518-6\_4},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/ZhuB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {A Secure {RFID} Ticket System for Public Transport},
  booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
               {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  pages     = {350--357},
  year      = {2010},
  crossref  = {DBLP:conf/dbsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-13739-6\_27},
  doi       = {10.1007/978-3-642-13739-6\_27},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WuZQB10,
  author    = {Yongdong Wu and
               Zhigang Zhao and
               Ying Qiu and
               Feng Bao},
  title     = {Blocking Foxy Phishing Emails with Historical Information},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages     = {1--5},
  year      = {2010},
  crossref  = {DBLP:conf/icc/2010},
  url       = {https://doi.org/10.1109/ICC.2010.5502086},
  doi       = {10.1109/ICC.2010.5502086},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/WuZQB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GuGYBM10,
  author    = {Liang Gu and
               Yao Guo and
               Yanjiang Yang and
               Feng Bao and
               Hong Mei},
  title     = {Modeling TCG-Based Secure Systems with Colored Petri Nets},
  booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  pages     = {67--86},
  year      = {2010},
  crossref  = {DBLP:conf/intrust/2010},
  url       = {https://doi.org/10.1007/978-3-642-25283-9\_5},
  doi       = {10.1007/978-3-642-25283-9\_5},
  timestamp = {Sat, 14 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/GuGYBM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YangGB10,
  author    = {Yanjiang Yang and
               Liang Gu and
               Feng Bao},
  title     = {Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using
               Trusted Computing},
  booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  pages     = {189--199},
  year      = {2010},
  crossref  = {DBLP:conf/intrust/2010},
  url       = {https://doi.org/10.1007/978-3-642-25283-9\_13},
  doi       = {10.1007/978-3-642-25283-9\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/YangGB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Efficient Multiplicative Homomorphic E-Voting},
  booktitle = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  pages     = {381--393},
  year      = {2010},
  crossref  = {DBLP:conf/isw/2010},
  url       = {https://doi.org/10.1007/978-3-642-18178-8\_32},
  doi       = {10.1007/978-3-642-18178-8\_32},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Efficient Proof of Validity of Votes in Homomorphic E-Voting},
  booktitle = {Fourth International Conference on Network and System Security, {NSS}
               2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages     = {17--23},
  year      = {2010},
  crossref  = {DBLP:conf/nss/2010},
  url       = {https://doi.org/10.1109/NSS.2010.25},
  doi       = {10.1109/NSS.2010.25},
  timestamp = {Sun, 11 Mar 2018 01:37:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nss/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/LiWB10,
  author    = {Qiming Li and
               Yongdong Wu and
               Feng Bao},
  title     = {A Reversible Data Hiding Scheme for {JPEG} Images},
  booktitle = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th
               Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24,
               2010, Proceedings, Part {I}},
  pages     = {653--664},
  year      = {2010},
  crossref  = {DBLP:conf/pcm/2010-1},
  url       = {https://doi.org/10.1007/978-3-642-15702-8\_60},
  doi       = {10.1007/978-3-642-15702-8\_60},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pcm/LiWB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Formal and Precise Analysis of Soundness of Several Shuffling Schemes},
  booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
               Malaysia, October 13-15, 2010. Proceedings},
  pages     = {133--143},
  year      = {2010},
  crossref  = {DBLP:conf/provsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-16280-0\_9},
  doi       = {10.1007/978-3-642-16280-0\_9},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Vulnerability of a Non-membership Proof Scheme},
  booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
               and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  pages     = {419--422},
  year      = {2010},
  crossref  = {DBLP:conf/secrypt/2010},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {A Shuffling Scheme with Strict and Strong Security},
  booktitle = {Fourth International Conference on Emerging Security Information Systems
               and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages     = {201--206},
  year      = {2010},
  crossref  = {DBLP:conf/securware/2010},
  url       = {https://doi.org/10.1109/SECURWARE.2010.40},
  doi       = {10.1109/SECURWARE.2010.40},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securware/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {An Efficient Range Proof Scheme},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {826--833},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.125},
  doi       = {10.1109/SocialCom.2010.125},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ZhuB10,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Private Searching on MapReduce},
  booktitle = {Trust, Privacy and Security in Digital Business, 7th International
               Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  pages     = {93--101},
  year      = {2010},
  crossref  = {DBLP:conf/trustbus/2010},
  url       = {https://doi.org/10.1007/978-3-642-15152-1\_9},
  doi       = {10.1007/978-3-642-15152-1\_9},
  timestamp = {Thu, 04 Jan 2018 22:11:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/ZhuB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Efficiency Improvement of Homomorphic E-Auction},
  booktitle = {Trust, Privacy and Security in Digital Business, 7th International
               Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  pages     = {238--249},
  year      = {2010},
  crossref  = {DBLP:conf/trustbus/2010},
  url       = {https://doi.org/10.1007/978-3-642-15152-1\_21},
  doi       = {10.1007/978-3-642-15152-1\_21},
  timestamp = {Thu, 04 Jan 2018 22:11:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/PengB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuLZBD10,
  author    = {Cheng{-}Kang Chu and
               Joseph K. Liu and
               Jianying Zhou and
               Feng Bao and
               Robert H. Deng},
  title     = {Practical ID-based Encryption for Wireless Sensor Network},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {2},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/002},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChuLZBD10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengCYDCB10,
  author    = {Jian Weng and
               Min{-}Rong Chen and
               Yanjiang Yang and
               Robert H. Deng and
               Kefei Chen and
               Feng Bao},
  title     = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption
               Model without Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {265},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/265},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WengCYDCB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuBZTS09,
  author    = {Chunhua Su and
               Feng Bao and
               Jianying Zhou and
               Tsuyoshi Takagi and
               Kouichi Sakurai},
  title     = {Security and Correctness Analysis on Privacy-Preserving \emph{k}-Means
               Clustering Schemes},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {4},
  pages     = {1246--1250},
  year      = {2009},
  url       = {https://doi.org/10.1587/transfun.E92.A.1246},
  doi       = {10.1587/transfun.E92.A.1246},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/SuBZTS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuBZTS09a,
  author    = {Chunhua Su and
               Feng Bao and
               Jianying Zhou and
               Tsuyoshi Takagi and
               Kouichi Sakurai},
  title     = {Distributed Noise Generation for Density Estimation Based Clustering
               without Trusted Third Party},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {8},
  pages     = {1868--1871},
  year      = {2009},
  url       = {https://doi.org/10.1587/transfun.E92.A.1868},
  doi       = {10.1587/transfun.E92.A.1868},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/SuBZTS09a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YangBDD09,
  author    = {Yanjiang Yang and
               Feng Bao and
               Xuhua Ding and
               Robert H. Deng},
  title     = {Multiuser private queries over encrypted databases},
  journal   = {{IJACT}},
  volume    = {1},
  number    = {4},
  pages     = {309--319},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJACT.2009.028029},
  doi       = {10.1504/IJACT.2009.028029},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/YangBDD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WanDBPG09,
  author    = {Zhiguo Wan and
               Robert H. Deng and
               Feng Bao and
               Bart Preneel and
               Ming Gu},
  title     = {\emph{n} PAKE\({}^{\mbox{+}}\): {A} Tree-Based Group Password-Authenticated
               Key Exchange Protocol Using Different Passwords},
  journal   = {J. Comput. Sci. Technol.},
  volume    = {24},
  number    = {1},
  pages     = {138--151},
  year      = {2009},
  url       = {https://doi.org/10.1007/s11390-009-9207-6},
  doi       = {10.1007/s11390-009-9207-6},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcst/WanDBPG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangDB09,
  author    = {Yanjiang Yang and
               Robert H. Deng and
               Feng Bao},
  title     = {Privacy-preserving rental services using one-show anonymous credentials},
  journal   = {Security and Communication Networks},
  volume    = {2},
  number    = {6},
  pages     = {531--545},
  year      = {2009},
  url       = {https://doi.org/10.1002/sec.97},
  doi       = {10.1002/sec.97},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/scn/YangDB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB09,
  author    = {Yanjiang Yang and
               Jianying Zhou and
               Jian Weng and
               Feng Bao},
  title     = {A New Approach for Anonymous Password Authentication},
  booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
               2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages     = {199--208},
  year      = {2009},
  crossref  = {DBLP:conf/acsac/2009},
  url       = {https://doi.org/10.1109/ACSAC.2009.26},
  doi       = {10.1109/ACSAC.2009.26},
  timestamp = {Thu, 21 Jun 2018 07:14:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/YangZWB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ZhuB09,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Constructing Universally Composable Oblivious Transfers from Double
               Trap-Door Encryptions},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  pages     = {323--333},
  year      = {2009},
  crossref  = {DBLP:conf/africacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2\_20},
  doi       = {10.1007/978-3-642-02384-2\_20},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/ZhuB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/PengB09,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Practicalization of a Range Test and Its Application to E-Auction},
  booktitle = {Public Key Infrastructures, Services and Applications - 6th European
               Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised
               Selected Papers},
  pages     = {179--194},
  year      = {2009},
  crossref  = {DBLP:conf/europki/2009},
  url       = {https://doi.org/10.1007/978-3-642-16441-5\_12},
  doi       = {10.1007/978-3-642-16441-5\_12},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/europki/PengB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/QiuBWY09,
  author    = {Ying Qiu and
               Feng Bao and
               Yongdong Wu and
               Yanjiang Yang},
  title     = {A Lightweight Fast Handover Authentication Scheme in Mobile Networks},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages     = {1--5},
  year      = {2009},
  crossref  = {DBLP:conf/icc/2009},
  url       = {https://doi.org/10.1109/ICC.2009.5198620},
  doi       = {10.1109/ICC.2009.5198620},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/QiuBWY09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WuBQ09,
  author    = {Yongdong Wu and
               Feng Bao and
               Ying Qiu},
  title     = {Tracing Stateful Pirate Decoders},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages     = {1--5},
  year      = {2009},
  crossref  = {DBLP:conf/icc/2009},
  url       = {https://doi.org/10.1109/ICC.2009.5199537},
  doi       = {10.1109/ICC.2009.5199537},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/WuBQ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangZDB09,
  author    = {Yanjiang Yang and
               Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Computationally Secure Hierarchical Self-healing Key Distribution
               for Heterogeneous Wireless Sensor Networks},
  booktitle = {Information and Communications Security, 11th International Conference,
               {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  pages     = {135--149},
  year      = {2009},
  crossref  = {DBLP:conf/icics/2009},
  url       = {https://doi.org/10.1007/978-3-642-11145-7\_12},
  doi       = {10.1007/978-3-642-11145-7\_12},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/YangZDB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhuB09,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Adaptive and Composable Oblivious Transfer Protocols (Short Paper)},
  booktitle = {Information and Communications Security, 11th International Conference,
               {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  pages     = {483--492},
  year      = {2009},
  crossref  = {DBLP:conf/icics/2009},
  url       = {https://doi.org/10.1007/978-3-642-11145-7\_38},
  doi       = {10.1007/978-3-642-11145-7\_38},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhuB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhuB09,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  pages     = {418--429},
  year      = {2009},
  crossref  = {DBLP:conf/indocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6\_27},
  doi       = {10.1007/978-3-642-10628-6\_27},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/ZhuB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WengYTDB09,
  author    = {Jian Weng and
               Yanjiang Yang and
               Qiang Tang and
               Robert H. Deng and
               Feng Bao},
  title     = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security},
  booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  pages     = {151--166},
  year      = {2009},
  crossref  = {DBLP:conf/isw/2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8\_13},
  doi       = {10.1007/978-3-642-04474-8\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/WengYTDB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/YangBW09,
  author    = {Yanjiang Yang and
               Feng Bao and
               Jian Weng},
  title     = {Private handshakes with optional accountability},
  booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
               2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages     = {245--248},
  year      = {2009},
  crossref  = {DBLP:conf/lcn/2009},
  url       = {https://doi.org/10.1109/LCN.2009.5355079},
  doi       = {10.1109/LCN.2009.5355079},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/YangBW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/WuB09,
  author    = {Yongdong Wu and
               Feng Bao},
  title     = {Improving a Digital Rights Management Scheme for Video Broadcast},
  booktitle = {Advances in Multimedia Information Processing - {PCM} 2009, 10th Pacific
               Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009
               Proceedings},
  pages     = {708--718},
  year      = {2009},
  crossref  = {DBLP:conf/pcm/2009},
  url       = {https://doi.org/10.1007/978-3-642-10467-1\_62},
  doi       = {10.1007/978-3-642-10467-1\_62},
  timestamp = {Wed, 14 Nov 2018 10:52:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pcm/WuB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangLWZB09,
  author    = {Yanjiang Yang and
               Yingjiu Li and
               Jian Weng and
               Jianying Zhou and
               Feng Bao},
  title     = {Self-enforcing Private Inference Control},
  booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  pages     = {260--274},
  year      = {2009},
  crossref  = {DBLP:conf/provsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1\_21},
  doi       = {10.1007/978-3-642-04642-1\_21},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/YangLWZB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangZDB09,
  author    = {Yanjiang Yang and
               Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Hierarchical Self-healing Key Distribution for Heterogeneous Wireless
               Sensor Networks},
  booktitle = {Security and Privacy in Communication Networks - 5th International
               {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
               2009, Revised Selected Papers},
  pages     = {285--295},
  year      = {2009},
  crossref  = {DBLP:conf/securecomm/2009},
  url       = {https://doi.org/10.1007/978-3-642-05284-2\_16},
  doi       = {10.1007/978-3-642-05284-2\_16},
  timestamp = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/YangZDB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/PengB09,
  author    = {Kun Peng and
               Feng Bao},
  title     = {A Design of Secure Preferential E-Voting},
  booktitle = {E-Voting and Identity, Second International Conference, {VOTE-ID}
               2009, Luxembourg, September 7-8, 2009. Proceedings},
  pages     = {141--156},
  year      = {2009},
  crossref  = {DBLP:conf/voteid/2009},
  url       = {https://doi.org/10.1007/978-3-642-04135-8\_9},
  doi       = {10.1007/978-3-642-04135-8\_9},
  timestamp = {Wed, 14 Nov 2018 10:59:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/voteid/PengB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PengB09,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness
               and {ZK} Privacy},
  booktitle = {Information Security Applications, 10th International Workshop, {WISA}
               2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  pages     = {118--132},
  year      = {2009},
  crossref  = {DBLP:conf/wisa/2009},
  url       = {https://doi.org/10.1007/978-3-642-10838-9\_10},
  doi       = {10.1007/978-3-642-10838-9\_10},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/PengB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2009,
  editor    = {Feng Bao and
               Hui Li and
               Guilin Wang},
  title     = {Information Security Practice and Experience, 5th International Conference,
               {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5451},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00843-6},
  doi       = {10.1007/978-3-642-00843-6},
  isbn      = {978-3-642-00842-9},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/PengBD08,
  author    = {Kun Peng and
               Feng Bao and
               Ed Dawson},
  title     = {Correct, Private, Flexible and Efficient Range Test},
  journal   = {Journal of Research and Practice in Information Technology},
  volume    = {40},
  number    = {4},
  pages     = {275--289},
  year      = {2008},
  url       = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.275.pdf},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/acj/PengBD08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SuBZTS08,
  author    = {Chunhua Su and
               Feng Bao and
               Jianying Zhou and
               Tsuyoshi Takagi and
               Kouichi Sakurai},
  title     = {A New Scheme for Distributed Density Estimation based Privacy-Preserving
               Clustering},
  booktitle = {Proceedings of the The Third International Conference on Availability,
               Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
               University of Catalonia, Barcelona , Spain},
  pages     = {112--119},
  year      = {2008},
  crossref  = {DBLP:conf/IEEEares/2008},
  url       = {https://doi.org/10.1109/ARES.2008.129},
  doi       = {10.1109/ARES.2008.129},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/SuBZTS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaekZB08,
  author    = {Joonsang Baek and
               Jianying Zhou and
               Feng Bao},
  title     = {Generic Constructions of Stateful Public Key Encryption and Their
               Applications},
  booktitle = {Applied Cryptography and Network Security, 6th International Conference,
               {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  pages     = {75--93},
  year      = {2008},
  crossref  = {DBLP:conf/acns/2008},
  url       = {https://doi.org/10.1007/978-3-540-68914-0\_5},
  doi       = {10.1007/978-3-540-68914-0\_5},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/BaekZB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengB08,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Batch {ZK} Proof and Verification of {OR} Logic},
  booktitle = {Information Security and Cryptology, 4th International Conference,
               Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
               Papers},
  pages     = {141--156},
  year      = {2008},
  crossref  = {DBLP:conf/cisc/2008x},
  url       = {https://doi.org/10.1007/978-3-642-01440-6\_13},
  doi       = {10.1007/978-3-642-01440-6\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/PengB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengB08a,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Correction, Optimisation and Secure and Efficient Application of {PBD}
               Shuffling},
  booktitle = {Information Security and Cryptology, 4th International Conference,
               Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
               Papers},
  pages     = {425--437},
  year      = {2008},
  crossref  = {DBLP:conf/cisc/2008x},
  url       = {https://doi.org/10.1007/978-3-642-01440-6\_31},
  doi       = {10.1007/978-3-642-01440-6\_31},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/PengB08a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/YangBD08,
  author    = {Yanjiang Yang and
               Feng Bao and
               Robert H. Deng},
  title     = {Efficient Client-to-Client Password Authenticated Key Exchange},
  booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
               Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
               {II:} Workshops},
  pages     = {202--207},
  year      = {2008},
  crossref  = {DBLP:conf/euc/2008-2},
  url       = {https://doi.org/10.1109/EUC.2008.32},
  doi       = {10.1109/EUC.2008.32},
  timestamp = {Tue, 04 Dec 2018 10:25:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/euc/YangBD08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuBD08,
  author    = {Huafei Zhu and
               Feng Bao and
               Robert H. Deng},
  title     = {Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based
               Frameworks},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages     = {1635--1641},
  year      = {2008},
  crossref  = {DBLP:conf/icc/2008},
  url       = {https://doi.org/10.1109/ICC.2008.316},
  doi       = {10.1109/ICC.2008.316},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/ZhuBD08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengB08,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Efficient Vote Validity Check in Homomorphic Electronic Voting},
  booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  pages     = {202--217},
  year      = {2008},
  crossref  = {DBLP:conf/icisc/2008},
  url       = {https://doi.org/10.1007/978-3-642-00730-9\_13},
  doi       = {10.1007/978-3-642-00730-9\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/PengB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WuLB08,
  author    = {Yongdong Wu and
               Qiming Li and
               Feng Bao},
  title     = {Optimizing the capacity of distortion-freewatermarking on palette
               images},
  booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany},
  pages     = {205--208},
  year      = {2008},
  crossref  = {DBLP:conf/icmcs/2008},
  url       = {https://doi.org/10.1109/ICME.2008.4607407},
  doi       = {10.1109/ICME.2008.4607407},
  timestamp = {Mon, 11 Feb 2019 17:32:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icmcs/WuLB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BaoDDY08,
  author    = {Feng Bao and
               Robert H. Deng and
               Xuhua Ding and
               Yanjiang Yang},
  title     = {Private Query on Encrypted Data in Multi-user Settings},
  booktitle = {Information Security Practice and Experience, 4th International Conference,
               {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  pages     = {71--85},
  year      = {2008},
  crossref  = {DBLP:conf/ispec/2008},
  url       = {https://doi.org/10.1007/978-3-540-79104-1\_6},
  doi       = {10.1007/978-3-540-79104-1\_6},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/BaoDDY08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangDDB08,
  author    = {Yanjiang Yang and
               Xuhua Ding and
               Robert H. Deng and
               Feng Bao},
  title     = {An Efficient {PIR} Construction Using Trusted Hardware},
  booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
               Taiwan, September 15-18, 2008. Proceedings},
  pages     = {64--79},
  year      = {2008},
  crossref  = {DBLP:conf/isw/2008},
  url       = {https://doi.org/10.1007/978-3-540-85886-7\_5},
  doi       = {10.1007/978-3-540-85886-7\_5},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/YangDDB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WuYB08,
  author    = {Yongdong Wu and
               Haixia Yao and
               Feng Bao},
  title     = {Minimizing {SSO} Effort in Verifying {SSL} Anti-phishing Indicators},
  booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
               Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
               September 7-10, 2008, Milano, Italy},
  pages     = {47--61},
  year      = {2008},
  crossref  = {DBLP:conf/sec/2008},
  url       = {https://doi.org/10.1007/978-0-387-09699-5\_4},
  doi       = {10.1007/978-0-387-09699-5\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/WuYB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2008,
  editor    = {Joonsang Baek and
               Feng Bao and
               Kefei Chen and
               Xuejia Lai},
  title     = {Provable Security, Second International Conference, ProvSec 2008,
               Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5324},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-88733-1},
  doi       = {10.1007/978-3-540-88733-1},
  isbn      = {978-3-540-88732-4},
  timestamp = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WanDBA07,
  author    = {Zhiguo Wan and
               Robert H. Deng and
               Feng Bao and
               Akkihebbal L. Ananda},
  title     = {Access control protocols with two-layer architecture for wireless
               networks},
  journal   = {Computer Networks},
  volume    = {51},
  number    = {3},
  pages     = {655--670},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.comnet.2006.05.009},
  doi       = {10.1016/j.comnet.2006.05.009},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cn/WanDBA07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuBD07,
  author    = {Yongdong Wu and
               Feng Bao and
               Robert H. Deng},
  title     = {Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme},
  booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  pages     = {171--183},
  year      = {2007},
  crossref  = {DBLP:conf/acisp/2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1\_14},
  doi       = {10.1007/978-3-540-73458-1\_14},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/WuBD07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SuBZTS07,
  author    = {Chunhua Su and
               Feng Bao and
               Jianying Zhou and
               Tsuyoshi Takagi and
               Kouichi Sakurai},
  title     = {Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation},
  booktitle = {21st International Conference on Advanced Information Networking and
               Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
               2007, Niagara Falls, Canada},
  pages     = {385--391},
  year      = {2007},
  crossref  = {DBLP:conf/aina/2007w1},
  url       = {https://doi.org/10.1109/AINAW.2007.295},
  doi       = {10.1109/AINAW.2007.295},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/aina/SuBZTS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuBDMR08,
  author    = {Yongdong Wu and
               Feng Bao and
               Robert H. Deng and
               Marc Mouffron and
               Frederic Rousseau},
  title     = {Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled {DRM}},
  booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  pages     = {472--481},
  year      = {2007},
  crossref  = {DBLP:conf/cisc/2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8\_37},
  doi       = {10.1007/978-3-540-79499-8\_37},
  timestamp = {Sat, 24 Nov 2018 11:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/WuBDMR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BaoD07,
  author    = {Feng Bao and
               Robert H. Deng},
  title     = {Light-Weight Encryption Schemes for Multimedia Data and High-Speed
               Networks},
  booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
               '07, Washington, DC, USA, 26-30 November 2007},
  pages     = {188--192},
  year      = {2007},
  crossref  = {DBLP:conf/globecom/2007},
  url       = {https://doi.org/10.1109/GLOCOM.2007.43},
  doi       = {10.1109/GLOCOM.2007.43},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/BaoD07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuB07,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Oblivious Keyword Search Protocols in the Public Database Model},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages     = {1336--1341},
  year      = {2007},
  crossref  = {DBLP:conf/icc/2007},
  url       = {https://doi.org/10.1109/ICC.2007.225},
  doi       = {10.1109/ICC.2007.225},
  timestamp = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/ZhuB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuB07a,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Light-Weight Fair-Dealing Infrastructures {(FADIS)} for M-Commerce},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages     = {1503--1508},
  year      = {2007},
  crossref  = {DBLP:conf/icc/2007},
  url       = {https://doi.org/10.1109/ICC.2007.252},
  doi       = {10.1109/ICC.2007.252},
  timestamp = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/ZhuB07a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuBL07,
  author    = {Huafei Zhu and
               Feng Bao and
               A. Lakshminarayanan},
  title     = {Price Negotiation Systems for M-commerce},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages     = {1521--1526},
  year      = {2007},
  crossref  = {DBLP:conf/icc/2007},
  url       = {https://doi.org/10.1109/ICC.2007.255},
  doi       = {10.1109/ICC.2007.255},
  timestamp = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/ZhuBL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WanDBP07,
  author    = {Zhiguo Wan and
               Robert H. Deng and
               Feng Bao and
               Bart Preneel},
  title     = {\emph{n} PAKE\({}^{\mbox{ + }}\): {A} Hierarchical Group Password-Authenticated
               Key Exchange Protocol Using Different Passwords},
  booktitle = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  pages     = {31--43},
  year      = {2007},
  crossref  = {DBLP:conf/icics/2007},
  url       = {https://doi.org/10.1007/978-3-540-77048-0\_3},
  doi       = {10.1007/978-3-540-77048-0\_3},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WanDBP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/QiuBZ07,
  author    = {Ying Qiu and
               Feng Bao and
               Jianying Zhou},
  title     = {Firewall for Dynamic {IP} Address in Mobile IPv6},
  booktitle = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  pages     = {467--479},
  year      = {2007},
  crossref  = {DBLP:conf/icics/2007},
  url       = {https://doi.org/10.1007/978-3-540-77048-0\_36},
  doi       = {10.1007/978-3-540-77048-0\_36},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/QiuBZ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WuQB07,
  author    = {Yongdong Wu and
               Bo Qiu and
               Feng Bao},
  title     = {Evaluating Ouda's Tamper-Localization Watermarking Scheme},
  booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages     = {843--846},
  year      = {2007},
  crossref  = {DBLP:conf/icmcs/2007},
  url       = {https://doi.org/10.1109/ICME.2007.4284782},
  doi       = {10.1109/ICME.2007.4284782},
  timestamp = {Mon, 11 Feb 2019 17:32:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icmcs/WuQB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangDB07,
  author    = {Yanjiang Yang and
               Robert H. Deng and
               Feng Bao},
  title     = {Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers},
  booktitle = {Information Security Practice and Experience, Third International
               Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  pages     = {177--192},
  year      = {2007},
  crossref  = {DBLP:conf/ispec/2007},
  url       = {https://doi.org/10.1007/978-3-540-72163-5\_15},
  doi       = {10.1007/978-3-540-72163-5\_15},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/YangDB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SuZBTS07,
  author    = {Chunhua Su and
               Jianying Zhou and
               Feng Bao and
               Tsuyoshi Takagi and
               Kouichi Sakurai},
  title     = {Two-Party Privacy-Preserving Agglomerative Document Clustering},
  booktitle = {Information Security Practice and Experience, Third International
               Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  pages     = {193--208},
  year      = {2007},
  crossref  = {DBLP:conf/ispec/2007},
  url       = {https://doi.org/10.1007/978-3-540-72163-5\_16},
  doi       = {10.1007/978-3-540-72163-5\_16},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/SuZBTS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZhuB07,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Computing of Trust in Complex Environments},
  booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
               2007, Athens, Greece},
  pages     = {1--5},
  year      = {2007},
  crossref  = {DBLP:conf/pimrc/2007},
  url       = {https://doi.org/10.1109/PIMRC.2007.4394800},
  doi       = {10.1109/PIMRC.2007.4394800},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/ZhuB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZhuQB07,
  author    = {Huafei Zhu and
               Ying Qiu and
               Feng Bao},
  title     = {Securing Mobile Auctions in the Presence of Malicious Adversaries},
  booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
               2007, Athens, Greece},
  pages     = {1--5},
  year      = {2007},
  crossref  = {DBLP:conf/pimrc/2007},
  url       = {https://doi.org/10.1109/PIMRC.2007.4394801},
  doi       = {10.1109/PIMRC.2007.4394801},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/ZhuQB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZhuQB07a,
  author    = {Huafei Zhu and
               Ying Qiu and
               Feng Bao},
  title     = {Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks},
  booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
               2007, Athens, Greece},
  pages     = {1--5},
  year      = {2007},
  crossref  = {DBLP:conf/pimrc/2007},
  url       = {https://doi.org/10.1109/PIMRC.2007.4394803},
  doi       = {10.1109/PIMRC.2007.4394803},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/ZhuQB07a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangBWB07,
  author    = {Guilin Wang and
               Joonsang Baek and
               Duncan S. Wong and
               Feng Bao},
  title     = {On the Generic and Efficient Constructions of Secure Designated Confirmer
               Signatures},
  booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  pages     = {43--60},
  year      = {2007},
  crossref  = {DBLP:conf/pkc/2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8\_4},
  doi       = {10.1007/978-3-540-71677-8\_4},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/WangBWB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WangB07,
  author    = {Guilin Wang and
               Feng Bao},
  title     = {Security Remarks on a Convertible Nominative Signature Scheme},
  booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments,
               Proceedings of the {IFIP} {TC-11} 22nd International Information Security
               Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  pages     = {265--275},
  year      = {2007},
  crossref  = {DBLP:conf/sec/2007},
  url       = {https://doi.org/10.1007/978-0-387-72367-9\_23},
  doi       = {10.1007/978-0-387-72367-9\_23},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/WangB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhuB07,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Securing {RFID} Tags: Authentication Protocols with Completeness,
               Soundness, and Non-Traceability},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,
               Hong Kong, China, 11-15 March, 2007},
  pages     = {2698--2702},
  year      = {2007},
  crossref  = {DBLP:conf/wcnc/2007},
  url       = {https://doi.org/10.1109/WCNC.2007.501},
  doi       = {10.1109/WCNC.2007.501},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/ZhuB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhuB07a,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,
               Hong Kong, China, 11-15 March, 2007},
  pages     = {2904--2908},
  year      = {2007},
  crossref  = {DBLP:conf/wcnc/2007},
  url       = {https://doi.org/10.1109/WCNC.2007.538},
  doi       = {10.1109/WCNC.2007.538},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/ZhuB07a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2007,
  editor    = {Feng Bao and
               San Ling and
               Tatsuaki Okamoto and
               Huaxiong Wang and
               Chaoping Xing},
  title     = {Cryptology and Network Security, 6th International Conference, {CANS}
               2007, Singapore, December 8-10, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4856},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-76969-9},
  doi       = {10.1007/978-3-540-76969-9},
  isbn      = {978-3-540-76968-2},
  timestamp = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007asia,
  editor    = {Feng Bao and
               Steven Miller},
  title     = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {1-59593-574-6},
  timestamp = {Tue, 21 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/BaoLH06,
  author    = {Feng Bao and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis and improvement on batch verifying multiple {RSA} digital
               signatures},
  journal   = {Applied Mathematics and Computation},
  volume    = {172},
  number    = {2},
  pages     = {1195--1200},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.amc.2005.03.016},
  doi       = {10.1016/j.amc.2005.03.016},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/amc/BaoLH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RenLZBZD06,
  author    = {Kui Ren and
               Wenjing Lou and
               Kai Zeng and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Routing optimization security in mobile IPv6},
  journal   = {Computer Networks},
  volume    = {50},
  number    = {13},
  pages     = {2401--2419},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.comnet.2005.09.019},
  doi       = {10.1016/j.comnet.2005.09.019},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cn/RenLZBZD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/GohPDB06,
  author    = {Shen{-}Tat Goh and
               HweeHwa Pang and
               Robert H. Deng and
               Feng Bao},
  title     = {Three architectures for trusted data dissemination in edge computing},
  journal   = {Data Knowl. Eng.},
  volume    = {58},
  number    = {3},
  pages     = {381--409},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.datak.2005.05.003},
  doi       = {10.1016/j.datak.2005.05.003},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dke/GohPDB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangBW06,
  author    = {Shuhong Wang and
               Feng Bao and
               Jie Wang},
  title     = {A More Efficient Improvement of the Virtual Software Token Protocols},
  journal   = {{IEICE} Transactions},
  volume    = {89-B},
  number    = {3},
  pages     = {945--948},
  year      = {2006},
  url       = {https://doi.org/10.1093/ietcom/e89-b.3.945},
  doi       = {10.1093/ietcom/e89-b.3.945},
  timestamp = {Mon, 26 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/WangBW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhouBD06,
  author    = {Jianying Zhou and
               Feng Bao and
               Robert H. Deng},
  title     = {Minimizing TTP's involvement in signature validation},
  journal   = {Int. J. Inf. Sec.},
  volume    = {5},
  number    = {1},
  pages     = {37--47},
  year      = {2006},
  url       = {https://doi.org/10.1007/s10207-005-0072-1},
  doi       = {10.1007/s10207-005-0072-1},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/ZhouBD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangDB06,
  author    = {Yanjiang Yang and
               Robert H. Deng and
               Feng Bao},
  title     = {A Practical Password-Based Two-Server Authentication and Key Exchange
               System},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {3},
  number    = {2},
  pages     = {105--114},
  year      = {2006},
  url       = {https://doi.org/10.1109/TDSC.2006.16},
  doi       = {10.1109/TDSC.2006.16},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/YangDB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WanBDA06,
  author    = {Zhiguo Wan and
               Feng Bao and
               Robert H. Deng and
               Akkihebbal L. Ananda},
  title     = {Security analysis on a conference scheme for mobile communications},
  journal   = {{IEEE} Trans. Wireless Communications},
  volume    = {5},
  number    = {6},
  pages     = {1238--1240},
  year      = {2006},
  url       = {https://doi.org/10.1109/TWC.2006.1638641},
  doi       = {10.1109/TWC.2006.1638641},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/twc/WanBDA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/Bao06,
  author    = {Feng Bao},
  title     = {Analysis of a secure conference scheme for mobile communication},
  journal   = {{IEEE} Trans. Wireless Communications},
  volume    = {5},
  number    = {8},
  pages     = {1984--1986},
  year      = {2006},
  url       = {https://doi.org/10.1109/TWC.2006.1687708},
  doi       = {10.1109/TWC.2006.1687708},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/twc/Bao06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuB06,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {More on Stand-Alone and Setup-Free Verifiably Committed Signatures},
  booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
               2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  pages     = {148--158},
  year      = {2006},
  crossref  = {DBLP:conf/acisp/2006},
  url       = {https://doi.org/10.1007/11780656\_13},
  doi       = {10.1007/11780656\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ZhuB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuB06a,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Oblivious Scalar-Product Protocols},
  booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
               2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  pages     = {313--323},
  year      = {2006},
  crossref  = {DBLP:conf/acisp/2006},
  url       = {https://doi.org/10.1007/11780656\_26},
  doi       = {10.1007/11780656\_26},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ZhuB06a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangDB06,
  author    = {Yanjiang Yang and
               Robert H. Deng and
               Feng Bao},
  title     = {Fortifying password authentication in integrated healthcare delivery
               systems},
  booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  pages     = {255--265},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006},
  url       = {https://doi.org/10.1145/1128817.1128855},
  doi       = {10.1145/1128817.1128855},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/YangDB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/YangDB06,
  author    = {Yanjiang Yang and
               Robert H. Deng and
               Feng Bao},
  title     = {Practical private data matching deterrent to spoofing attacks},
  booktitle = {Proceedings of the 2006 {ACM} {CIKM} International Conference on Information
               and Knowledge Management, Arlington, Virginia, USA, November 6-11,
               2006},
  pages     = {852--853},
  year      = {2006},
  crossref  = {DBLP:conf/cikm/2006},
  url       = {https://doi.org/10.1145/1183614.1183763},
  doi       = {10.1145/1183614.1183763},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/YangDB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuB06,
  author    = {Yongdong Wu and
               Feng Bao},
  title     = {Batch Decryption of Encrypted Short Messages and Its Application on
               Concurrent {SSL} Handshakes},
  booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
               2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  pages     = {264--278},
  year      = {2006},
  crossref  = {DBLP:conf/cisc/2006},
  url       = {https://doi.org/10.1007/11937807\_21},
  doi       = {10.1007/11937807\_21},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/WuB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/ZhuBL06,
  author    = {Huafei Zhu and
               Feng Bao and
               Jianwei Liu},
  title     = {Computing of Trust in Ad-Hoc Networks},
  booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
               International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
               19-21, 2006, Proceedings},
  pages     = {1--11},
  year      = {2006},
  crossref  = {DBLP:conf/cms/2006},
  url       = {https://doi.org/10.1007/11909033\_1},
  doi       = {10.1007/11909033\_1},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/ZhuBL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ZhuB06,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Stand-Alone and Setup-Free Verifiably Committed Signatures},
  booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
               the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
               Proceedings},
  pages     = {159--173},
  year      = {2006},
  crossref  = {DBLP:conf/ctrsa/2006},
  url       = {https://doi.org/10.1007/11605805\_11},
  doi       = {10.1007/11605805\_11},
  timestamp = {Wed, 14 Nov 2018 10:58:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/ZhuB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangDDB06,
  author    = {Shuhong Wang and
               Xuhua Ding and
               Robert H. Deng and
               Feng Bao},
  title     = {Private Information Retrieval Using Trusted Hardware},
  booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  pages     = {49--64},
  year      = {2006},
  crossref  = {DBLP:conf/esorics/2006},
  url       = {https://doi.org/10.1007/11863908\_4},
  doi       = {10.1007/11863908\_4},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/WangDDB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangB06,
  author    = {Guilin Wang and
               Feng Bao},
  title     = {Cryptanalysis of Timestamp-Based Password Authentication Schemes Using
               Smart Cards},
  booktitle = {Information and Communications Security, 8th International Conference,
               {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  pages     = {399--409},
  year      = {2006},
  crossref  = {DBLP:conf/icics/2006},
  url       = {https://doi.org/10.1007/11935308\_28},
  doi       = {10.1007/11935308\_28},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WangB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangBZ06,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou},
  title     = {The Fairness of Perfect Concurrent Signatures},
  booktitle = {Information and Communications Security, 8th International Conference,
               {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  pages     = {435--451},
  year      = {2006},
  crossref  = {DBLP:conf/icics/2006},
  url       = {https://doi.org/10.1007/11935308\_31},
  doi       = {10.1007/11935308\_31},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WangBZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/QiBLJW06,
  author    = {Fang Qi and
               Feng Bao and
               Tieyan Li and
               Weijia Jia and
               Yongdong Wu},
  title     = {Preventing Web-Spoofing with Automatic Detecting Security Indicator},
  booktitle = {Information Security Practice and Experience, Second International
               Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  pages     = {112--122},
  year      = {2006},
  crossref  = {DBLP:conf/ispec/2006},
  url       = {https://doi.org/10.1007/11689522\_11},
  doi       = {10.1007/11689522\_11},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/QiBLJW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhuBLQ06,
  author    = {Huafei Zhu and
               Feng Bao and
               Tieyan Li and
               Ying Qiu},
  title     = {More on Shared-Scalar-Product Protocols},
  booktitle = {Information Security Practice and Experience, Second International
               Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  pages     = {142--152},
  year      = {2006},
  crossref  = {DBLP:conf/ispec/2006},
  url       = {https://doi.org/10.1007/11689522\_14},
  doi       = {10.1007/11689522\_14},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/ZhuBLQ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhuLB06,
  author    = {Huafei Zhu and
               Tieyan Li and
               Feng Bao},
  title     = {Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  pages     = {340--350},
  year      = {2006},
  crossref  = {DBLP:conf/sec/2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_29},
  doi       = {10.1007/0-387-33406-8\_29},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/ZhuLB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ZhuJKBD06,
  author    = {Bo Zhu and
               Sushil Jajodia and
               Mohan S. Kankanhalli and
               Feng Bao and
               Robert H. Deng},
  title     = {An Anonymous Routing Protocol with The Local-repair Mechanism for
               Mobile Ad Hoc Networks},
  booktitle = {Proceedings of the Third Annual {IEEE} Communications Society Conference
               on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2006,
               September 25-28, 2006, Reston, VA, {USA}},
  pages     = {70--79},
  year      = {2006},
  crossref  = {DBLP:conf/secon/2006},
  url       = {https://doi.org/10.1109/SAHCN.2006.288411},
  doi       = {10.1109/SAHCN.2006.288411},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secon/ZhuJKBD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/QiuZBD06,
  author    = {Ying Qiu and
               Jianying Zhou and
               Feng Bao and
               Robert H. Deng},
  title     = {Using Certificate-based Binding Update Protocol to Hide the Movement
               of Mobile Nodes in MIPv6},
  booktitle = {Proceedings of the 63rd {IEEE} Vehicular Technology Conference, {VTC}
               Spring 2006, 7-10 May 2006, Melbourne, Australia},
  pages     = {828--830},
  year      = {2006},
  crossref  = {DBLP:conf/vtc/2006s},
  url       = {https://doi.org/10.1109/VETECS.2006.1682940},
  doi       = {10.1109/VETECS.2006.1682940},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vtc/QiuZBD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhuBC06,
  author    = {Huafei Zhu and
               Feng Bao and
               Chunxiao Chigan},
  title     = {Compact routing discovery protocol with lower communication complexity},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006,
               3-6 April 2006, Las Vegas, Nevada, {USA}},
  pages     = {307--310},
  year      = {2006},
  crossref  = {DBLP:conf/wcnc/2006},
  url       = {https://doi.org/10.1109/WCNC.2006.1683482},
  doi       = {10.1109/WCNC.2006.1683482},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/ZhuBC06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhuCB06,
  author    = {Huafei Zhu and
               Chunxiao Chigan and
               Feng Bao},
  title     = {Turing assessor: a new tool for cyber security quantification},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006,
               3-6 April 2006, Las Vegas, Nevada, {USA}},
  pages     = {629--633},
  year      = {2006},
  crossref  = {DBLP:conf/wcnc/2006},
  url       = {https://doi.org/10.1109/WCNC.2006.1683542},
  doi       = {10.1109/WCNC.2006.1683542},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/ZhuCB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/WanZDBA06,
  author    = {Zhiguo Wan and
               Bo Zhu and
               Robert H. Deng and
               Feng Bao and
               Akkihebbal L. Ananda},
  title     = {Efficient key tree construction for group key agreement in ad hoc
               networks},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006,
               3-6 April 2006, Las Vegas, Nevada, {USA}},
  pages     = {652--658},
  year      = {2006},
  crossref  = {DBLP:conf/wcnc/2006},
  url       = {https://doi.org/10.1109/WCNC.2006.1683546},
  doi       = {10.1109/WCNC.2006.1683546},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/WanZDBA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2006,
  editor    = {Jianying Zhou and
               Moti Yung and
               Feng Bao},
  title     = {Applied Cryptography and Network Security, 4th International Conference,
               {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3989},
  year      = {2006},
  url       = {https://doi.org/10.1007/11767480},
  doi       = {10.1007/11767480},
  isbn      = {3-540-34703-8},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangDDB06,
  author    = {Shuhong Wang and
               Xuhua Ding and
               Robert H. Deng and
               Feng Bao},
  title     = {Private Information Retrieval Using Trusted Hardware},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {208},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/208},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WangDDB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangBZ06,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou},
  title     = {The Fairness of Perfect Concurrent Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {226},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/226},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WangBZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaoD05,
  author    = {Feng Bao and
               Robert H. Deng},
  title     = {Protocols that hide user's preferences in electronic transactions},
  journal   = {Computer Networks},
  volume    = {48},
  number    = {4},
  pages     = {503--515},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.comnet.2004.10.010},
  doi       = {10.1016/j.comnet.2004.10.010},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cn/BaoD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhuBDKW05,
  author    = {Bo Zhu and
               Feng Bao and
               Robert H. Deng and
               Mohan S. Kankanhalli and
               Guilin Wang},
  title     = {Efficient and robust key management for large mobile ad hoc networks},
  journal   = {Computer Networks},
  volume    = {48},
  number    = {4},
  pages     = {657--682},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.comnet.2004.11.023},
  doi       = {10.1016/j.comnet.2004.11.023},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cn/ZhuBDKW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangBW05,
  author    = {Shuhong Wang and
               Feng Bao and
               Jie Wang},
  title     = {Security Analysis on an Improvement of RSA-Based Password Authenticated
               Key Exchange},
  journal   = {{IEICE} Transactions},
  volume    = {88-B},
  number    = {4},
  pages     = {1641--1646},
  year      = {2005},
  url       = {https://doi.org/10.1093/ietcom/e88-b.4.1641},
  doi       = {10.1093/ietcom/e88-b.4.1641},
  timestamp = {Mon, 26 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/WangBW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FengDBS05,
  author    = {Gui Liang Feng and
               Robert H. Deng and
               Feng Bao and
               Jia{-}Chen Shen},
  title     = {New Efficient {MDS} Array Codes for {RAID} Part {I:} Reed-Solomon-Like
               Codes for Tolerating Three Disk Failures},
  journal   = {{IEEE} Trans. Computers},
  volume    = {54},
  number    = {9},
  pages     = {1071--1080},
  year      = {2005},
  url       = {https://doi.org/10.1109/TC.2005.150},
  doi       = {10.1109/TC.2005.150},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tc/FengDBS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FengDBS05a,
  author    = {Gui Liang Feng and
               Robert H. Deng and
               Feng Bao and
               Jia{-}Chen Shen},
  title     = {New Efficient {MDS} Array Codes for {RAID} Part {II:} Rabin-Like Codes
               for Tolerating Multiple (greater than or equal to 4) Disk Failures},
  journal   = {{IEEE} Trans. Computers},
  volume    = {54},
  number    = {12},
  pages     = {1473--1483},
  year      = {2005},
  url       = {https://doi.org/10.1109/TC.2005.200},
  doi       = {10.1109/TC.2005.200},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tc/FengDBS05a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/BaoDOY05,
  author    = {Feng Bao and
               Robert H. Deng and
               Beng Chin Ooi and
               Yanjiang Yang},
  title     = {Tailored reversible watermarking schemes for authentication of electronic
               clinical atlas},
  journal   = {{IEEE} Trans. Information Technology in Biomedicine},
  volume    = {9},
  number    = {4},
  pages     = {554--563},
  year      = {2005},
  url       = {https://doi.org/10.1109/TITB.2005.855556},
  doi       = {10.1109/TITB.2005.855556},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/titb/BaoDOY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangBD05,
  author    = {Yanjiang Yang and
               Feng Bao and
               Robert H. Deng},
  title     = {Security Analysis and Fix of an Anonymous Credential System},
  booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
               2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  pages     = {537--547},
  year      = {2005},
  crossref  = {DBLP:conf/acisp/2005},
  url       = {https://doi.org/10.1007/11506157\_45},
  doi       = {10.1007/11506157\_45},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/YangBD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/ZhuBL05,
  author    = {Huafei Zhu and
               Feng Bao and
               Tieyan Li},
  title     = {Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian
               Ad-Hoc Networks},
  booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
               International Conference, {CMS} 2005, Salzburg, Austria, September
               19-21, 2005, Proceedings},
  pages     = {200--209},
  year      = {2005},
  crossref  = {DBLP:conf/cms/2005},
  url       = {https://doi.org/10.1007/11552055\_20},
  doi       = {10.1007/11552055\_20},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/ZhuBL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ZhangWFB05,
  author    = {Bin Zhang and
               Hongjun Wu and
               Dengguo Feng and
               Feng Bao},
  title     = {A Fast Correlation Attack on the Shrinking Generator},
  booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
               the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
               2005, Proceedings},
  pages     = {72--86},
  year      = {2005},
  crossref  = {DBLP:conf/ctrsa/2005},
  url       = {https://doi.org/10.1007/978-3-540-30574-3\_7},
  doi       = {10.1007/978-3-540-30574-3\_7},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/ZhangWFB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhuB05,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Augmented Oblivious Polynomial Evaluation Protocol and Its Applications},
  booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
               in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  pages     = {222--230},
  year      = {2005},
  crossref  = {DBLP:conf/esorics/2005},
  url       = {https://doi.org/10.1007/11555827\_13},
  doi       = {10.1007/11555827\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/ZhuB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LipmaaWB05,
  author    = {Helger Lipmaa and
               Guilin Wang and
               Feng Bao},
  title     = {Designated Verifier Signature Schemes: Attacks, New Security Notions
               and a New Construction},
  booktitle = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  pages     = {459--471},
  year      = {2005},
  crossref  = {DBLP:conf/icalp/2005},
  url       = {https://doi.org/10.1007/11523468\_38},
  doi       = {10.1007/11523468\_38},
  timestamp = {Wed, 14 Nov 2018 11:00:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/LipmaaWB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangBIS05,
  author    = {Guilin Wang and
               Feng Bao and
               Kenji Imamoto and
               Kouichi Sakurai},
  title     = {Generic, Optimistic, and Efficient Schemes for Fair Certified Email
               Delivery},
  booktitle = {Information and Communications Security, 7th International Conference,
               {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  pages     = {40--52},
  year      = {2005},
  crossref  = {DBLP:conf/icics/2005},
  url       = {https://doi.org/10.1007/11602897\_4},
  doi       = {10.1007/11602897\_4},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WangBIS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangBD05,
  author    = {Shuhong Wang and
               Feng Bao and
               Robert H. Deng},
  title     = {Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable
               Security},
  booktitle = {Information and Communications Security, 7th International Conference,
               {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  pages     = {53--60},
  year      = {2005},
  crossref  = {DBLP:conf/icics/2005},
  url       = {https://doi.org/10.1007/11602897\_5},
  doi       = {10.1007/11602897\_5},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WangBD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhuBD05,
  author    = {Huafei Zhu and
               Feng Bao and
               Robert H. Deng},
  title     = {Sequential Aggregate Signatures Working over Independent Homomorphic
               Trapdoor One-Way Permutation Domains},
  booktitle = {Information and Communications Security, 7th International Conference,
               {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  pages     = {207--219},
  year      = {2005},
  crossref  = {DBLP:conf/icics/2005},
  url       = {https://doi.org/10.1007/11602897\_18},
  doi       = {10.1007/11602897\_18},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhuBD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/QiJBW05,
  author    = {Fang Qi and
               Weijia Jia and
               Feng Bao and
               Yongdong Wu},
  title     = {Batching {SSL/TLS} Handshake Improved},
  booktitle = {Information and Communications Security, 7th International Conference,
               {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  pages     = {402--413},
  year      = {2005},
  crossref  = {DBLP:conf/icics/2005},
  url       = {https://doi.org/10.1007/11602897\_34},
  doi       = {10.1007/11602897\_34},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/QiJBW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/ZhuWWKBD05,
  author    = {Bo Zhu and
               Guilin Wang and
               Zhiguo Wan and
               Mohan S. Kankanhalli and
               Feng Bao and
               Robert H. Deng},
  title     = {Providing efficient certification services against active attacks
               in ad hoc networks},
  booktitle = {Proceedings of the 24th {IEEE} International Performance Computing
               and Communications Conference, {IPCCC} 2005, April 7-9, 2005, Phoenix,
               Arizona, {USA}},
  pages     = {285--292},
  year      = {2005},
  crossref  = {DBLP:conf/ipccc/2005},
  url       = {https://doi.org/10.1109/PCCC.2005.1460571},
  doi       = {10.1109/PCCC.2005.1460571},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ipccc/ZhuWWKBD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/WanADB05,
  author    = {Zhiguo Wan and
               Akkihebbal L. Ananda and
               Robert H. Deng and
               Feng Bao},
  title     = {Anonymous DoS-Resistant Access Control Protocol Using Passwords for
               Wireless Networks},
  booktitle = {30th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2005),
               15-17 November 2005, Sydney, Australia, Proceedings},
  pages     = {328--335},
  year      = {2005},
  crossref  = {DBLP:conf/lcn/2005},
  url       = {https://doi.org/10.1109/LCN.2005.30},
  doi       = {10.1109/LCN.2005.30},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/WanADB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/WangBZD05,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {An efficient certified e-mail scheme suitable for wireless mobile
               environments},
  booktitle = {Proceedings of the {IEEE} 16th International Symposium on Personal,
               Indoor and Mobile Radio Communications, Berlin, Germany, September
               11-14, 2005},
  pages     = {1994--1998},
  year      = {2005},
  crossref  = {DBLP:conf/pimrc/2005},
  url       = {https://doi.org/10.1109/PIMRC.2005.1651789},
  doi       = {10.1109/PIMRC.2005.1651789},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/WangBZD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZhuB05,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {Provably secure public key management protocols for self-organized
               ad hoc networks},
  booktitle = {Proceedings of the {IEEE} 16th International Symposium on Personal,
               Indoor and Mobile Radio Communications, Berlin, Germany, September
               11-14, 2005},
  pages     = {2691--2695},
  year      = {2005},
  crossref  = {DBLP:conf/pimrc/2005},
  url       = {https://doi.org/10.1109/PIMRC.2005.1651932},
  doi       = {10.1109/PIMRC.2005.1651932},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/ZhuB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YangBD05,
  author    = {Yanjiang Yang and
               Feng Bao and
               Robert H. Deng},
  title     = {A New Architecture for User Authentication and Key Exchange Using
               Password for Federated Enterprises},
  booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
               20th International Conference on Information Security {(SEC} 2005),
               May 30 - June 1, 2005, Chiba, Japan},
  pages     = {95--112},
  year      = {2005},
  crossref  = {DBLP:conf/sec/2005},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/YangBD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WuBD05,
  author    = {Yongdong Wu and
               Feng Bao and
               Robert H. Deng},
  title     = {Secure Person-To-Person Communications Based on Biometrics Signals},
  booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
               20th International Conference on Information Security {(SEC} 2005),
               May 30 - June 1, 2005, Chiba, Japan},
  pages     = {205--222},
  year      = {2005},
  crossref  = {DBLP:conf/sec/2005},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/WuBD05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ZhuB05,
  author    = {Huafei Zhu and
               Feng Bao},
  title     = {A Novel Construction of Two-Party Private Bidding Protocols from Yao's
               Millionaires Problem},
  booktitle = {Trust, Privacy and Security in Digital Business: Second International
               Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
               Proceedings},
  pages     = {266--273},
  year      = {2005},
  crossref  = {DBLP:conf/trustbus/2005},
  url       = {https://doi.org/10.1007/11537878\_27},
  doi       = {10.1007/11537878\_27},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/ZhuB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/WanZDBA05,
  author    = {Zhiguo Wan and
               Bo Zhu and
               Robert H. Deng and
               Feng Bao and
               Akkihebbal L. Ananda},
  title     = {DoS-resistant access control protocol with identity confidentiality
               for wireless networks},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
               March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages     = {1521--1526},
  year      = {2005},
  crossref  = {DBLP:conf/wcnc/2005},
  url       = {https://doi.org/10.1109/WCNC.2005.1424740},
  doi       = {10.1109/WCNC.2005.1424740},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/WanZDBA05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhuBLW05,
  author    = {Huafei Zhu and
               Feng Bao and
               Tieyan Li and
               Yongdong Wu},
  title     = {Sequential aggregate signatures for wireless routing protocols},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
               March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages     = {2436--2439},
  year      = {2005},
  crossref  = {DBLP:conf/wcnc/2005},
  url       = {https://doi.org/10.1109/WCNC.2005.1424896},
  doi       = {10.1109/WCNC.2005.1424896},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/ZhuBLW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2005,
  editor    = {Robert H. Deng and
               Feng Bao and
               HweeHwa Pang and
               Jianying Zhou},
  title     = {Information Security Practice and Experience, First International
               Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3439},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b107167},
  doi       = {10.1007/b107167},
  isbn      = {3-540-25584-2},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2005,
  editor    = {Jianying Zhou and
               Javier L{\'{o}}pez and
               Robert H. Deng and
               Feng Bao},
  title     = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
               September 20-23, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3650},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11556992},
  doi       = {10.1007/11556992},
  isbn      = {3-540-29001-X},
  timestamp = {Mon, 07 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwap/2005,
  editor    = {Jianying Zhou and
               Meng{-}Chow Kang and
               Feng Bao and
               HweeHwa Pang},
  title     = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP}
               2005, Singapore, September 21-23, 2005},
  series    = {Frontiers in Artificial Intelligence and Applications},
  volume    = {128},
  publisher = {{IOS} Press},
  year      = {2005},
  url       = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=52},
  isbn      = {978-1-58603-550-1},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iwap/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0504019,
  author    = {Guilin Wang and
               Feng Bao and
               Changshe Ma and
               Kefei Chen},
  title     = {Efficient Authenticated Encryption Schemes with Public Verifiability},
  journal   = {CoRR},
  volume    = {abs/cs/0504019},
  year      = {2005},
  url       = {http://arxiv.org/abs/cs/0504019},
  archivePrefix = {arXiv},
  eprint    = {cs/0504019},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0504019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RenLWBDK04,
  author    = {Kui Ren and
               Tieyan Li and
               Zhiguo Wan and
               Feng Bao and
               Robert H. Deng and
               Kwangjo Kim},
  title     = {Highly reliable trust establishment scheme in ad hoc networks},
  journal   = {Computer Networks},
  volume    = {45},
  number    = {6},
  pages     = {687--699},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.comnet.2004.01.008},
  doi       = {10.1016/j.comnet.2004.01.008},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cn/RenLWBDK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWBWD04,
  author    = {Yanjiang Yang and
               Shuhong Wang and
               Feng Bao and
               Jie Wang and
               Robert H. Deng},
  title     = {New efficient user identification and key distribution scheme providing
               enhanced security},
  journal   = {Computers {\&} Security},
  volume    = {23},
  number    = {8},
  pages     = {697--704},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.cose.2004.08.005},
  doi       = {10.1016/j.cose.2004.08.005},
  timestamp = {Mon, 26 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/YangWBWD04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Bao04,
  author    = {Feng Bao},
  title     = {Cryptanalysis of a Partially Known Cellular Automata Cryptosystem},
  journal   = {{IEEE} Trans. Computers},
  volume    = {53},
  number    = {11},
  pages     = {1493--1497},
  year      = {2004},
  url       = {https://doi.org/10.1109/TC.2004.94},
  doi       = {10.1109/TC.2004.94},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tc/Bao04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/WangBW04,
  author    = {Shuhong Wang and
               Feng Bao and
               Jie Wang},
  title     = {Comments on yet another log-in authentication using n-dimensional
               construction},
  journal   = {{IEEE} Trans. Consumer Electronics},
  volume    = {50},
  number    = {2},
  pages     = {606--608},
  year      = {2004},
  url       = {https://doi.org/10.1109/TCE.2004.1309435},
  doi       = {10.1109/TCE.2004.1309435},
  timestamp = {Mon, 26 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tce/WangBW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/YangHBD04,
  author    = {Yanjiang Yang and
               Xiaoxi Han and
               Feng Bao and
               Robert H. Deng},
  title     = {A smart-card-enabled privacy preserving E-prescription system},
  journal   = {{IEEE} Trans. Information Technology in Biomedicine},
  volume    = {8},
  number    = {1},
  pages     = {47--58},
  year      = {2004},
  url       = {https://doi.org/10.1109/TITB.2004.824731},
  doi       = {10.1109/TITB.2004.824731},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/titb/YangHBD04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/WangBZD04,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Comments on "A Practical (t, n) Threshold Proxy Signature Scheme
               Based on the {RSA} Cryptosystem"},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {16},
  number    = {10},
  pages     = {1309--1311},
  year      = {2004},
  url       = {https://doi.org/10.1109/TKDE.2004.52},
  doi       = {10.1109/TKDE.2004.52},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tkde/WangBZD04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bao04,
  author    = {Feng Bao},
  title     = {Analysis of a Conference Scheme Under Active and Passive Attacks},
  booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  pages     = {157--163},
  year      = {2004},
  crossref  = {DBLP:conf/acisp/2004},
  url       = {https://doi.org/10.1007/978-3-540-27800-9\_14},
  doi       = {10.1007/978-3-540-27800-9\_14},
  timestamp = {Wed, 14 Nov 2018 10:59:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/Bao04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoWZZ04,
  author    = {Feng Bao and
               Guilin Wang and
               Jianying Zhou and
               Huafei Zhu},
  title     = {Analysis and Improvement of Micali's Fair Contract Signing Protocol},
  booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  pages     = {176--187},
  year      = {2004},
  crossref  = {DBLP:conf/acisp/2004},
  url       = {https://doi.org/10.1007/978-3-540-27800-9\_16},
  doi       = {10.1007/978-3-540-27800-9\_16},
  timestamp = {Wed, 14 Nov 2018 10:59:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaoWZZ04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangWFB04,
  author    = {Bin Zhang and
               Hongjun Wu and
               Dengguo Feng and
               Feng Bao},
  title     = {Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem},
  booktitle = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  pages     = {303--309},
  year      = {2004},
  crossref  = {DBLP:conf/acns/2004},
  url       = {https://doi.org/10.1007/978-3-540-24852-1\_22},
  doi       = {10.1007/978-3-540-24852-1\_22},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/ZhangWFB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GoiPYBDS04,
  author    = {Bok{-}Min Goi and
               Raphael Chung{-}Wei Phan and
               Yanjiang Yang and
               Feng Bao and
               Robert H. Deng and
               M. U. Siddiqi},
  title     = {Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols
               and an Improvement for True Anonymity},
  booktitle = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  pages     = {369--382},
  year      = {2004},
  crossref  = {DBLP:conf/acns/2004},
  url       = {https://doi.org/10.1007/978-3-540-24852-1\_27},
  doi       = {10.1007/978-3-540-24852-1\_27},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/GoiPYBDS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Bao04,
  author    = {Feng Bao},
  title     = {Colluding Attacks to a Payment Protocol and Two Signature Exchange
               Schemes},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Jeju Island, Korea, December 5-9, 2004, Proceedings},
  pages     = {417--429},
  year      = {2004},
  crossref  = {DBLP:conf/asiacrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30539-2\_29},
  doi       = {10.1007/978-3-540-30539-2\_29},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/Bao04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ZhuLZKBD04,
  author    = {Bo Zhu and
               Tieyan Li and
               Huafei Zhu and
               Mohan S. Kankanhalli and
               Feng Bao and
               Robert H. Deng},
  title     = {Trust Establishment in Large Scale Grid Settings},
  booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
               Wuhan, China, October 21-24, 2004. Proceedings},
  pages     = {317--324},
  year      = {2004},
  crossref  = {DBLP:conf/gcc/2004},
  url       = {https://doi.org/10.1007/978-3-540-30208-7\_46},
  doi       = {10.1007/978-3-540-30208-7\_46},
  timestamp = {Thu, 24 May 2018 11:14:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gcc/ZhuLZKBD04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangWFB04,
  author    = {Bin Zhang and
               Hongjun Wu and
               Dengguo Feng and
               Feng Bao},
  title     = {Security Analysis of the Generalized Self-shrinking Generator},
  booktitle = {Information and Communications Security, 6th International Conference,
               {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  pages     = {388--400},
  year      = {2004},
  crossref  = {DBLP:conf/icics/2004},
  url       = {https://doi.org/10.1007/978-3-540-30191-2\_30},
  doi       = {10.1007/978-3-540-30191-2\_30},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhangWFB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChangDFLKL04,
  author    = {Kisik Chang and
               Robert H. Deng and
               Feng Bao and
               Sangjin Lee and
               HyungJun Kim and
               Jongin Lim},
  title     = {On Security Notions for Steganalysis},
  booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International
               Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  pages     = {440--454},
  year      = {2004},
  crossref  = {DBLP:conf/icisc/2004},
  url       = {https://doi.org/10.1007/11496618\_32},
  doi       = {10.1007/11496618\_32},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/ChangDFLKL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangBZ04,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou},
  title     = {On the Security of a Certified E-Mail Scheme},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  pages     = {48--60},
  year      = {2004},
  crossref  = {DBLP:conf/indocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30556-9\_5},
  doi       = {10.1007/978-3-540-30556-9\_5},
  timestamp = {Wed, 14 Nov 2018 10:55:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/WangBZ04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangWFB04,
  author    = {Bin Zhang and
               Hongjun Wu and
               Dengguo Feng and
               Feng Bao},
  title     = {Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream
               Ciphers},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  pages     = {73--83},
  year      = {2004},
  crossref  = {DBLP:conf/indocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30556-9\_7},
  doi       = {10.1007/978-3-540-30556-9\_7},
  timestamp = {Wed, 14 Nov 2018 10:55:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/ZhangWFB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChangDFLK04,
  author    = {Kisik Chang and
               Robert H. Deng and
               Feng Bao and
               Sangjin Lee and
               HyungJun Kim},
  title     = {On Security Notions of Steganographic Systems},
  booktitle = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
               SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  pages     = {137--151},
  year      = {2004},
  crossref  = {DBLP:conf/iwdw/2004},
  url       = {https://doi.org/10.1007/978-3-540-31805-7\_12},
  doi       = {10.1007/978-3-540-31805-7\_12},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iwdw/ChangDFLK04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ZhuWKBD04,
  author    = {Bo Zhu and
               Zhiguo Wan and
               Mohan S. Kankanhalli and
               Feng Bao and
               Robert H. Deng},
  title     = {Anonymous Secure Routing in Mobile Ad-Hoc Networks},
  booktitle = {29th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2004),
               16-18 November 2004, Tampa, FL, USA, Proceedings},
  pages     = {102--108},
  year      = {2004},
  crossref  = {DBLP:conf/lcn/2004},
  url       = {https://doi.org/10.1109/LCN.2004.21},
  doi       = {10.1109/LCN.2004.21},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/ZhuWKBD04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/WuB04,
  author    = {Yongdong Wu and
               Feng Bao},
  title     = {Collusion attack on a multi-key secure video proxy scheme},
  booktitle = {Proceedings of the 12th {ACM} International Conference on Multimedia,
               New York, NY, USA, October 10-16, 2004},
  pages     = {380--383},
  year      = {2004},
  crossref  = {DBLP:conf/mm/2004},
  url       = {https://doi.org/10.1145/1027527.1027617},
  doi       = {10.1145/1027527.1027617},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mm/WuB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/QiuZB04,
  author    = {Ying Qiu and
               Jianying Zhou and
               Feng Bao},
  title     = {Mobile personal firewall},
  booktitle = {Proceedings of the {IEEE} 15th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2004, 5-8 September
               2004, Barcelona, Spain},
  pages     = {2866--2870},
  year      = {2004},
  crossref  = {DBLP:conf/pimrc/2004},
  url       = {https://doi.org/10.1109/PIMRC.2004.1368844},
  doi       = {10.1109/PIMRC.2004.1368844},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/QiuZB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/Bao04,
  author    = {Feng Bao},
  title     = {A scheme of digital ticket for personal trusted device},
  booktitle = {Proceedings of the {IEEE} 15th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2004, 5-8 September
               2004, Barcelona, Spain},
  pages     = {3065--3069},
  year      = {2004},
  crossref  = {DBLP:conf/pimrc/2004},
  url       = {https://doi.org/10.1109/PIMRC.2004.1368883},
  doi       = {10.1109/PIMRC.2004.1368883},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/Bao04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/QiuZB04,
  author    = {Ying Qiu and
               Jianying Zhou and
               Feng Bao},
  title     = {Protecting all traffic channels in mobile IPv6 network},
  booktitle = {2004 {IEEE} Wireless Communications and Networking Conference , {WCNC}
               2004, Atlanta, Georgia, USA, 21-25 March 2004},
  pages     = {160--165},
  year      = {2004},
  crossref  = {DBLP:conf/wcnc/2004},
  url       = {https://doi.org/10.1109/WCNC.2004.1311536},
  doi       = {10.1109/WCNC.2004.1311536},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/QiuZB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2004,
  editor    = {Feng Bao and
               Robert H. Deng and
               Jianying Zhou},
  title     = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
               Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
               2004},
  series    = {Lecture Notes in Computer Science},
  volume    = {2947},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95631},
  doi       = {10.1007/b95631},
  isbn      = {3-540-21018-0},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangBZD04,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Comments on a Threshold Proxy Signature Scheme Based on the {RSA}
               Cryptosystem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {54},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/054},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WangBZD04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bao03,
  author    = {Feng Bao},
  title     = {Cryptanalysis of a New Cellular Automata Cryptosystem},
  booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
               2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  pages     = {416--427},
  year      = {2003},
  crossref  = {DBLP:conf/acisp/2003},
  url       = {https://doi.org/10.1007/3-540-45067-X\_36},
  doi       = {10.1007/3-540-45067-X\_36},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/Bao03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YaoRBDF03,
  author    = {Gang Yao and
               Kui Ren and
               Feng Bao and
               Robert H. Deng and
               Dengguo Feng},
  title     = {Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient},
  booktitle = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  pages     = {343--356},
  year      = {2003},
  crossref  = {DBLP:conf/acns/2003},
  url       = {https://doi.org/10.1007/978-3-540-45203-4\_27},
  doi       = {10.1007/978-3-540-45203-4\_27},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/YaoRBDF03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DengB03,
  author    = {Robert H. Deng and
               Feng Bao},
  title     = {An improved personal {CA} for personal area networks},
  booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
               '03, San Francisco, CA, USA, 1-5 December 2003},
  pages     = {1486--1490},
  year      = {2003},
  crossref  = {DBLP:conf/globecom/2003},
  url       = {https://doi.org/10.1109/GLOCOM.2003.1258485},
  doi       = {10.1109/GLOCOM.2003.1258485},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/DengB03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YangB03,
  author    = {Yanjiang Yang and
               Feng Bao},
  title     = {An invertible watermarking scheme for authentication of Electronic
               Clinical Brain Atlas},
  booktitle = {2003 {IEEE} International Conference on Acoustics, Speech, and Signal
               Processing, {ICASSP} '03, Hong Kong, April 6-10, 2003},
  pages     = {533--536},
  year      = {2003},
  crossref  = {DBLP:conf/icassp/2003},
  url       = {https://doi.org/10.1109/ICASSP.2003.1199529},
  doi       = {10.1109/ICASSP.2003.1199529},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icassp/YangB03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangBZD03,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Security Remarks on a Group Signature Scheme with Member Deletion},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {72--83},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_7},
  doi       = {10.1007/978-3-540-39927-8\_7},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WangBZD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuBD03,
  author    = {Hongjun Wu and
               Feng Bao and
               Robert H. Deng},
  title     = {An Efficient Known Plaintext Attack on {FEA-M}},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {84--87},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_8},
  doi       = {10.1007/978-3-540-39927-8\_8},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WuBD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhouBD03,
  author    = {Jianying Zhou and
               Feng Bao and
               Robert H. Deng},
  title     = {An Efficient Public-Key Framework},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {88--99},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_9},
  doi       = {10.1007/978-3-540-39927-8\_9},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhouBD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BaoDZ03,
  author    = {Feng Bao and
               Robert H. Deng and
               Huafei Zhu},
  title     = {Variations of Diffie-Hellman Problem},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {301--312},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_28},
  doi       = {10.1007/978-3-540-39927-8\_28},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/BaoDZ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangBZD03,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Security Analysis of Some Proxy Signatures},
  booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International
               Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  pages     = {305--319},
  year      = {2003},
  crossref  = {DBLP:conf/icisc/2003},
  url       = {https://doi.org/10.1007/978-3-540-24691-6\_23},
  doi       = {10.1007/978-3-540-24691-6\_23},
  timestamp = {Tue, 07 Nov 2017 13:40:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/WangBZD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WuBX03,
  author    = {Yongdong Wu and
               Feng Bao and
               Changsheng Xu},
  title     = {The security flaws in some authentication watermarking schemes},
  booktitle = {Proceedings of the 2003 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2003, 6-9 July 2003, Baltimore, MD, {USA}},
  pages     = {493--496},
  year      = {2003},
  crossref  = {DBLP:conf/icmcs/2003},
  url       = {https://doi.org/10.1109/ICME.2003.1221661},
  doi       = {10.1109/ICME.2003.1221661},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icmcs/WuBX03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/YangWBD03,
  author    = {Yanjiang Yang and
               Zhenlan Wang and
               Feng Bao and
               Robert H. Deng},
  title     = {Secure the image-based simulated telesurgery system},
  booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems,
               {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages     = {596--599},
  year      = {2003},
  crossref  = {DBLP:conf/iscas/2003},
  url       = {https://doi.org/10.1109/ISCAS.2003.1206044},
  doi       = {10.1109/ISCAS.2003.1206044},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iscas/YangWBD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhouBD03,
  author    = {Jianying Zhou and
               Feng Bao and
               Robert H. Deng},
  title     = {Validating Digital Signatures without TTP's Time-Stamping and Certificate
               Revocation},
  booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  pages     = {96--110},
  year      = {2003},
  crossref  = {DBLP:conf/isw/2003},
  url       = {https://doi.org/10.1007/10958513\_8},
  doi       = {10.1007/10958513\_8},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/ZhouBD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Bao03,
  author    = {Feng Bao},
  title     = {Security Analysis of a Password Authenticated Key Exchange Protocol},
  booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  pages     = {208--217},
  year      = {2003},
  crossref  = {DBLP:conf/isw/2003},
  url       = {https://doi.org/10.1007/10958513\_16},
  doi       = {10.1007/10958513\_16},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/Bao03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vcip/YangBD03,
  author    = {Yanjiang Yang and
               Feng Bao and
               Robert H. Deng},
  title     = {Flexible authentication of images},
  booktitle = {Visual Communications and Image Processing 2003, Lugano, Switzerland,
               July 8, 2003},
  pages     = {1905--1911},
  year      = {2003},
  crossref  = {DBLP:conf/vcip/2003},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vcip/YangBD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuBD03,
  author    = {Huafei Zhu and
               Feng Bao and
               Robert H. Deng},
  title     = {Computing of Trust in Distributed Networks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {56},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/056},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhuBD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangBZD03,
  author    = {Guilin Wang and
               Feng Bao and
               Jianying Zhou and
               Robert H. Deng},
  title     = {Security Analysis of Some Proxy Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {196},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/196},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WangBZD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/WuBD02,
  author    = {Hongjun Wu and
               Feng Bao and
               Robert H. Deng},
  title     = {Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes},
  journal   = {Informatica (Slovenia)},
  volume    = {26},
  number    = {3},
  year      = {2002},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaSI/WuBD02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangBD02,
  author    = {Yanjiang Yang and
               Feng Bao and
               Robert H. Deng},
  title     = {Security Analysis and Improvement of the Global Key Recovery System},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {17--24},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_2},
  doi       = {10.1007/3-540-45450-0\_2},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/YangBD02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuB02,
  author    = {Hongjun Wu and
               Feng Bao},
  title     = {Cryptanalysis of Stream Cipher COS(2, 128) Mode {I}},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {154--158},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_12},
  doi       = {10.1007/3-540-45450-0\_12},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/WuB02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DengZB02,
  author    = {Robert H. Deng and
               Jianying Zhou and
               Feng Bao},
  title     = {Defending against redirect attacks in mobile {IP}},
  booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages     = {59--67},
  year      = {2002},
  crossref  = {DBLP:conf/ccs/2002},
  url       = {https://doi.org/10.1145/586110.586120},
  doi       = {10.1145/586110.586120},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DengZB02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vip/WuXB02,
  author    = {Yongdong Wu and
               Changsheng Xu and
               Feng Bao},
  title     = {Counterfeiting Attack on a Lossless Authentication Watermarking Scheme},
  booktitle = {Visualisation 2002, Selected Papers from the Pan-Sydney Area Workshop
               on Visual Information Processing, {VIP2002}},
  pages     = {109--112},
  year      = {2002},
  crossref  = {DBLP:conf/vip/2002},
  url       = {http://crpit.com/confpapers/CRPITV22Wu.ps},
  timestamp = {Tue, 25 Sep 2018 16:58:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vip/WuXB02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2002,
  editor    = {Robert H. Deng and
               Sihan Qing and
               Feng Bao and
               Jianying Zhou},
  title     = {Information and Communications Security, 4th International Conference,
               {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2513},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36159-6},
  doi       = {10.1007/3-540-36159-6},
  isbn      = {3-540-00164-6},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuB02,
  author    = {Hongjun Wu and
               Feng Bao},
  title     = {Cryptanalysis of Stream Cipher {COS} (2, 128) Mode {I}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {5},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/005},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WuB02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoDFGW01,
  author    = {Feng Bao and
               Robert H. Deng and
               Peirong Feng and
               Yan Guo and
               Hongjun Wu},
  title     = {Secure and Private Distribution of Online Video and Some Related Cryptographic
               Issues},
  booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  pages     = {190--205},
  year      = {2001},
  crossref  = {DBLP:conf/acisp/2001},
  url       = {https://doi.org/10.1007/3-540-47719-5\_17},
  doi       = {10.1007/3-540-47719-5\_17},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaoDFGW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BaoD01,
  author    = {Feng Bao and
               Robert H. Deng},
  title     = {Privacy Protection for Transactions of Digital Goods},
  booktitle = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  pages     = {202--213},
  year      = {2001},
  crossref  = {DBLP:conf/icics/2001},
  url       = {https://doi.org/10.1007/3-540-45600-7\_23},
  doi       = {10.1007/3-540-45600-7\_23},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/BaoD01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaoDGSSW01,
  author    = {Feng Bao and
               Robert H. Deng and
               Willi Geiselmann and
               Claus{-}Peter Schnorr and
               Rainer Steinwandt and
               Hongjun Wu},
  title     = {Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems},
  booktitle = {Public Key Cryptography, 4th International Workshop on Practice and
               Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
               February 13-15, 2001, Proceedings},
  pages     = {153--164},
  year      = {2001},
  crossref  = {DBLP:conf/pkc/2001},
  url       = {https://doi.org/10.1007/3-540-44586-2\_11},
  doi       = {10.1007/3-540-44586-2\_11},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BaoDGSSW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WuBD01,
  author    = {Hongjun Wu and
               Feng Bao and
               Robert H. Deng},
  title     = {Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing
               Infrastructures},
  booktitle = {Public Key Cryptography, 4th International Workshop on Practice and
               Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
               February 13-15, 2001, Proceedings},
  pages     = {173--179},
  year      = {2001},
  crossref  = {DBLP:conf/pkc/2001},
  url       = {https://doi.org/10.1007/3-540-44586-2\_13},
  doi       = {10.1007/3-540-44586-2\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/WuBD01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangDB00,
  author    = {Xinkai Wang and
               Robert H. Deng and
               Feng Bao},
  title     = {Multicast Internet protocol},
  journal   = {Computer Communications},
  volume    = {23},
  number    = {11},
  pages     = {1047--1054},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0140-3664(00)00167-5},
  doi       = {10.1016/S0140-3664(00)00167-5},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/WangDB00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuBYD00,
  author    = {Hongjun Wu and
               Feng Bao and
               Dingfeng Ye and
               Robert H. Deng},
  title     = {Cryptanalysis of the \emph{m}-Permutation Protection Schemes},
  booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  pages     = {97--111},
  year      = {2000},
  crossref  = {DBLP:conf/acisp/2000},
  url       = {https://doi.org/10.1007/10718964\_9},
  doi       = {10.1007/10718964\_9},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/WuBYD00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuBYD00a,
  author    = {Hongjun Wu and
               Feng Bao and
               Dingfeng Ye and
               Robert H. Deng},
  title     = {Cryptanalysis of Polynominal Authentication and Signature Scheme},
  booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  pages     = {278--288},
  year      = {2000},
  crossref  = {DBLP:conf/acisp/2000},
  url       = {https://doi.org/10.1007/10718964\_23},
  doi       = {10.1007/10718964\_23},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/WuBYD00a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Bao00,
  author    = {Feng Bao},
  title     = {Introducing Decryption Authority into {PKI}},
  booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages     = {288},
  year      = {2000},
  crossref  = {DBLP:conf/acsac/2000},
  url       = {https://doi.org/10.1109/ACSAC.2000.898883},
  doi       = {10.1109/ACSAC.2000.898883},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/Bao00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BaoDF00,
  author    = {Feng Bao and
               Robert H. Deng and
               Peirong Feng},
  title     = {An Efficient and Practical Scheme for Privacy Protection in the E-Commerce
               of Digital Goods},
  booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International
               Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  pages     = {162--170},
  year      = {2000},
  crossref  = {DBLP:conf/icisc/2000},
  url       = {https://doi.org/10.1007/3-540-45247-8\_13},
  doi       = {10.1007/3-540-45247-8\_13},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/BaoDF00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/Bao00,
  author    = {Feng Bao},
  title     = {Multimedia content protection by cryptography and watermarking in
               tamper-resistant hardware},
  booktitle = {Proceedings of the {ACM} Multimedia 2000 Workshops, Los Angeles, CA,
               USA, October 30 - November 3, 2000},
  pages     = {139--142},
  year      = {2000},
  crossref  = {DBLP:conf/mm/2000w},
  url       = {https://doi.org/10.1145/357744.357909},
  doi       = {10.1145/357744.357909},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mm/Bao00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhouDB00,
  author    = {Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Some Remarks on a Fair Exchange Protocol},
  booktitle = {Public Key Cryptography, Third International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
               Australia, January 18-20, 2000, Proceedings},
  pages     = {46--57},
  year      = {2000},
  crossref  = {DBLP:conf/pkc/2000},
  url       = {https://doi.org/10.1007/978-3-540-46588-1\_4},
  doi       = {10.1007/978-3-540-46588-1\_4},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/ZhouDB00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BaoDZ00,
  author    = {Feng Bao and
               Robert H. Deng and
               Jianying Zhou},
  title     = {Electronic Payment Systems with Fair On-line Verification},
  booktitle = {Information Security for Global Information Infrastructures, {IFIP}
               {TC11} Fifteenth Annual Working Conference on Information Security,
               August 22-24, 2000, Beijing, China},
  pages     = {451--460},
  year      = {2000},
  crossref  = {DBLP:conf/sec/2000},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/BaoDZ00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhouDB99,
  author    = {Jianying Zhou and
               Robert H. Deng and
               Feng Bao},
  title     = {Evolution of Fair Non-repudiation with {TTP}},
  booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  pages     = {258--269},
  year      = {1999},
  crossref  = {DBLP:conf/acisp/1999},
  url       = {https://doi.org/10.1007/3-540-48970-3\_21},
  doi       = {10.1007/3-540-48970-3\_21},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ZhouDB99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/BaoDNV99,
  author    = {Feng Bao and
               Robert H. Deng and
               Khanh Quoc Nguyen and
               Vijay Varadharajan},
  title     = {Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party},
  booktitle = {10th International Workshop on Database {\&} Expert Systems Applications,
               Florence, Italy, September 1-3, 1999, Proceedings.},
  pages     = {858--863},
  year      = {1999},
  crossref  = {DBLP:conf/dexaw/1999},
  url       = {https://doi.org/10.1109/DEXA.1999.795294},
  doi       = {10.1109/DEXA.1999.795294},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/BaoDNV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NguyenBMV99,
  author    = {Khanh Quoc Nguyen and
               Feng Bao and
               Yi Mu and
               Vijay Varadharajan},
  title     = {Zero-Knowledge Proofs of Possession of Digital Signatures and Its
               Applications},
  booktitle = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  pages     = {103--118},
  year      = {1999},
  crossref  = {DBLP:conf/icics/1999},
  url       = {https://doi.org/10.1007/978-3-540-47942-0\_9},
  doi       = {10.1007/978-3-540-47942-0\_9},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/NguyenBMV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaoD99,
  author    = {Feng Bao and
               Robert H. Deng},
  title     = {A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant
               Anonymity Revocation},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {1--11},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7\_1},
  doi       = {10.1007/3-540-49162-7\_1},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BaoD99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuBDY98,
  author    = {Hongjun Wu and
               Feng Bao and
               Robert H. Deng and
               Qin{-}Zhong Ye},
  title     = {Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  pages     = {126--132},
  year      = {1998},
  crossref  = {DBLP:conf/asiacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-49649-1\_11},
  doi       = {10.1007/3-540-49649-1\_11},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/WuBDY98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuBDY98a,
  author    = {Hongjun Wu and
               Feng Bao and
               Robert H. Deng and
               Qin{-}Zhong Ye},
  title     = {Improved Truncated Differential Attacks on {SAFER}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  pages     = {133--147},
  year      = {1998},
  crossref  = {DBLP:conf/asiacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-49649-1\_12},
  doi       = {10.1007/3-540-49649-1\_12},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/WuBDY98a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Bao98,
  author    = {Feng Bao},
  title     = {An Efficient Verifiable Encryption Scheme for Encryption of Discrete
               Logarithms},
  booktitle = {Smart Card Research and Applications, This International Conference,
               {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  pages     = {213--220},
  year      = {1998},
  crossref  = {DBLP:conf/cardis/1998},
  url       = {https://doi.org/10.1007/10721064\_19},
  doi       = {10.1007/10721064\_19},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/Bao98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaoD98,
  author    = {Feng Bao and
               Robert H. Deng},
  title     = {A Signcryption Scheme with Signature Directly Verifiable by Public
               Key},
  booktitle = {Public Key Cryptography, First International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
               Japan, February 5-6, 1998, Proceedings},
  pages     = {55--59},
  year      = {1998},
  crossref  = {DBLP:conf/pkc/1998},
  url       = {https://doi.org/10.1007/BFb0054014},
  doi       = {10.1007/BFb0054014},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BaoD98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BaoDM98,
  author    = {Feng Bao and
               Robert H. Deng and
               Wenbo Mao},
  title     = {Efficient and Practical Fair Exchange Protocols with Off-Line {TTP}},
  booktitle = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
               Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages     = {77--85},
  year      = {1998},
  crossref  = {DBLP:conf/sp/1998},
  url       = {https://doi.org/10.1109/SECPRI.1998.674825},
  doi       = {10.1109/SECPRI.1998.674825},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/BaoDM98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/DengHBN98,
  author    = {Robert H. Deng and
               Jian Hu and
               Feng Bao and
               A. Desai Narasimhalu},
  title     = {A Ubiquitous Secure and Reliable Digital Data Depository System},
  booktitle = {7th Workshop on Enabling Technologies {(WETICE} '98), Infrastructure
               for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA,
               Proceedings},
  pages     = {354--358},
  year      = {1998},
  crossref  = {DBLP:conf/wetice/1998},
  url       = {https://doi.org/10.1109/ENABL.1998.725717},
  doi       = {10.1109/ENABL.1998.725717},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wetice/DengHBN98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoDJ97,
  author    = {Feng Bao and
               Robert H. Deng and
               Yongfei Han and
               Albert B. Jeng},
  title     = {Design and Analyses of Two Basic Protocols for Use in TTP-Based Key
               Escrow},
  booktitle = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  pages     = {261--270},
  year      = {1997},
  crossref  = {DBLP:conf/acisp/1997},
  url       = {https://doi.org/10.1007/BFb0027933},
  doi       = {10.1007/BFb0027933},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaoDJ97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JoyeQBD97,
  author    = {Marc Joye and
               Jean{-}Jacques Quisquater and
               Feng Bao and
               Robert H. Deng},
  title     = {RSA-type Signatures in the Presence of Transient Faults},
  booktitle = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
               UK, December 17-19, 1997, Proceedings},
  pages     = {155--160},
  year      = {1997},
  crossref  = {DBLP:conf/ima/1997},
  url       = {https://doi.org/10.1007/BFb0024460},
  doi       = {10.1007/BFb0024460},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ima/JoyeQBD97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BaoDGI97,
  author    = {Feng Bao and
               Robert H. Deng and
               Xiang Gao and
               Yoshihide Igarashi},
  title     = {Modified Finite Automata Public Key Cryptosystem},
  booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
               Japan, September 17-19, 1997, Proceedings},
  pages     = {82--95},
  year      = {1997},
  crossref  = {DBLP:conf/isw/1997},
  url       = {https://doi.org/10.1007/BFb0030411},
  doi       = {10.1007/BFb0030411},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/BaoDGI97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaoDHJNN97,
  author    = {Feng Bao and
               Robert H. Deng and
               Yongfei Han and
               Albert B. Jeng and
               A. Desai Narasimhalu and
               Teow{-}Hin Ngair},
  title     = {Breaking Public Key Cryptosystems on Tamper Resistant Devices in the
               Presence of Transient Faults},
  booktitle = {Security Protocols, 5th International Workshop, Paris, France, April
               7-9, 1997, Proceedings},
  pages     = {115--124},
  year      = {1997},
  crossref  = {DBLP:conf/spw/1997},
  url       = {https://doi.org/10.1007/BFb0028164},
  doi       = {10.1007/BFb0028164},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/spw/BaoDHJNN97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ithings/2016,
  editor    = {Xingang Liu and
               Tie Qiu and
               Bin Guo and
               Kaixuan Lu and
               Zhaolong Ning and
               Mianxiong Dong and
               Yayong Li},
  title     = {2016 {IEEE} International Conference on Internet of Things (iThings)
               and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
               Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
               (SmartData), Chengdu, China, December 15-18, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7916868},
  isbn      = {978-1-5090-5880-8},
  timestamp = {Sun, 14 May 2017 16:07:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ithings/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2013,
  editor    = {Michael J. Jacobson Jr. and
               Michael E. Locasto and
               Payman Mohassel and
               Reihaneh Safavi{-}Naini},
  title     = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7954},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1},
  doi       = {10.1007/978-3-642-38980-1},
  isbn      = {978-3-642-38979-5},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2013,
  editor    = {Elisa Bertino and
               Ravi S. Sandhu and
               Lujo Bauer and
               Jaehong Park},
  title     = {Third {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2435349},
  isbn      = {978-1-4503-1890-7},
  timestamp = {Wed, 27 Feb 2013 10:41:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2011,
  editor    = {Javier L{\'{o}}pez and
               Gene Tsudik},
  title     = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6715},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4},
  doi       = {10.1007/978-3-642-21554-4},
  isbn      = {978-3-642-21553-7},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cse/2011,
  editor    = {Wenyu Qu and
               Kai Lin and
               Yanming Shen and
               Weisong Shi and
               D. Frank Hsu and
               Xiaolong Jin and
               Francis C. M. Lau and
               Junfeng Xu},
  title     = {14th {IEEE} International Conference on Computational Science and
               Engineering, {CSE} 2011, Dalian, China, August 24-26, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6062561},
  isbn      = {978-1-4577-0974-6},
  timestamp = {Mon, 21 Aug 2017 13:33:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2011,
  editor    = {Sihan Qing and
               Willy Susilo and
               Guilin Wang and
               Dongmei Liu},
  title     = {Information and Communications Security - 13th International Conference,
               {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7043},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25243-3},
  doi       = {10.1007/978-3-642-25243-3},
  isbn      = {978-3-642-25242-6},
  timestamp = {Thu, 15 Jun 2017 21:38:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icon/2011,
  editor    = {Bharadwaj Veeravalli and
               Ian T. Foster},
  title     = {Proceedings of the 17th {IEEE} International Conference on Networks,
               {ICON} 2011, Singapore, December 14-16, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6165553},
  isbn      = {978-1-4577-1824-3},
  timestamp = {Thu, 22 Mar 2012 15:04:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icon/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2011w,
  editor    = {Vicente Casares Giner and
               Pietro Manzoni and
               Ana Pont},
  title     = {{NETWORKING} 2011 Workshops - International {IFIP} {TC} 6 Workshops,
               PE-CRN, NC-Pro, WCNS, and {SUNSET} 2011, Held at {NETWORKING} 2011,
               Valencia, Spain, May 13, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6827},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-23041-7},
  doi       = {10.1007/978-3-642-23041-7},
  isbn      = {978-3-642-23040-0},
  timestamp = {Fri, 02 Nov 2018 09:39:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/networking/2011w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEcit/2010,
  title     = {10th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5575291},
  isbn      = {978-0-7695-4108-2},
  timestamp = {Tue, 31 May 2016 16:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2010,
  editor    = {Carrie Gates and
               Michael Franz and
               John P. McDermott},
  title     = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
               2010, Austin, Texas, USA, 6-10 December 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1920261},
  doi       = {10.1145/1920261},
  isbn      = {978-1-4503-0133-6},
  timestamp = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9},
  doi       = {10.1007/978-3-642-12678-9},
  isbn      = {978-3-642-12677-2},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010asia,
  editor    = {Dengguo Feng and
               David A. Basin and
               Peng Liu},
  title     = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
               2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-60558-936-7},
  timestamp = {Tue, 21 Nov 2017 18:32:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21518-6},
  doi       = {10.1007/978-3-642-21518-6},
  isbn      = {978-3-642-21517-9},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2010,
  editor    = {Sara Foresti and
               Sushil Jajodia},
  title     = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
               {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6166},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13739-6},
  doi       = {10.1007/978-3-642-13739-6},
  isbn      = {978-3-642-13738-9},
  timestamp = {Tue, 18 Jul 2017 16:51:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2010,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5497983},
  isbn      = {978-1-4244-6402-9},
  timestamp = {Mon, 05 Sep 2011 17:37:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2010,
  editor    = {Liqun Chen and
               Moti Yung},
  title     = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6802},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25283-9},
  doi       = {10.1007/978-3-642-25283-9},
  isbn      = {978-3-642-25282-2},
  timestamp = {Fri, 26 May 2017 00:49:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2010,
  editor    = {Mike Burmester and
               Gene Tsudik and
               Spyros S. Magliveras and
               Ivana Ilic},
  title     = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6531},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-18178-8},
  doi       = {10.1007/978-3-642-18178-8},
  isbn      = {978-3-642-18177-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2010,
  editor    = {Yang Xiang and
               Pierangela Samarati and
               Jiankun Hu and
               Wanlei Zhou and
               Ahmad{-}Reza Sadeghi},
  title     = {Fourth International Conference on Network and System Security, {NSS}
               2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5634608},
  isbn      = {978-1-4244-8484-3},
  timestamp = {Sun, 11 Mar 2018 01:37:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pcm/2010-1,
  editor    = {Guoping Qiu and
               Kin{-}Man Lam and
               Hitoshi Kiya and
               Xiangyang Xue and
               C.{-}C. Jay Kuo and
               Michael S. Lew},
  title     = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th
               Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24,
               2010, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {6297},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15702-8},
  doi       = {10.1007/978-3-642-15702-8},
  isbn      = {978-3-642-15701-1},
  timestamp = {Sun, 21 May 2017 00:20:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pcm/2010-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2010,
  editor    = {Swee{-}Huay Heng and
               Kaoru Kurosawa},
  title     = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
               Malaysia, October 13-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6402},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16280-0},
  doi       = {10.1007/978-3-642-16280-0},
  isbn      = {978-3-642-16279-4},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2010,
  editor    = {Sokratis K. Katsikas and
               Pierangela Samarati},
  title     = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
               and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {SciTePress},
  year      = {2010},
  isbn      = {978-989-8425-18-8},
  timestamp = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securware/2010,
  editor    = {Reijo Savola and
               Masaru Takesue and
               Rainer Falk and
               Manuela Popescu},
  title     = {Fourth International Conference on Emerging Security Information Systems
               and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5629472},
  isbn      = {978-1-4244-7517-9},
  timestamp = {Mon, 17 Aug 2015 18:10:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securware/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2010,
  editor    = {Ahmed K. Elmagarmid and
               Divyakant Agrawal},
  title     = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5590331},
  isbn      = {978-0-7695-4211-9},
  timestamp = {Fri, 28 Aug 2015 14:17:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2010,
  editor    = {Sokratis K. Katsikas and
               Javier L{\'{o}}pez and
               Miguel Soriano},
  title     = {Trust, Privacy and Security in Digital Business, 7th International
               Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6264},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15152-1},
  doi       = {10.1007/978-3-642-15152-1},
  isbn      = {978-3-642-15151-4},
  timestamp = {Thu, 04 Jan 2018 22:11:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2009,
  title     = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
               2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5379501},
  isbn      = {978-0-7695-3919-5},
  timestamp = {Thu, 21 Jun 2018 07:14:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2009,
  editor    = {Bart Preneel},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5580},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2},
  doi       = {10.1007/978-3-642-02384-2},
  isbn      = {978-3-642-02383-5},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2009,
  editor    = {Fabio Martinelli and
               Bart Preneel},
  title     = {Public Key Infrastructures, Services and Applications - 6th European
               Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6391},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16441-5},
  doi       = {10.1007/978-3-642-16441-5},
  isbn      = {978-3-642-16440-8},
  timestamp = {Fri, 19 May 2017 01:25:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2009,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  publisher = {{IEEE}},
  year      = {2009},
  timestamp = {Thu, 04 Mar 2010 15:03:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2009,
  editor    = {Sihan Qing and
               Chris J. Mitchell and
               Guilin Wang},
  title     = {Information and Communications Security, 11th International Conference,
               {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5927},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-11145-7},
  doi       = {10.1007/978-3-642-11145-7},
  isbn      = {978-3-642-11144-0},
  timestamp = {Sun, 04 Jun 2017 10:06:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2009,
  editor    = {Bimal K. Roy and
               Nicolas Sendrier},
  title     = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5922},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6},
  doi       = {10.1007/978-3-642-10628-6},
  isbn      = {978-3-642-10627-9},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2009,
  editor    = {Pierangela Samarati and
               Moti Yung and
               Fabio Martinelli and
               Claudio Agostino Ardagna},
  title     = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5735},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8},
  doi       = {10.1007/978-3-642-04474-8},
  isbn      = {978-3-642-04473-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2009,
  title     = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
               2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5347306},
  isbn      = {978-1-4244-4488-5},
  timestamp = {Wed, 10 Dec 2014 18:26:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pcm/2009,
  editor    = {Paisarn Muneesawang and
               Feng Wu and
               Itsuo Kumazawa and
               Athikom Roeksabutr and
               Mark Liao and
               Xiaoou Tang},
  title     = {Advances in Multimedia Information Processing - {PCM} 2009, 10th Pacific
               Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5879},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10467-1},
  doi       = {10.1007/978-3-642-10467-1},
  isbn      = {978-3-642-10466-4},
  timestamp = {Wed, 14 Nov 2018 10:52:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pcm/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2009,
  editor    = {Josef Pieprzyk and
               Fangguo Zhang},
  title     = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5848},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1},
  doi       = {10.1007/978-3-642-04642-1},
  isbn      = {978-3-642-04641-4},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2009,
  editor    = {Yan Chen and
               Tassos Dimitriou and
               Jianying Zhou},
  title     = {Security and Privacy in Communication Networks - 5th International
               {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
               2009, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {19},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05284-2},
  doi       = {10.1007/978-3-642-05284-2},
  isbn      = {978-3-642-05283-5},
  timestamp = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2009,
  editor    = {Peter Y. A. Ryan and
               Berry Schoenmakers},
  title     = {E-Voting and Identity, Second International Conference, {VOTE-ID}
               2009, Luxembourg, September 7-8, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5767},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04135-8},
  doi       = {10.1007/978-3-642-04135-8},
  isbn      = {978-3-642-04134-1},
  timestamp = {Wed, 14 Nov 2018 10:59:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/voteid/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2009,
  editor    = {Heung Youl Youm and
               Moti Yung},
  title     = {Information Security Applications, 10th International Workshop, {WISA}
               2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5932},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10838-9},
  doi       = {10.1007/978-3-642-10838-9},
  isbn      = {978-3-642-10837-2},
  timestamp = {Sun, 21 May 2017 00:17:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2008,
  title     = {Proceedings of the The Third International Conference on Availability,
               Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
               University of Catalonia, Barcelona , Spain},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4529302},
  isbn      = {978-0-7695-3102-1},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2008,
  editor    = {Steven M. Bellovin and
               Rosario Gennaro and
               Angelos D. Keromytis and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, 6th International Conference,
               {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5037},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68914-0},
  doi       = {10.1007/978-3-540-68914-0},
  isbn      = {978-3-540-68913-3},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008x,
  editor    = {Moti Yung and
               Peng Liu and
               Dongdai Lin},
  title     = {Information Security and Cryptology, 4th International Conference,
               Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5487},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01440-6},
  doi       = {10.1007/978-3-642-01440-6},
  isbn      = {978-3-642-01439-0},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2008x},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euc/2008-2,
  editor    = {Cheng{-}Zhong Xu and
               Minyi Guo},
  title     = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
               Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
               {II:} Workshops},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4755182},
  timestamp = {Tue, 04 Dec 2018 10:25:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/euc/2008-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2008,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2008, Beijing, China, 19-23 May 2008},
  publisher = {{IEEE}},
  year      = {2008},
  timestamp = {Mon, 23 Mar 2009 16:02:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2008,
  editor    = {Pil Joong Lee and
               Jung Hee Cheon},
  title     = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5461},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00730-9},
  doi       = {10.1007/978-3-642-00730-9},
  isbn      = {978-3-642-00729-3},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icmcs/2008,
  title     = {Proceedings of the 2008 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4599583},
  isbn      = {978-1-4244-2571-6},
  timestamp = {Mon, 11 Feb 2019 17:32:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icmcs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2008,
  editor    = {Liqun Chen and
               Yi Mu and
               Willy Susilo},
  title     = {Information Security Practice and Experience, 4th International Conference,
               {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4991},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79104-1},
  doi       = {10.1007/978-3-540-79104-1},
  isbn      = {978-3-540-79103-4},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2008,
  editor    = {Tzong{-}Chen Wu and
               Chin{-}Laung Lei and
               Vincent Rijmen and
               Der{-}Tsai Lee},
  title     = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
               Taiwan, September 15-18, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5222},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85886-7},
  doi       = {10.1007/978-3-540-85886-7},
  isbn      = {978-3-540-85884-3},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2008,
  editor    = {Sushil Jajodia and
               Pierangela Samarati and
               Stelvio Cimato},
  title     = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
               Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
               September 7-10, 2008, Milano, Italy},
  series    = {{IFIP}},
  volume    = {278},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-0-387-09698-8},
  timestamp = {Wed, 17 Sep 2008 12:43:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2007,
  editor    = {Josef Pieprzyk and
               Hossein Ghodosi and
               Ed Dawson},
  title     = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4586},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1},
  doi       = {10.1007/978-3-540-73458-1},
  isbn      = {978-3-540-73457-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aina/2007w1,
  title     = {21st International Conference on Advanced Information Networking and
               Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
               2007, Niagara Falls, Canada},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4221006},
  timestamp = {Mon, 15 Sep 2014 17:23:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/2007w1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008,
  editor    = {Dingyi Pei and
               Moti Yung and
               Dongdai Lin and
               Chuankun Wu},
  title     = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4990},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8},
  doi       = {10.1007/978-3-540-79499-8},
  isbn      = {978-3-540-79498-1},
  timestamp = {Sat, 24 Nov 2018 11:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2007,
  title     = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
               '07, Washington, DC, USA, 26-30 November 2007},
  publisher = {{IEEE}},
  year      = {2007},
  timestamp = {Wed, 18 Mar 2009 14:08:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2007,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  publisher = {{IEEE}},
  year      = {2007},
  timestamp = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2007,
  editor    = {Sihan Qing and
               Hideki Imai and
               Guilin Wang},
  title     = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4861},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77048-0},
  doi       = {10.1007/978-3-540-77048-0},
  isbn      = {978-3-540-77047-3},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icmcs/2007,
  title     = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4284552},
  isbn      = {1-4244-1017-7},
  timestamp = {Mon, 11 Feb 2019 17:32:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icmcs/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2007,
  editor    = {Ed Dawson and
               Duncan S. Wong},
  title     = {Information Security Practice and Experience, Third International
               Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4464},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72163-5},
  doi       = {10.1007/978-3-540-72163-5},
  isbn      = {978-3-540-72159-8},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pimrc/2007,
  title     = {Proceedings of the {IEEE} 18th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
               2007, Athens, Greece},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4393982},
  isbn      = {978-1-4244-1144-3},
  timestamp = {Thu, 11 Jul 2013 11:14:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2007,
  editor    = {Tatsuaki Okamoto and
               Xiaoyun Wang},
  title     = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4450},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8},
  doi       = {10.1007/978-3-540-71677-8},
  isbn      = {978-3-540-71676-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2007,
  editor    = {Hein S. Venter and
               Mariki M. Eloff and
               Les Labuschagne and
               Jan H. P. Eloff and
               Rossouw von Solms},
  title     = {New Approaches for Security, Privacy and Trust in Complex Environments,
               Proceedings of the {IFIP} {TC-11} 22nd International Information Security
               Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series    = {{IFIP}},
  volume    = {232},
  publisher = {Springer},
  year      = {2007},
  isbn      = {978-0-387-72366-2},
  timestamp = {Tue, 13 May 2008 09:00:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2007,
  title     = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,
               Hong Kong, China, 11-15 March, 2007},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4204175},
  isbn      = {1-4244-0658-7},
  timestamp = {Tue, 14 Feb 2012 14:29:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2006,
  editor    = {Lynn Margaret Batten and
               Reihaneh Safavi{-}Naini},
  title     = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
               2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4058},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11780656},
  doi       = {10.1007/11780656},
  isbn      = {3-540-35458-1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006,
  editor    = {Ferng{-}Ching Lin and
               Der{-}Tsai Lee and
               Bao{-}Shuh Paul Lin and
               Shiuhpyng Shieh and
               Sushil Jajodia},
  title     = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-272-0},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cikm/2006,
  editor    = {Philip S. Yu and
               Vassilis J. Tsotras and
               Edward A. Fox and
               Bing Liu},
  title     = {Proceedings of the 2006 {ACM} {CIKM} International Conference on Information
               and Knowledge Management, Arlington, Virginia, USA, November 6-11,
               2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-433-2},
  timestamp = {Mon, 14 May 2012 09:20:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2006,
  editor    = {Helger Lipmaa and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
               2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4318},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11937807},
  doi       = {10.1007/11937807},
  isbn      = {3-540-49608-4},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2006,
  editor    = {Herbert Leitold and
               Evangelos P. Markatos},
  title     = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
               International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
               19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4237},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11909033},
  doi       = {10.1007/11909033},
  isbn      = {3-540-47820-5},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2006,
  editor    = {David Pointcheval},
  title     = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
               the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3860},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11605805},
  doi       = {10.1007/11605805},
  isbn      = {3-540-31033-9},
  timestamp = {Wed, 14 Nov 2018 10:58:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2006,
  editor    = {Dieter Gollmann and
               Jan Meier and
               Andrei Sabelfeld},
  title     = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4189},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11863908},
  doi       = {10.1007/11863908},
  isbn      = {3-540-44601-X},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2006,
  editor    = {Peng Ning and
               Sihan Qing and
               Ninghui Li},
  title     = {Information and Communications Security, 8th International Conference,
               {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4307},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11935308},
  doi       = {10.1007/11935308},
  isbn      = {3-540-49496-0},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2006,
  editor    = {Kefei Chen and
               Robert H. Deng and
               Xuejia Lai and
               Jianying Zhou},
  title     = {Information Security Practice and Experience, Second International
               Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3903},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11689522},
  doi       = {10.1007/11689522},
  isbn      = {3-540-33052-6},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2006,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg and
               Louise Yngstr{\"{o}}m and
               Stefan Lindskog},
  title     = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  series    = {{IFIP}},
  volume    = {201},
  publisher = {Springer},
  year      = {2006},
  isbn      = {0-387-33405-X},
  timestamp = {Tue, 21 Nov 2006 10:57:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secon/2006,
  title     = {Proceedings of the Third Annual {IEEE} Communications Society Conference
               on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2006,
               September 25-28, 2006, Reston, VA, {USA}},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4068086},
  isbn      = {1-4244-0626-9},
  timestamp = {Sun, 09 Dec 2012 17:31:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secon/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vtc/2006s,
  title     = {Proceedings of the 63rd {IEEE} Vehicular Technology Conference, {VTC}
               Spring 2006, 7-10 May 2006, Melbourne, Australia},
  publisher = {{IEEE}},
  year      = {2006},
  timestamp = {Wed, 30 Jan 2008 13:47:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vtc/2006s},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2006,
  title     = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006,
               3-6 April 2006, Las Vegas, Nevada, {USA}},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=11060},
  isbn      = {1-4244-0269-7},
  timestamp = {Sat, 03 Nov 2012 23:08:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2005,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
               2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3574},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137750},
  doi       = {10.1007/b137750},
  isbn      = {3-540-26547-3},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2005,
  editor    = {Jana Dittmann and
               Stefan Katzenbeisser and
               Andreas Uhl},
  title     = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
               International Conference, {CMS} 2005, Salzburg, Austria, September
               19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3677},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11552055},
  doi       = {10.1007/11552055},
  isbn      = {3-540-28791-4},
  timestamp = {Tue, 30 May 2017 16:36:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2005,
  editor    = {Alfred Menezes},
  title     = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
               the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3376},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b105222},
  doi       = {10.1007/b105222},
  isbn      = {3-540-24399-2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2005,
  editor    = {Sabrina De Capitani di Vimercati and
               Paul F. Syverson and
               Dieter Gollmann},
  title     = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
               in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3679},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11555827},
  doi       = {10.1007/11555827},
  isbn      = {3-540-28963-1},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2005,
  editor    = {Lu{\'{\i}}s Caires and
               Giuseppe F. Italiano and
               Lu{\'{\i}}s Monteiro and
               Catuscia Palamidessi and
               Moti Yung},
  title     = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3580},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11523468},
  doi       = {10.1007/11523468},
  isbn      = {3-540-27580-0},
  timestamp = {Wed, 14 Nov 2018 11:00:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2005,
  editor    = {Sihan Qing and
               Wenbo Mao and
               Javier L{\'{o}}pez and
               Guilin Wang},
  title     = {Information and Communications Security, 7th International Conference,
               {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3783},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11602897},
  doi       = {10.1007/11602897},
  isbn      = {3-540-30934-9},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ipccc/2005,
  title     = {Proceedings of the 24th {IEEE} International Performance Computing
               and Communications Conference, {IPCCC} 2005, April 7-9, 2005, Phoenix,
               Arizona, {USA}},
  publisher = {{IEEE}},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9884},
  isbn      = {0-7803-8991-3},
  timestamp = {Wed, 17 Sep 2014 19:35:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ipccc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2005,
  title     = {30th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2005),
               15-17 November 2005, Sydney, Australia, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10397},
  isbn      = {0-7695-2421-4},
  timestamp = {Wed, 10 Dec 2014 18:26:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pimrc/2005,
  title     = {Proceedings of the {IEEE} 16th International Symposium on Personal,
               Indoor and Mobile Radio Communications, Berlin, Germany, September
               11-14, 2005},
  publisher = {{IEEE}},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10989},
  isbn      = {9783800729098},
  timestamp = {Tue, 16 Jul 2013 18:10:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2005,
  editor    = {Ry{\^{o}}ichi Sasaki and
               Sihan Qing and
               Eiji Okamoto and
               Hiroshi Yoshiura},
  title     = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
               20th International Conference on Information Security {(SEC} 2005),
               May 30 - June 1, 2005, Chiba, Japan},
  series    = {{IFIP}},
  volume    = {181},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b135818},
  doi       = {10.1007/b135818},
  isbn      = {0-387-25658-X},
  timestamp = {Fri, 19 May 2017 01:25:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2005,
  editor    = {Sokratis K. Katsikas and
               Javier L{\'{o}}pez and
               G{\"{u}}nther Pernul},
  title     = {Trust, Privacy and Security in Digital Business: Second International
               Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3592},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11537878},
  doi       = {10.1007/11537878},
  isbn      = {3-540-28224-6},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2005,
  title     = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
               March 13-17, 2005, New Orleans, Louisiana, {USA}},
  publisher = {{IEEE}},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9744},
  isbn      = {0-7803-8966-2},
  timestamp = {Fri, 14 Dec 2012 10:34:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2004,
  editor    = {Huaxiong Wang and
               Josef Pieprzyk and
               Vijay Varadharajan},
  title     = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3108},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98755},
  doi       = {10.1007/b98755},
  isbn      = {3-540-22379-7},
  timestamp = {Wed, 14 Nov 2018 10:59:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2004,
  editor    = {Markus Jakobsson and
               Moti Yung and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3089},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98360},
  doi       = {10.1007/b98360},
  isbn      = {3-540-22217-0},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2004,
  editor    = {Pil Joong Lee},
  title     = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3329},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b104116},
  doi       = {10.1007/b104116},
  isbn      = {3-540-23975-8},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gcc/2004,
  editor    = {Hai Jin and
               Yi Pan and
               Nong Xiao and
               Jianhua Sun},
  title     = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
               Wuhan, China, October 21-24, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3251},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100774},
  doi       = {10.1007/b100774},
  isbn      = {3-540-23564-7},
  timestamp = {Thu, 24 May 2018 11:14:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gcc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2004,
  editor    = {Javier L{\'{o}}pez and
               Sihan Qing and
               Eiji Okamoto},
  title     = {Information and Communications Security, 6th International Conference,
               {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3269},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b101042},
  doi       = {10.1007/b101042},
  isbn      = {3-540-23563-9},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2004,
  editor    = {Choonsik Park and
               Seongtaek Chee},
  title     = {Information Security and Cryptology - {ICISC} 2004, 7th International
               Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3506},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137120},
  doi       = {10.1007/b137120},
  isbn      = {3-540-26226-1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2004,
  editor    = {Anne Canteaut and
               Kapalee Viswanathan},
  title     = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3348},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b104579},
  doi       = {10.1007/b104579},
  isbn      = {3-540-24130-2},
  timestamp = {Wed, 14 Nov 2018 10:55:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2004,
  editor    = {Ingemar J. Cox and
               Ton Kalker and
               Heung{-}Kyu Lee},
  title     = {Digital Watermarking, Third InternationalWorkshop, {IWDW} 2004, Seoul,
               SouthKorea, October 30 - November 1, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3304},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b106346},
  doi       = {10.1007/b106346},
  isbn      = {3-540-24839-0},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdw/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2004,
  title     = {29th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2004),
               16-18 November 2004, Tampa, FL, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9433},
  isbn      = {0-7695-2260-2},
  timestamp = {Wed, 10 Dec 2014 18:26:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mm/2004,
  editor    = {Henning Schulzrinne and
               Nevenka Dimitrova and
               Martina Angela Sasse and
               Sue B. Moon and
               Rainer Lienhart},
  title     = {Proceedings of the 12th {ACM} International Conference on Multimedia,
               New York, NY, USA, October 10-16, 2004},
  publisher = {{ACM}},
  year      = {2004},
  url       = {http://dl.acm.org/citation.cfm?id=1027527},
  isbn      = {1-58113-893-8},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mm/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pimrc/2004,
  title     = {Proceedings of the {IEEE} 15th International Symposium on Personal,
               Indoor and Mobile Radio Communications, {PIMRC} 2004, 5-8 September
               2004, Barcelona, Spain},
  publisher = {{IEEE}},
  year      = {2004},
  timestamp = {Tue, 14 Dec 2010 21:21:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pimrc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2004,
  title     = {2004 {IEEE} Wireless Communications and Networking Conference , {WCNC}
               2004, Atlanta, Georgia, USA, 21-25 March 2004},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9178},
  isbn      = {0-7803-8344-3},
  timestamp = {Sun, 04 Nov 2012 21:30:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2003,
  editor    = {Reihaneh Safavi{-}Naini and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
               2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2727},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-45067-X},
  doi       = {10.1007/3-540-45067-X},
  isbn      = {3-540-40515-1},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2003,
  editor    = {Jianying Zhou and
               Moti Yung and
               Yongfei Han},
  title     = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2846},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13996},
  doi       = {10.1007/b13996},
  isbn      = {3-540-20208-0},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2003,
  title     = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
               '03, San Francisco, CA, USA, 1-5 December 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8900},
  isbn      = {0-7803-7974-8},
  timestamp = {Tue, 11 Dec 2012 13:14:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icassp/2003,
  title     = {2003 {IEEE} International Conference on Acoustics, Speech, and Signal
               Processing, {ICASSP} '03, Hong Kong, April 6-10, 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8535},
  isbn      = {0-7803-7663-3},
  timestamp = {Fri, 02 May 2014 14:58:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icassp/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2003,
  editor    = {Sihan Qing and
               Dieter Gollmann and
               Jianying Zhou},
  title     = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2836},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13930},
  doi       = {10.1007/b13930},
  isbn      = {3-540-20150-5},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2003,
  editor    = {Jong In Lim and
               Dong Hoon Lee},
  title     = {Information Security and Cryptology - {ICISC} 2003, 6th International
               Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2971},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b96249},
  doi       = {10.1007/b96249},
  isbn      = {3-540-21376-7},
  timestamp = {Tue, 07 Nov 2017 13:40:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icmcs/2003,
  title     = {Proceedings of the 2003 {IEEE} International Conference on Multimedia
               and Expo, {ICME} 2003, 6-9 July 2003, Baltimore, MD, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=27433},
  isbn      = {0-7803-7965-9},
  timestamp = {Fri, 17 Oct 2014 14:47:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icmcs/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscas/2003,
  title     = {Proceedings of the 2003 International Symposium on Circuits and Systems,
               {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8570},
  isbn      = {0-7803-7761-3},
  timestamp = {Fri, 20 May 2016 10:01:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscas/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2003,
  editor    = {Colin Boyd and
               Wenbo Mao},
  title     = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2851},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13828},
  doi       = {10.1007/b13828},
  isbn      = {3-540-20176-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vcip/2003,
  editor    = {Touradj Ebrahimi and
               Thomas Sikora},
  title     = {Visual Communications and Image Processing 2003, Lugano, Switzerland,
               July 8, 2003},
  series    = {Proceedings of {SPIE}},
  volume    = {5150},
  publisher = {{SPIE}},
  year      = {2003},
  url       = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5150},
  isbn      = {0-8194-5023-5},
  timestamp = {Wed, 29 Jun 2016 10:59:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vcip/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2002,
  editor    = {Lynn Margaret Batten and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2384},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45450-0},
  doi       = {10.1007/3-540-45450-0},
  isbn      = {3-540-43861-0},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002,
  editor    = {Vijayalakshmi Atluri},
  title     = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  publisher = {{ACM}},
  year      = {2002},
  url       = {http://dl.acm.org/citation.cfm?id=586110},
  isbn      = {1-58113-612-9},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vip/2002,
  editor    = {Jesse S. Jin and
               Peter Eades and
               David Dagan Feng and
               Hong Yan},
  title     = {Visualisation 2002, Selected Papers from the Pan-Sydney Area Workshop
               on Visual Information Processing, {VIP2002}},
  series    = {{CRPIT}},
  volume    = {22},
  publisher = {Australian Computer Society},
  year      = {2002},
  isbn      = {1-920682-01-5},
  timestamp = {Tue, 25 Sep 2018 16:58:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vip/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2001,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2119},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-47719-5},
  doi       = {10.1007/3-540-47719-5},
  isbn      = {3-540-42300-1},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2001,
  editor    = {Sihan Qing and
               Tatsuaki Okamoto and
               Jianying Zhou},
  title     = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  series    = {Lecture Notes in Computer Science},
  volume    = {2229},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45600-7},
  doi       = {10.1007/3-540-45600-7},
  isbn      = {3-540-42880-1},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2001,
  editor    = {Kwangjo Kim},
  title     = {Public Key Cryptography, 4th International Workshop on Practice and
               Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
               February 13-15, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1992},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44586-2},
  doi       = {10.1007/3-540-44586-2},
  isbn      = {3-540-41658-7},
  timestamp = {Wed, 24 May 2017 15:40:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2000,
  editor    = {Ed Dawson and
               Andrew J. Clark and
               Colin Boyd},
  title     = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1841},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10718964},
  doi       = {10.1007/10718964},
  isbn      = {3-540-67742-9},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2000,
  title     = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7224},
  isbn      = {0-7695-0859-6},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2000,
  editor    = {Dongho Won},
  title     = {Information Security and Cryptology - {ICISC} 2000, Third International
               Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2015},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45247-8},
  doi       = {10.1007/3-540-45247-8},
  isbn      = {3-540-41782-6},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mm/2000w,
  editor    = {Shahram Ghandeharizadeh and
               Shih{-}Fu Chang and
               Stephen Fischer and
               Joseph A. Konstan and
               Klara Nahrstedt},
  title     = {Proceedings of the {ACM} Multimedia 2000 Workshops, Los Angeles, CA,
               USA, October 30 - November 3, 2000},
  publisher = {{ACM} Press},
  year      = {2000},
  url       = {http://dl.acm.org/citation.cfm?id=357744},
  isbn      = {1-58113-311-1},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mm/2000w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2000,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Third International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
               Australia, January 18-20, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1751},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/b75033},
  doi       = {10.1007/b75033},
  isbn      = {3-540-66967-1},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2000,
  editor    = {Sihan Qing and
               Jan H. P. Eloff},
  title     = {Information Security for Global Information Infrastructures, {IFIP}
               {TC11} Fifteenth Annual Working Conference on Information Security,
               August 22-24, 2000, Beijing, China},
  series    = {{IFIP} Conference Proceedings},
  volume    = {175},
  publisher = {Kluwer},
  year      = {2000},
  isbn      = {0-7923-7914-4},
  timestamp = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1999,
  editor    = {Josef Pieprzyk and
               Reihaneh Safavi{-}Naini and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1587},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48970-3},
  doi       = {10.1007/3-540-48970-3},
  isbn      = {3-540-65756-8},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexaw/1999,
  title     = {10th International Workshop on Database {\&} Expert Systems Applications,
               Florence, Italy, September 1-3, 1999, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6448},
  isbn      = {0-7695-0281-4},
  timestamp = {Mon, 24 Nov 2014 16:44:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/1999,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1726},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/b72329},
  doi       = {10.1007/b72329},
  isbn      = {3-540-66682-6},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/1999,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1560},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49162-7},
  doi       = {10.1007/3-540-49162-7},
  isbn      = {3-540-65644-8},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1998,
  editor    = {Kazuo Ohta and
               Dingyi Pei},
  title     = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1514},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49649-1},
  doi       = {10.1007/3-540-49649-1},
  isbn      = {3-540-65109-8},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/1998,
  editor    = {Jean{-}Jacques Quisquater and
               Bruce Schneier},
  title     = {Smart Card Research and Applications, This International Conference,
               {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1820},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10721064},
  doi       = {10.1007/10721064},
  isbn      = {3-540-67923-5},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/1998,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, First International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
               Japan, February 5-6, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1431},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0054009},
  doi       = {10.1007/BFb0054009},
  isbn      = {3-540-64693-0},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1998,
  title     = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
               Oakland, CA, USA, May 3-6, 1998, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5528},
  isbn      = {0-8186-8386-4},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wetice/1998,
  title     = {7th Workshop on Enabling Technologies {(WETICE} '98), Infrastructure
               for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA,
               Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5881},
  isbn      = {0-8186-8751-7},
  timestamp = {Thu, 06 Aug 2015 09:24:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wetice/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1997,
  editor    = {Vijay Varadharajan and
               Josef Pieprzyk and
               Yi Mu},
  title     = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1270},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0027916},
  doi       = {10.1007/BFb0027916},
  isbn      = {3-540-63232-8},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/1997,
  editor    = {Michael Darnell},
  title     = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
               UK, December 17-19, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1355},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0024443},
  doi       = {10.1007/BFb0024443},
  isbn      = {3-540-63927-6},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/1997,
  editor    = {Eiji Okamoto and
               George I. Davida and
               Masahiro Mambo},
  title     = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
               Japan, September 17-19, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1396},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0030404},
  doi       = {10.1007/BFb0030404},
  isbn      = {3-540-64382-6},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1997,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               T. Mark A. Lomas and
               Michael Roe},
  title     = {Security Protocols, 5th International Workshop, Paris, France, April
               7-9, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1361},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0028154},
  doi       = {10.1007/BFb0028154},
  isbn      = {3-540-64040-1},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier