BibTeX records: Pinhui Ke

download as .bib file

@article{DBLP:journals/ipl/WuXCK19,
  author    = {Chenhuang Wu and
               Chunxiang Xu and
               Zhixiong Chen and
               Pinhui Ke},
  title     = {On error linear complexity of new generalized cyclotomic binary sequences
               of period \emph{p}\({}^{\mbox{2}}\)},
  journal   = {Inf. Process. Lett.},
  volume    = {144},
  pages     = {9--15},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.ipl.2018.08.006},
  doi       = {10.1016/j.ipl.2018.08.006},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/WuXCK19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/KeJC18,
  author    = {Pinhui Ke and
               Yueqin Jiang and
               Zhixiong Chen},
  title     = {On the linear complexities of two classes of quaternary sequences
               of even length with optimal autocorrelation},
  journal   = {Adv. in Math. of Comm.},
  volume    = {12},
  number    = {3},
  pages     = {525--539},
  year      = {2018},
  url       = {https://doi.org/10.3934/amc.2018031},
  doi       = {10.3934/amc.2018031},
  timestamp = {Tue, 28 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amco/KeJC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/ChenEKW18,
  author    = {Zhixiong Chen and
               Vladimir Edemskiy and
               Pinhui Ke and
               Chenhuang Wu},
  title     = {On k-error linear complexity of pseudorandom binary sequences derived
               from Euler quotients},
  journal   = {Adv. in Math. of Comm.},
  volume    = {12},
  number    = {4},
  pages     = {805--816},
  year      = {2018},
  url       = {https://doi.org/10.3934/amc.2018047},
  doi       = {10.3934/amc.2018047},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amco/ChenEKW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LinLK18,
  author    = {Zhibao Lin and
               Zhengqian Li and
               Pinhui Ke},
  title     = {New Constructions of Zero-Difference Balanced Functions},
  journal   = {{IEICE} Transactions},
  volume    = {101-A},
  number    = {10},
  pages     = {1719--1723},
  year      = {2018},
  url       = {https://doi.org/10.1587/transfun.E101.A.1719},
  doi       = {10.1587/transfun.E101.A.1719},
  timestamp = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/LinLK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/YeKS18,
  author    = {Qi Ye and
               Pinhui Ke and
               Jian Shen},
  title     = {Linear complexity of a class of pseudorandom sequences over a general
               finite field},
  journal   = {Soft Comput.},
  volume    = {22},
  number    = {13},
  pages     = {4335--4346},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00500-017-2870-6},
  doi       = {10.1007/s00500-017-2870-6},
  timestamp = {Fri, 15 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/soco/YeKS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-03339,
  author    = {Zhixiong Chen and
               Vladimir Edemskiy and
               Pinhui Ke and
               Chenhuang Wu},
  title     = {On k-error linear complexity of pseudorandom binary sequences derived
               from Euler quotients},
  journal   = {CoRR},
  volume    = {abs/1803.03339},
  year      = {2018},
  url       = {http://arxiv.org/abs/1803.03339},
  archivePrefix = {arXiv},
  eprint    = {1803.03339},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1803-03339},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/ChangKZ17,
  author    = {Zuling Chang and
               Pinhui Ke and
               Yongcheng Zhao},
  title     = {Some Enumeration Results on Binary 2\({}^{\mbox{n}}\)-Periodic Sequences},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {28},
  number    = {2},
  pages     = {171--184},
  year      = {2017},
  url       = {https://doi.org/10.1142/S0129054117500113},
  doi       = {10.1142/S0129054117500113},
  timestamp = {Fri, 05 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijfcs/ChangKZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/KeYZS17,
  author    = {Pinhui Ke and
               Zhifan Ye and
               Zhengchun Zhou and
               Jian Shen},
  title     = {Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence},
  journal   = {Int. J. Found. Comput. Sci.},
  volume    = {28},
  number    = {4},
  pages     = {391--410},
  year      = {2017},
  url       = {https://doi.org/10.1142/S0129054117500241},
  doi       = {10.1142/S0129054117500241},
  timestamp = {Thu, 07 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijfcs/KeYZS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiKY17,
  author    = {Zhengqian Li and
               Pinhui Ke and
               Zhifan Ye},
  title     = {New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with
               Optimal Partial Hamming Correlation},
  booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS}
               2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
               {II}},
  pages     = {40--49},
  year      = {2017},
  crossref  = {DBLP:conf/icccsec/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-68542-7\_4},
  doi       = {10.1007/978-3-319-68542-7\_4},
  timestamp = {Thu, 02 Nov 2017 17:25:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/LiKY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-06063,
  author    = {Chenhuang Wu and
               Chunxiang Xu and
               Zhixiong Chen and
               Pinhui Ke},
  title     = {On error linear complexity of new generalized cyclotomic binary sequences
               of period p\({}^{\mbox{2}}\)},
  journal   = {CoRR},
  volume    = {abs/1711.06063},
  year      = {2017},
  url       = {http://arxiv.org/abs/1711.06063},
  archivePrefix = {arXiv},
  eprint    = {1711.06063},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1711-06063},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08886,
  author    = {Zhifan Ye and
               Pinhui Ke and
               Chenhuang Wu},
  title     = {A note on a conjecture of new binary cyclotomic sequences of length
               p\({}^{\mbox{n}}\)},
  journal   = {CoRR},
  volume    = {abs/1712.08886},
  year      = {2017},
  url       = {http://arxiv.org/abs/1712.08886},
  archivePrefix = {arXiv},
  eprint    = {1712.08886},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1712-08886},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YeKZC15,
  author    = {Zhifan Ye and
               Pinhui Ke and
               Shengyuan Zhang and
               Zuling Chang},
  title     = {Some Notes on Pseudorandom Binary Sequences Derived from Fermat-Euler
               Quotients},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {10},
  pages     = {2199--2202},
  year      = {2015},
  url       = {https://doi.org/10.1587/transfun.E98.A.2199},
  doi       = {10.1587/transfun.E98.A.2199},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/YeKZC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YeKZC15a,
  author    = {Zhifan Ye and
               Pinhui Ke and
               Shengyuan Zhang and
               Zuling Chang},
  title     = {Zero-Difference Balanced Function Derived from Fermat Quotients and
               Its Applications},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {11},
  pages     = {2336--2340},
  year      = {2015},
  url       = {https://doi.org/10.1587/transfun.E98.A.2336},
  doi       = {10.1587/transfun.E98.A.2336},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/YeKZC15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/KeZ15,
  author    = {Pinhui Ke and
               Zhengchun Zhou},
  title     = {A Generic Construction of Z-Periodic Complementary Sequence Sets with
               Flexible Flock Size and Zero Correlation Zone Length},
  journal   = {{IEEE} Signal Process. Lett.},
  volume    = {22},
  number    = {9},
  pages     = {1462--1466},
  year      = {2015},
  url       = {https://doi.org/10.1109/LSP.2014.2369512},
  doi       = {10.1109/LSP.2014.2369512},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/spl/KeZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEicics/YeKC15,
  author    = {Zhifan Ye and
               Pinhui Ke and
               Zhixiong Chen},
  title     = {Further results on pseudorandom binary sequences derived from Fermat-Euler
               Quotients},
  booktitle = {10th International Conference on Information, Communications and Signal
               Processing, {ICICS} 2015, Singapore, December 2-4, 2015},
  pages     = {1--4},
  year      = {2015},
  crossref  = {DBLP:conf/IEEEicics/2015},
  url       = {https://doi.org/10.1109/ICICS.2015.7459968},
  doi       = {10.1109/ICICS.2015.7459968},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEicics/YeKC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinTKHZ14,
  author    = {Changlu Lin and
               Fei Tang and
               Pinhui Ke and
               Lein Harn and
               Shengyuan Zhang},
  title     = {Secure universal designated verifier identity-based signcryption},
  journal   = {Security and Communication Networks},
  volume    = {7},
  number    = {2},
  pages     = {434--444},
  year      = {2014},
  url       = {https://doi.org/10.1002/sec.820},
  doi       = {10.1002/sec.820},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/LinTKHZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KeZZ13,
  author    = {Pinhui Ke and
               Jie Zhang and
               Shengyuan Zhang},
  title     = {On the linear complexity and the autocorrelation of generalized cyclotomic
               binary sequences of length 2p m},
  journal   = {Des. Codes Cryptography},
  volume    = {67},
  number    = {3},
  pages     = {325--339},
  year      = {2013},
  url       = {https://doi.org/10.1007/s10623-012-9610-9},
  doi       = {10.1007/s10623-012-9610-9},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/KeZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KeYC13,
  author    = {Pinhui Ke and
               Wanghong Yu and
               Zuling Chang},
  title     = {A note on binary sequence pairs with two-level correlation},
  journal   = {Inf. Process. Lett.},
  volume    = {113},
  number    = {19-21},
  pages     = {811--814},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.ipl.2013.07.022},
  doi       = {10.1016/j.ipl.2013.07.022},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/KeYC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KeZ12,
  author    = {Pinhui Ke and
               Shengyuan Zhang},
  title     = {New classes of quaternary cyclotomic sequence of length 2p\({}^{\mbox{m}}\)
               with high linear complexity},
  journal   = {Inf. Process. Lett.},
  volume    = {112},
  number    = {16},
  pages     = {646--650},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.ipl.2012.05.011},
  doi       = {10.1016/j.ipl.2012.05.011},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/KeZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KeZL12,
  author    = {Pinhui Ke and
               Shengyuan Zhang and
               Fuchun Lin},
  title     = {Constructions of binary array set with zero-correlation zone},
  journal   = {Inf. Sci.},
  volume    = {197},
  pages     = {197--206},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.ins.2012.02.010},
  doi       = {10.1016/j.ins.2012.02.010},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/KeZL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TangLK12,
  author    = {Fei Tang and
               Changlu Lin and
               Pinhui Ke},
  title     = {Universal Designated Verifier Signcryption},
  booktitle = {Network and System Security - 6th International Conference, {NSS}
               2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  pages     = {126--134},
  year      = {2012},
  crossref  = {DBLP:conf/nss/2012},
  url       = {https://doi.org/10.1007/978-3-642-34601-9\_10},
  doi       = {10.1007/978-3-642-34601-9\_10},
  timestamp = {Mon, 24 Sep 2018 12:27:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/TangLK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/YangK11,
  author    = {Zheng Yang and
               Pinhui Ke},
  title     = {Construction of quaternary sequences of length \emph{pq} with low
               autocorrelation},
  journal   = {Cryptography and Communications},
  volume    = {3},
  number    = {2},
  pages     = {55--64},
  year      = {2011},
  url       = {https://doi.org/10.1007/s12095-010-0034-y},
  doi       = {10.1007/s12095-010-0034-y},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ccds/YangK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangK11,
  author    = {Zheng Yang and
               Pinhui Ke},
  title     = {On Generalized Cyclotomic Sequence of Order \emph{d} and Period \emph{pq}},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {1},
  pages     = {443--447},
  year      = {2011},
  url       = {https://doi.org/10.1587/transfun.E94.A.443},
  doi       = {10.1587/transfun.E94.A.443},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/YangK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KeWY11,
  author    = {Pinhui Ke and
               Zhihua Wang and
               Zheng Yang},
  title     = {New Constructions of Frequency-Hopping Sequences from Power-Residue
               Sequences},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {3},
  pages     = {1029--1033},
  year      = {2011},
  url       = {https://doi.org/10.1587/transfun.E94.A.1029},
  doi       = {10.1587/transfun.E94.A.1029},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KeWY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KeYZ11,
  author    = {Pinhui Ke and
               Zheng Yang and
               Jie Zhang},
  title     = {On the Autocorrelation and Linear Complexity of Some 2\emph{p} Periodic
               Quaternary Cyclotomic Sequences over \emph{F}\({}_{\mbox{4}}\)},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {11},
  pages     = {2472--2477},
  year      = {2011},
  url       = {https://doi.org/10.1587/transfun.E94.A.2472},
  doi       = {10.1587/transfun.E94.A.2472},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KeYZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KeHZ09,
  author    = {Pinhui Ke and
               Liuling Huang and
               Shengyuan Zhang},
  title     = {Improved lower bound on the number of balanced symmetric functions
               over {GF}},
  journal   = {Inf. Sci.},
  volume    = {179},
  number    = {5},
  pages     = {682--687},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.ins.2008.10.003},
  doi       = {10.1016/j.ins.2008.10.003},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/KeHZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ke08,
  author    = {Pinhui Ke},
  title     = {Improved lower bound on the number of balanced symmetric functions
               over GF(p)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {165},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/165},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Ke08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KeZW06,
  author    = {Pinhui Ke and
               Jie Zhang and
               Qiaoyan Wen},
  title     = {Results on Almost Resilient Functions},
  booktitle = {Applied Cryptography and Network Security, 4th International Conference,
               {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  pages     = {421--432},
  year      = {2006},
  crossref  = {DBLP:conf/acns/2006},
  url       = {https://doi.org/10.1007/11767480\_29},
  doi       = {10.1007/11767480\_29},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/KeZW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KeLW05,
  author    = {Pinhui Ke and
               Tailin Liu and
               Qiao{-}Yan Wen},
  title     = {Constructions of Almost Resilient Functions},
  booktitle = {Cryptology and Network Security, 4th International Conference, {CANS}
               2005, Xiamen, China, December 14-16, 2005, Proceedings},
  pages     = {236--246},
  year      = {2005},
  crossref  = {DBLP:conf/cans/2005},
  url       = {https://doi.org/10.1007/11599371\_20},
  doi       = {10.1007/11599371\_20},
  timestamp = {Mon, 24 Sep 2018 12:27:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/KeLW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KeZW05,
  author    = {Pinhui Ke and
               Jie Zhang and
               Qiaoyan Wen},
  title     = {Further Constructions of Almost Resilient Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {453},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/453},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KeZW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2017-2,
  editor    = {Xingming Sun and
               Han{-}Chieh Chao and
               Xingang You and
               Elisa Bertino},
  title     = {Cloud Computing and Security - Third International Conference, {ICCCS}
               2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10603},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68542-7},
  doi       = {10.1007/978-3-319-68542-7},
  isbn      = {978-3-319-68541-0},
  timestamp = {Thu, 02 Nov 2017 17:25:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEicics/2015,
  title     = {10th International Conference on Information, Communications and Signal
               Processing, {ICICS} 2015, Singapore, December 2-4, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7454592},
  isbn      = {978-1-4673-7218-3},
  timestamp = {Fri, 24 Jun 2016 12:32:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEicics/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2012,
  editor    = {Li Xu and
               Elisa Bertino and
               Yi Mu},
  title     = {Network and System Security - 6th International Conference, {NSS}
               2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7645},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34601-9},
  doi       = {10.1007/978-3-642-34601-9},
  isbn      = {978-3-642-34600-2},
  timestamp = {Mon, 24 Sep 2018 12:27:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2006,
  editor    = {Jianying Zhou and
               Moti Yung and
               Feng Bao},
  title     = {Applied Cryptography and Network Security, 4th International Conference,
               {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3989},
  year      = {2006},
  url       = {https://doi.org/10.1007/11767480},
  doi       = {10.1007/11767480},
  isbn      = {3-540-34703-8},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2005,
  editor    = {Yvo Desmedt and
               Huaxiong Wang and
               Yi Mu and
               Yongqing Li},
  title     = {Cryptology and Network Security, 4th International Conference, {CANS}
               2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3810},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11599371},
  doi       = {10.1007/11599371},
  isbn      = {3-540-30849-0},
  timestamp = {Mon, 24 Sep 2018 12:27:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier