BibTeX records: Shifeng Sun

download as .bib file

@inproceedings{DBLP:conf/esorics/Wang0SLAZ18,
  author    = {Jianfeng Wang and
               Xiaofeng Chen and
               Shifeng Sun and
               Joseph K. Liu and
               Man Ho Au and
               Zhi{-}Hui Zhan},
  title     = {Towards Efficient Verifiable Conjunctive Keyword Search for Large
               Encrypted Database},
  booktitle = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {II}},
  pages     = {83--100},
  year      = {2018},
  crossref  = {DBLP:conf/esorics/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-98989-1\_5},
  doi       = {10.1007/978-3-319-98989-1\_5},
  timestamp = {Tue, 07 Aug 2018 15:46:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/Wang0SLAZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZuoSLSP18,
  author    = {Cong Zuo and
               Shifeng Sun and
               Joseph K. Liu and
               Jun Shao and
               Josef Pieprzyk},
  title     = {Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries
               with Forward (and Backward) Security},
  booktitle = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {II}},
  pages     = {228--246},
  year      = {2018},
  crossref  = {DBLP:conf/esorics/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-98989-1\_12},
  doi       = {10.1007/978-3-319-98989-1\_12},
  timestamp = {Tue, 07 Aug 2018 15:46:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/ZuoSLSP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZuoSLSP18,
  author    = {Cong Zuo and
               Shifeng Sun and
               Joseph K. Liu and
               Jun Shao and
               Josef Pieprzyk},
  title     = {Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries
               with Forward (and Backward) Security},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {628},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/628},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZuoSLSP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinLSDG17,
  author    = {Baodong Qin and
               Shengli Liu and
               Shifeng Sun and
               Robert H. Deng and
               Dawu Gu},
  title     = {Related-key secure key encapsulation from extended computational bilinear
               Diffie-Hellman},
  journal   = {Inf. Sci.},
  volume    = {406},
  pages     = {1--11},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.ins.2017.04.018},
  doi       = {10.1016/j.ins.2017.04.018},
  timestamp = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/QinLSDG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/SunGPYQ17,
  author    = {Shifeng Sun and
               Dawu Gu and
               Udaya Parampalli and
               Yu Yu and
               Baodong Qin},
  title     = {Public key encryption resilient to leakage and tampering attacks},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {89},
  pages     = {142--156},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jcss.2017.03.004},
  doi       = {10.1016/j.jcss.2017.03.004},
  timestamp = {Mon, 14 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/SunGPYQ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SunALY17,
  author    = {Shifeng Sun and
               Man Ho Au and
               Joseph K. Liu and
               Tsz Hon Yuen},
  title     = {RingCT 2.0: {A} Compact Accumulator-Based (Linkable Ring Signature)
               Protocol for Blockchain Cryptocurrency Monero},
  booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {II}},
  pages     = {456--474},
  year      = {2017},
  crossref  = {DBLP:conf/esorics/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-66399-9\_25},
  doi       = {10.1007/978-3-319-66399-9\_25},
  timestamp = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/SunALY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangWSLS017,
  author    = {Yunling Wang and
               Jianfeng Wang and
               Shifeng Sun and
               Joseph K. Liu and
               Willy Susilo and
               Xiaofeng Chen},
  title     = {Towards Multi-user Searchable Encryption Supporting Boolean Query
               and Fast Decryption},
  booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  pages     = {24--38},
  year      = {2017},
  crossref  = {DBLP:conf/provsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0\_2},
  doi       = {10.1007/978-3-319-68637-0\_2},
  timestamp = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/WangWSLS017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunALYG17,
  author    = {Shifeng Sun and
               Man Ho Au and
               Joseph K. Liu and
               Tsz Hon Yuen and
               Dawu Gu},
  title     = {RingCT 2.0: {A} Compact Accumulator-Based (Linkable Ring Signature)
               Protocol for Blockchain Cryptocurrency Monero},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {921},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/921},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SunALYG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SunLYQG16,
  author    = {Shifeng Sun and
               Joseph K. Liu and
               Yu Yu and
               Baodong Qin and
               Dawu Gu},
  title     = {RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions},
  journal   = {Comput. J.},
  volume    = {59},
  number    = {11},
  pages     = {1637--1658},
  year      = {2016},
  url       = {https://doi.org/10.1093/comjnl/bxw025},
  doi       = {10.1093/comjnl/bxw025},
  timestamp = {Mon, 14 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/SunLYQG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SunHGL16,
  author    = {Shifeng Sun and
               Shuai Han and
               Dawu Gu and
               Shengli Liu},
  title     = {Public key cryptosystems secure against memory leakage attacks},
  journal   = {{IET} Information Security},
  volume    = {10},
  number    = {6},
  pages     = {403--412},
  year      = {2016},
  url       = {https://doi.org/10.1049/iet-ifs.2015.0195},
  doi       = {10.1049/iet-ifs.2015.0195},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iet-ifs/SunHGL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LyuSZPLG16,
  author    = {Chen Lyu and
               Shifeng Sun and
               Yuanyuan Zhang and
               Amit Pande and
               Haining Lu and
               Dawu Gu},
  title     = {Privacy-preserving data sharing scheme over cloud for social applications},
  journal   = {J. Network and Computer Applications},
  volume    = {74},
  pages     = {44--55},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.jnca.2016.08.006},
  doi       = {10.1016/j.jnca.2016.08.006},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/LyuSZPLG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunGL16,
  author    = {Shifeng Sun and
               Dawu Gu and
               Shengli Liu},
  title     = {Efficient chosen ciphertext secure identity-based encryption against
               key leakage attacks},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {11},
  pages     = {1417--1434},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1429},
  doi       = {10.1002/sec.1429},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/SunGL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunPYYG16,
  author    = {Shifeng Sun and
               Udaya Parampalli and
               Tsz Hon Yuen and
               Yu Yu and
               Dawu Gu},
  title     = {Efficient Completely Non-Malleable and {RKA} Secure Public Key Encryptions},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  pages     = {134--150},
  year      = {2016},
  crossref  = {DBLP:conf/acisp/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-40367-0\_9},
  doi       = {10.1007/978-3-319-40367-0\_9},
  timestamp = {Mon, 14 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/SunPYYG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunGLPY16,
  author    = {Shifeng Sun and
               Dawu Gu and
               Joseph K. Liu and
               Udaya Parampalli and
               Tsz Hon Yuen},
  title     = {Efficient Construction of Completely Non-Malleable {CCA} Secure Public
               Key Encryption},
  booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages     = {901--906},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016asia},
  url       = {http://doi.acm.org/10.1145/2897845.2897921},
  doi       = {10.1145/2897845.2897921},
  timestamp = {Thu, 09 Aug 2018 10:56:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SunGLPY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SunLSSY16,
  author    = {Shifeng Sun and
               Joseph K. Liu and
               Amin Sakzad and
               Ron Steinfeld and
               Tsz Hon Yuen},
  title     = {An Efficient Non-interactive Multi-client Searchable Encryption with
               Support for Boolean Queries},
  booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  pages     = {154--172},
  year      = {2016},
  crossref  = {DBLP:conf/esorics/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-45744-4\_8},
  doi       = {10.1007/978-3-319-45744-4\_8},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/SunLSSY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WijayaLSSH16,
  author    = {Dimaz Ankaa Wijaya and
               Joseph K. Liu and
               Ron Steinfeld and
               Shifeng Sun and
               Xinyi Huang},
  title     = {Anonymizing Bitcoin Transaction},
  booktitle = {Information Security Practice and Experience - 12th International
               Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
               Proceedings},
  pages     = {271--283},
  year      = {2016},
  crossref  = {DBLP:conf/ispec/2016},
  url       = {https://doi.org/10.1007/978-3-319-49151-6\_19},
  doi       = {10.1007/978-3-319-49151-6\_19},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/WijayaLSSH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLSSY16,
  author    = {Shifeng Sun and
               Joseph K. Liu and
               Amin Sakzad and
               Ron Steinfeld and
               Tsz Hon Yuen},
  title     = {An Efficient Non-Interactive Multi-client Searchable Encryption with
               Support for Boolean Queries},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1038},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1038},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SunLSSY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SunGH15,
  author    = {Shifeng Sun and
               Dawu Gu and
               Zhengan Huang},
  title     = {Fully Secure Wicked Identity-Based Encryption Against Key Leakage
               Attacks},
  journal   = {Comput. J.},
  volume    = {58},
  number    = {10},
  pages     = {2520--2536},
  year      = {2015},
  url       = {https://doi.org/10.1093/comjnl/bxu110},
  doi       = {10.1093/comjnl/bxu110},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/SunGH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LyuGZSZP15,
  author    = {Chen Lyu and
               Dawu Gu and
               Xiaomei Zhang and
               Shifeng Sun and
               Yuanyuan Zhang and
               Amit Pande},
  title     = {{SGOR:} Secure and scalable geographic opportunistic routing with
               received signal strength in WSNs},
  journal   = {Computer Communications},
  volume    = {59},
  pages     = {37--51},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.comcom.2015.01.003},
  doi       = {10.1016/j.comcom.2015.01.003},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/LyuGZSZP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/SunLGZR15,
  author    = {Shifeng Sun and
               Chen Lyu and
               Dawu Gu and
               Yuanyuan Zhang and
               Yanli Ren},
  title     = {Towards Efficient, Secure, and Fine-Grained Access Control System
               in MSNs with Flexible Revocations},
  journal   = {{IJDSN}},
  volume    = {11},
  pages     = {857405:1--857405:15},
  year      = {2015},
  url       = {https://doi.org/10.1155/2015/857405},
  doi       = {10.1155/2015/857405},
  timestamp = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijdsn/SunLGZR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/SunGL13,
  author    = {Shifeng Sun and
               Dawu Gu and
               Shengli Liu},
  title     = {Efficient Leakage-Resilient Identity-Based Encryption with {CCA} Security},
  booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
               Beijing, China, November 22-24, 2013, Revised Selected Papers},
  pages     = {149--167},
  year      = {2013},
  crossref  = {DBLP:conf/pairing/2013},
  url       = {https://doi.org/10.1007/978-3-319-04873-4\_9},
  doi       = {10.1007/978-3-319-04873-4\_9},
  timestamp = {Mon, 22 May 2017 17:11:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/SunGL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LyuGZST13,
  author    = {Chen Lyu and
               Dawu Gu and
               Xiaomei Zhang and
               Shifeng Sun and
               Yinqi Tang},
  title     = {Efficient, fast and scalable authentication for VANETs},
  booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
               Shanghai, Shanghai, China, April 7-10, 2013},
  pages     = {1768--1773},
  year      = {2013},
  crossref  = {DBLP:conf/wcnc/2013},
  url       = {https://doi.org/10.1109/WCNC.2013.6554831},
  doi       = {10.1109/WCNC.2013.6554831},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/LyuGZST13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/WangGS12,
  author    = {Jiesheng Wang and
               Xianwen Gao and
               Shifeng Sun},
  title     = {Data-Driven Integrated Modeling and Intelligent Control Methods of
               Grinding Process},
  booktitle = {Advances in Neural Networks - {ISNN} 2012 - 9th International Symposium
               on Neural Networks, Shenyang, China, July 11-14, 2012. Proceedings,
               Part {II}},
  pages     = {396--405},
  year      = {2012},
  crossref  = {DBLP:conf/isnn/2012-2},
  url       = {https://doi.org/10.1007/978-3-642-31362-2\_44},
  doi       = {10.1007/978-3-642-31362-2\_44},
  timestamp = {Fri, 19 May 2017 01:26:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isnn/WangGS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018-2,
  editor    = {Javier L{\'{o}}pez and
               Jianying Zhou and
               Miguel Soriano},
  title     = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11099},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-98989-1},
  doi       = {10.1007/978-3-319-98989-1},
  isbn      = {978-3-319-98988-4},
  timestamp = {Tue, 07 Aug 2018 15:46:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-2,
  editor    = {Simon N. Foley and
               Dieter Gollmann and
               Einar Snekkenes},
  title     = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10493},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66399-9},
  doi       = {10.1007/978-3-319-66399-9},
  isbn      = {978-3-319-66398-2},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2017,
  editor    = {Tatsuaki Okamoto and
               Yong Yu and
               Man Ho Au and
               Yannan Li},
  title     = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10592},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0},
  doi       = {10.1007/978-3-319-68637-0},
  isbn      = {978-3-319-68636-3},
  timestamp = {Wed, 18 Oct 2017 20:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor    = {Joseph K. Liu and
               Ron Steinfeld},
  title     = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9723},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-40367-0},
  doi       = {10.1007/978-3-319-40367-0},
  isbn      = {978-3-319-40366-3},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016asia,
  editor    = {Xiaofeng Chen and
               XiaoFeng Wang and
               Xinyi Huang},
  title     = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2897845},
  doi       = {10.1145/2897845},
  isbn      = {978-1-4503-4233-9},
  timestamp = {Thu, 09 Aug 2018 10:56:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-1,
  editor    = {Ioannis G. Askoxylakis and
               Sotiris Ioannidis and
               Sokratis K. Katsikas and
               Catherine A. Meadows},
  title     = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9878},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45744-4},
  doi       = {10.1007/978-3-319-45744-4},
  isbn      = {978-3-319-45743-7},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2016,
  editor    = {Feng Bao and
               Liqun Chen and
               Robert H. Deng and
               Guojun Wang},
  title     = {Information Security Practice and Experience - 12th International
               Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10060},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49151-6},
  doi       = {10.1007/978-3-319-49151-6},
  isbn      = {978-3-319-49150-9},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2013,
  editor    = {Zhenfu Cao and
               Fangguo Zhang},
  title     = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
               Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8365},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04873-4},
  doi       = {10.1007/978-3-319-04873-4},
  isbn      = {978-3-319-04872-7},
  timestamp = {Mon, 22 May 2017 17:11:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2013,
  title     = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
               Shanghai, Shanghai, China, April 7-10, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6548699},
  isbn      = {978-1-4673-5938-2},
  timestamp = {Sun, 28 Jul 2013 18:14:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isnn/2012-2,
  editor    = {Jun Wang and
               Gary G. Yen and
               Marios M. Polycarpou},
  title     = {Advances in Neural Networks - {ISNN} 2012 - 9th International Symposium
               on Neural Networks, Shenyang, China, July 11-14, 2012. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {7368},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31362-2},
  doi       = {10.1007/978-3-642-31362-2},
  isbn      = {978-3-642-31361-5},
  timestamp = {Fri, 19 May 2017 01:26:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isnn/2012-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier