Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Haibo Tian
@article{DBLP:journals/csi/TianWZSL24, author = {Haibo Tian and Yanchuan Wen and Fangguo Zhang and Yunfeng Shao and Bingshuai Li}, title = {Lattice based distributed threshold additive homomorphic encryption with application in federated learning}, journal = {Comput. Stand. Interfaces}, volume = {87}, pages = {103765}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103765}, doi = {10.1016/J.CSI.2023.103765}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/TianWZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/ZuoTZ23, author = {Ruozhou Zuo and Haibo Tian and Fangguo Zhang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based {PRF}}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {382--399}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_27}, doi = {10.1007/978-981-99-9785-5\_27}, timestamp = {Sun, 03 Mar 2024 19:07:53 +0100}, biburl = {https://dblp.org/rec/conf/aisp/ZuoTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiTZ23, author = {Chen Li and Haibo Tian and Fangguo Zhang}, editor = {Chunpeng Ge and Moti Yung}, title = {{TVES:} Threshold Verifiably Encrypted Signature and Its Applications}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {3--22}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_1}, doi = {10.1007/978-981-97-0942-7\_1}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AnTCZ23, author = {Zhiyuan An and Haibo Tian and Chao Chen and Fangguo Zhang}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {24--44}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_2}, doi = {10.1007/978-3-031-50594-2\_2}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnTCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnTCZ23, author = {Zhiyuan An and Haibo Tian and Chao Chen and Fangguo Zhang}, title = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2023}, url = {https://eprint.iacr.org/2023/705}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnTCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuangZLT22, author = {Yan Huang and Fangguo Zhang and Zhijie Liu and Haibo Tian}, title = {Pseudorandom number generator based on supersingular elliptic curve isogenies}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {5}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-2669-6}, doi = {10.1007/S11432-019-2669-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HuangZLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/TianWZSL22, author = {Haibo Tian and Yanchuan Wen and Fangguo Zhang and Yunfeng Shao and Bingshuai Li}, editor = {Xiaofeng Chen and Jian Shen and Willy Susilo}, title = {A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice}, booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS} 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13547}, pages = {277--292}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18067-5\_20}, doi = {10.1007/978-3-031-18067-5\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/TianWZSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ZuoTAZ22, author = {Ruozhou Zuo and Haibo Tian and Zhiyuan An and Fangguo Zhang}, editor = {Xiaofeng Chen and Jian Shen and Willy Susilo}, title = {Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice}, booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS} 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13547}, pages = {314--326}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18067-5\_23}, doi = {10.1007/978-3-031-18067-5\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/ZuoTAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenTZ22, author = {Jianzhang Chen and Haibo Tian and Fangguo Zhang}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {194--213}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_13}, doi = {10.1007/978-3-031-22390-7\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChenTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ZhangTZ22, author = {Zhuoran Zhang and Haibo Tian and Fangguo Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Miroslaw Kutylowski}, title = {Improved {WAVE} Signature and Apply to Post-quantum Blockchain}, booktitle = {Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1663}, pages = {309--323}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-7242-3\_20}, doi = {10.1007/978-981-19-7242-3\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/ZhangTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/XuBHTW21, author = {Jieyu Xu and Wen Bai and Miao Hu and Haibo Tian and Di Wu}, title = {Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {2}, pages = {644--654}, year = {2021}, url = {https://doi.org/10.1007/s12083-020-01021-1}, doi = {10.1007/S12083-020-01021-1}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/XuBHTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10753, author = {Haibo Tian and Fangguo Zhang and Yunfeng Shao and Bingshuai Li}, title = {Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning}, journal = {CoRR}, volume = {abs/2111.10753}, year = {2021}, url = {https://arxiv.org/abs/2111.10753}, eprinttype = {arXiv}, eprint = {2111.10753}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangYBLTKY20, author = {Yilei Wang and Guoyu Yang and Andrea Bracciali and Ho{-}fung Leung and Haibo Tian and Lishan Ke and Xiaomei Yu}, title = {Incentive compatible and anti-compounding of wealth in proof-of-stake}, journal = {Inf. Sci.}, volume = {530}, pages = {85--94}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.03.098}, doi = {10.1016/J.INS.2020.03.098}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangYBLTKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangZT20, author = {Zhuoran Zhang and Fangguo Zhang and Haibo Tian}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {{CSH:} {A} Post-quantum Secret Handshake Scheme from Coding Theory}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {317--335}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_16}, doi = {10.1007/978-3-030-59013-0\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/TianLZ20, author = {Haibo Tian and Huizhi Lin and Fangguo Zhang}, editor = {Guangquan Xu and Kaitai Liang and Chunhua Su}, title = {Design a Proof of Stake Based Directed Acyclic Graph Chain}, booktitle = {Frontiers in Cyber Security - Third International Conference, {FCS} 2020, Tianjin, China, November 15-17, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1286}, pages = {150--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9739-8\_13}, doi = {10.1007/978-981-15-9739-8\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/TianLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/XieWHT20, author = {Zixuan Xie and Run Wu and Miao Hu and Haibo Tian}, title = {Blockchain-Enabled Computing Resource Trading: {A} Deep Reinforcement Learning Approach}, booktitle = {2020 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2020, Seoul, Korea (South), May 25-28, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WCNC45663.2020.9120521}, doi = {10.1109/WCNC45663.2020.9120521}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/XieWHT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiTZH19, author = {Huige Li and Haibo Tian and Fangguo Zhang and Jiejie He}, title = {Blockchain-based searchable symmetric encryption scheme}, journal = {Comput. Electr. Eng.}, volume = {73}, pages = {32--45}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2018.10.015}, doi = {10.1016/J.COMPELECENG.2018.10.015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LiTZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiZLTH19, author = {Huige Li and Fangguo Zhang and Peiran Luo and Haibo Tian and Jiejie He}, title = {How to retrieve the encrypted data on the blockchain}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {11}, pages = {5560--5579}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.11.016}, doi = {10.3837/TIIS.2019.11.016}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiZLTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/TianHD19, author = {Haibo Tian and Jiejie He and Yong Ding}, title = {Medical Data Management on Blockchain with Privacy}, journal = {J. Medical Syst.}, volume = {43}, number = {2}, pages = {26:1--26:6}, year = {2019}, url = {https://doi.org/10.1007/s10916-018-1144-x}, doi = {10.1007/S10916-018-1144-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/TianHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhangZCT19, author = {Huang Zhang and Fangguo Zhang and Rong Cheng and Haibo Tian}, title = {Efficient obfuscation for {CNF} circuits and applications in cloud computing}, journal = {Soft Comput.}, volume = {23}, number = {6}, pages = {2061--2072}, year = {2019}, url = {https://doi.org/10.1007/s00500-017-2921-z}, doi = {10.1007/S00500-017-2921-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/ZhangZCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blocksys/TianLS19, author = {Haibo Tian and Peiran Luo and Yinxue Su}, editor = {Zibin Zheng and Hong{-}Ning Dai and Mingdong Tang and Xiangping Chen}, title = {A Group Signature Based Digital Currency System}, booktitle = {Blockchain and Trustworthy Systems - First International Conference, BlockSys 2019, Guangzhou, China, December 7-8, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1156}, pages = {3--14}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-2777-7\_1}, doi = {10.1007/978-981-15-2777-7\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blocksys/TianLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangLWT19, author = {Fangguo Zhang and Zhijie Liu and Ping Wang and Haibo Tian}, editor = {Zhe Liu and Moti Yung}, title = {Improving {ECDLP} Computation in Characteristic 2}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {535--550}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_32}, doi = {10.1007/978-3-030-42921-8\_32}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangLWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/TianSL19, author = {Haibo Tian and Yinxue Su and Zhenquan Liang}, title = {A Provable Secure Server Friendly Two-Party {SM2} Singing Protocol for Blockchain IoT}, booktitle = {2019 {IEEE} Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GCWkshps45667.2019.9024589}, doi = {10.1109/GCWKSHPS45667.2019.9024589}, timestamp = {Thu, 12 Mar 2020 12:42:23 +0100}, biburl = {https://dblp.org/rec/conf/globecom/TianSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paap/TianLS19, author = {Haibo Tian and Peiran Luo and Yinxue Su}, editor = {Hong Shen and Yingpeng Sang}, title = {An Efficient Group Signature Based Digital Currency System}, booktitle = {Parallel Architectures, Algorithms and Programming - 10th International Symposium, {PAAP} 2019, Guangzhou, China, December 12-14, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1163}, pages = {380--392}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-2767-8\_34}, doi = {10.1007/978-981-15-2767-8\_34}, timestamp = {Mon, 27 Jan 2020 13:38:42 +0100}, biburl = {https://dblp.org/rec/conf/paap/TianLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TianLS19, author = {Haibo Tian and Peiran Luo and Yinxue Su}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {A Centralized Digital Currency System with Rich Functions}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {288--302}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_17}, doi = {10.1007/978-3-030-31919-9\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TianLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Tian0DZZ18, author = {Haibo Tian and Xiaofeng Chen and Yong Ding and Xiaoyan Zhu and Fangguo Zhang}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {AFCoin: {A} Framework for Digital Fiat Currency of Central Banks Based on Account Model}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {70--85}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_4}, doi = {10.1007/978-3-030-14234-6\_4}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/Tian0DZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhangZTA18, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Anonymous Post-Quantum Cryptocash}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {461--479}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_25}, doi = {10.1007/978-3-662-58387-6\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ZhangZTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/TianMW17, author = {Haibo Tian and Yu{-}Feng Ma and Baodian Wei}, title = {Proxy re-designated verifier signature and its applications}, journal = {Int. J. Embed. Syst.}, volume = {9}, number = {6}, pages = {535--547}, year = {2017}, url = {https://doi.org/10.1504/IJES.2017.10008946}, doi = {10.1504/IJES.2017.10008946}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/TianMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TianFH17, author = {Haibo Tian and Liqing Fu and Jiejie He}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {A Simpler Bitcoin Voting Protocol}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {81--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_7}, doi = {10.1007/978-3-319-75160-3\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TianFH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gski/WuWTDM17, author = {Xijuan Wu and Baodian Wei and Haibo Tian and Yusong Du and Xiao Ma}, editor = {Hanning Yuan and Jing Geng and Chuanlu Liu and Fuling Bian and Tisinee Surapunt}, title = {Fair Electronic Voting via Bitcoin Deposits}, booktitle = {Geo-Spatial Knowledge and Intelligence - 5th International Conference, {GSKI} 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part {II}}, series = {Communications in Computer and Information Science}, volume = {849}, pages = {650--661}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-13-0896-3\_64}, doi = {10.1007/978-981-13-0896-3\_64}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gski/WuWTDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TianHF17, author = {Haibo Tian and Jiejie He and Liqing Fu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Contract Coin: Toward Practical Contract Signing on Blockchain}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {43--61}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_3}, doi = {10.1007/978-3-319-72359-4\_3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TianHF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-01030, author = {Huige Li and Fangguo Zhang and Jiejie He and Haibo Tian}, title = {A Searchable Symmetric Encryption Scheme using BlockChain}, journal = {CoRR}, volume = {abs/1711.01030}, year = {2017}, url = {http://arxiv.org/abs/1711.01030}, eprinttype = {arXiv}, eprint = {1711.01030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-01030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiTZ17, author = {Huige Li and Haibo Tian and Fangguo Zhang}, title = {Block Chain based Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2017}, url = {http://eprint.iacr.org/2017/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZTA17, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, title = {Anonymous Post-Quantum Cryptocash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2017}, url = {http://eprint.iacr.org/2017/716}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/MaTW16, author = {Yu{-}Feng Ma and Haibo Tian and Baodian Wei}, title = {Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability}, journal = {J. Inf. Sci. Eng.}, volume = {32}, number = {5}, pages = {1205--1218}, year = {2016}, url = {http://www.iis.sinica.edu.tw/page/jise/2016/201609\_05.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/MaTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianZW16, author = {Haibo Tian and Fangguo Zhang and Baodian Wei}, title = {A lattice-based partially blind signature}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1820--1828}, year = {2016}, url = {https://doi.org/10.1002/sec.1439}, doi = {10.1002/SEC.1439}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TianZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/ZhangLTT15, author = {Yongqiang Zhang and Qiang Liu and Chengpei Tang and Haibo Tian}, title = {A lattice-based designated verifier signature for cloud computing}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {8}, number = {2}, pages = {135--143}, year = {2015}, url = {https://doi.org/10.1504/IJHPCN.2015.070013}, doi = {10.1504/IJHPCN.2015.070013}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/ZhangLTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TianZR15, author = {Haibo Tian and Fangguo Zhang and Kui Ren}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {417--426}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714615}, doi = {10.1145/2714576.2714615}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TianZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/Tian014, author = {Haibo Tian and Jin Li}, title = {A short non-delegatable strong designated verifier signature}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {3}, pages = {490--502}, year = {2014}, url = {https://doi.org/10.1007/s11704-013-3120-4}, doi = {10.1007/S11704-013-3120-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/Tian014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/SunTW14, author = {Xi Sun and Haibo Tian and Yumin Wang}, title = {Toward quantum-resistant strong designated verifier signature}, journal = {Int. J. Grid Util. Comput.}, volume = {5}, number = {2}, pages = {80--86}, year = {2014}, url = {https://doi.org/10.1504/IJGUC.2014.060187}, doi = {10.1504/IJGUC.2014.060187}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/SunTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/0001ZSTLK14, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, title = {Identity-based chameleon hashing and signatures without key exposure}, journal = {Inf. Sci.}, volume = {265}, pages = {198--210}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.020}, doi = {10.1016/J.INS.2013.12.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/0001ZSTLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/Tian0S14, author = {Haibo Tian and Xiaofeng Chen and Willy Susilo}, title = {Deniability and forward secrecy of one-round authenticated key exchange}, journal = {J. Supercomput.}, volume = {67}, number = {3}, pages = {671--690}, year = {2014}, url = {https://doi.org/10.1007/s11227-013-0968-x}, doi = {10.1007/S11227-013-0968-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/Tian0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WeiDZZTG14, author = {Baodian Wei and Yusong Du and Huang Zhang and Fangguo Zhang and Haibo Tian and Chong{-}zhi Gao}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Identity Based Threshold Ring Signature from Lattices}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {233--245}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_18}, doi = {10.1007/978-3-319-11698-3\_18}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WeiDZZTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TianZ0W13, author = {Haibo Tian and Fangguo Zhang and Xiaofeng Chen and Baodian Wei}, title = {Selectively unforgeable but existentially forgeable signature schemes and applications}, journal = {Sci. China Inf. Sci.}, volume = {56}, number = {1}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.1007/s11432-012-4718-0}, doi = {10.1007/S11432-012-4718-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TianZ0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/TianJLW13, author = {Haibo Tian and Zhengtao Jiang and Yi Liu and Baodian Wei}, title = {A systematic method to design strong designated verifier signature without random oracles}, journal = {Clust. Comput.}, volume = {16}, number = {4}, pages = {817--827}, year = {2013}, url = {https://doi.org/10.1007/s10586-013-0255-x}, doi = {10.1007/S10586-013-0255-X}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/TianJLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Tian0WL13, author = {Haibo Tian and Xiaofeng Chen and Baodian Wei and Yi Liu}, title = {Security Analysis of a Suite of Deniable Authentication Protocols}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {5}, pages = {384--389}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p384-389.pdf}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/Tian0WL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/Tian0ZWJL13, author = {Haibo Tian and Xiaofeng Chen and Fangguo Zhang and Baodian Wei and Zhengtao Jiang and Yi Liu}, title = {A non-delegatable strong designated verifier signature in ID-based setting for mobile environment}, journal = {Math. Comput. Model.}, volume = {58}, number = {5-6}, pages = {1289--1300}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.01.010}, doi = {10.1016/J.MCM.2013.01.010}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/Tian0ZWJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/Tian13, author = {Haibo Tian}, title = {On Security Model of One-Round Authenticated Key Exchange}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {319--322}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.59}, doi = {10.1109/INCOS.2013.59}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/Tian13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/Tian13a, author = {Haibo Tian}, title = {General Certificateless Strong Designated Verifier Signature Schemes}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {392--397}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.74}, doi = {10.1109/INCOS.2013.74}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/Tian13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangLT13, author = {Yongqiang Zhang and Qiang Liu and Haibo Tian}, title = {A Hybrid System for Authentication Service}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {821--826}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.156}, doi = {10.1109/INCOS.2013.156}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/ZhangLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Tian12, author = {Haibo Tian}, title = {Deniable message transmission authenticator based on weak signature schemes}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {258--263}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0139}, doi = {10.1049/IET-IFS.2011.0139}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Tian12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/Tian12, author = {Haibo Tian}, title = {A new strong multiple designated verifiers signature}, journal = {Int. J. Grid Util. Comput.}, volume = {3}, number = {1}, pages = {1--11}, year = {2012}, url = {https://doi.org/10.1504/IJGUC.2012.045694}, doi = {10.1504/IJGUC.2012.045694}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/Tian12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TianCL12, author = {Haibo Tian and Xiaofeng Chen and Jin Li}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {A Short Non-delegatable Strong Designated Verifier Signature}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {261--279}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_20}, doi = {10.1007/978-3-642-31448-3\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TianCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/TianCZWJL12, author = {Haibo Tian and Xiaofeng Chen and Fangguo Zhang and Baodian Wei and Zhengtao Jiang and Yi Liu}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {81--88}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.34}, doi = {10.1109/IMIS.2012.34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/TianCZWJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/TianJLW12, author = {Haibo Tian and Zhengtao Jiang and Yi Liu and Baodian Wei}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {A Non-delegatable Strong Designated Verifier Signature without Random Oracles}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {237--244}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.85}, doi = {10.1109/INCOS.2012.85}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/TianJLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/SunTW12, author = {Xi Sun and Haibo Tian and Yumin Wang}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {292--296}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.70}, doi = {10.1109/INCOS.2012.70}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/SunTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/GaoXLWT12, author = {Chong{-}zhi Gao and Dongqing Xie and Jin Li and Baodian Wei and Haibo Tian}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {377--384}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.88}, doi = {10.1109/INCOS.2012.88}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/GaoXLWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhaoZT11, author = {Xingwen Zhao and Fangguo Zhang and Haibo Tian}, title = {Dynamic asymmetric group key agreement for ad hoc networks}, journal = {Ad Hoc Networks}, volume = {9}, number = {5}, pages = {928--939}, year = {2011}, url = {https://doi.org/10.1016/j.adhoc.2010.11.002}, doi = {10.1016/J.ADHOC.2010.11.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/ZhaoZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChenZTWK11, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Discrete logarithm based chameleon hashing and signatures without key exposure}, journal = {Comput. Electr. Eng.}, volume = {37}, number = {4}, pages = {614--623}, year = {2011}, url = {https://doi.org/10.1016/j.compeleceng.2011.03.011}, doi = {10.1016/J.COMPELECENG.2011.03.011}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ChenZTWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenWZTWLLK11, author = {Xiaofeng Chen and Qianhong Wu and Fangguo Zhang and Haibo Tian and Baodian Wei and Byoungcheon Lee and Hyunrok Lee and Kwangjo Kim}, title = {New receipt-free voting scheme using double-trapdoor commitment}, journal = {Inf. Sci.}, volume = {181}, number = {8}, pages = {1493--1502}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.12.012}, doi = {10.1016/J.INS.2010.12.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenWZTWLLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChenSZTL11, author = {Xiaofeng Chen and Willy Susilo and Fangguo Zhang and Haibo Tian and Jin Li}, title = {Identity-based trapdoor mercurial commitments and applications}, journal = {Theor. Comput. Sci.}, volume = {412}, number = {39}, pages = {5498--5512}, year = {2011}, url = {https://doi.org/10.1016/j.tcs.2011.05.031}, doi = {10.1016/J.TCS.2011.05.031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChenSZTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TianCJ11, author = {Haibo Tian and Xiaofeng Chen and Zhengtao Jiang}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Non-interactive Deniable Authentication Protocols}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {142--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_12}, doi = {10.1007/978-3-642-34704-7\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TianCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TianCJD11, author = {Haibo Tian and Xiaofeng Chen and Zhengtao Jiang and Yusong Du}, editor = {Howon Kim}, title = {Non-delegatable Strong Designated Verifier Signature on Elliptic Curves}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {219--234}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_15}, doi = {10.1007/978-3-642-31912-9\_15}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/TianCJD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/Tian11, author = {Haibo Tian}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {A New Strong Multiple Designated Verifiers Signature for Broadcast Propagation}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {268--274}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.31}, doi = {10.1109/INCOS.2011.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/Tian11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenZSTLK10, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Identity-Based Chameleon Hash Scheme without Key Exposure}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {200--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_13}, doi = {10.1007/978-3-642-14081-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenTZD10, author = {Xiaofeng Chen and Haibo Tian and Fangguo Zhang and Yong Ding}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {415--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_29}, doi = {10.1007/978-3-642-21518-6\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChenTZD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenZTWMKK10, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Qianhong Wu and Yi Mu and Jangseong Kim and Kwangjo Kim}, editor = {Radu Sion}, title = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {304--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_23}, doi = {10.1007/978-3-642-14577-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChenZTWMKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianCD09, author = {Haibo Tian and Xiaofeng Chen and Yong Ding}, title = {Analysis of Two Types Deniable Authentication Protocols}, journal = {Int. J. Netw. Secur.}, volume = {9}, number = {3}, pages = {242--246}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n3/ijns-2009-v9-n3-p242-246.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZhanTPZWZ09, author = {Yang Zhan and Haibo Tian and Qingqi Pei and Yueyu Zhang and Yumin Wang and Weidong Zhang}, title = {A Deep Copy Protection Framework for Electronic Devices within Home}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {23--26}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.249}, doi = {10.1109/IAS.2009.249}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZhanTPZWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZTWK09, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2009}, url = {http://eprint.iacr.org/2009/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZTWK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenTZ09, author = {Xiaofeng Chen and Haibo Tian and Fangguo Zhang}, title = {Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2009}, url = {http://eprint.iacr.org/2009/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZTK09, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim}, title = {Identity-Based Chameleon Hash Scheme Without Key Exposure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2009}, url = {http://eprint.iacr.org/2009/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZTK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenZTWSMLK08, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Willy Susilo and Yi Mu and Hyunrok Lee and Kwangjo Kim}, title = {Efficient generic on-line/off-line (threshold) signatures without key exposure}, journal = {Inf. Sci.}, volume = {178}, number = {21}, pages = {4192--4203}, year = {2008}, url = {https://doi.org/10.1016/j.ins.2008.06.022}, doi = {10.1016/J.INS.2008.06.022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenZTWSMLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/TianSMW08, author = {Haibo Tian and Willy Susilo and Yang Ming and Yumin Wang}, title = {A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles}, journal = {J. Comput. Sci. Technol.}, volume = {23}, number = {5}, pages = {832--842}, year = {2008}, url = {https://doi.org/10.1007/s11390-008-9178-z}, doi = {10.1007/S11390-008-9178-Z}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/TianSMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/TianSW07, author = {Haibo Tian and Xi Sun and Yumin Wang}, title = {A New Public-Key Encryption Scheme}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {1}, pages = {95--102}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9013-y}, doi = {10.1007/S11390-007-9013-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/TianSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/TianW06, author = {Haibo Tian and Yumin Wang}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Security Analysis of the Digital Transmission Copy Protection Specification}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {134--137}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 10:51:51 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/TianW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/TianZW05, author = {Haibo Tian and Yang Zhan and Yumin Wang}, title = {Analysis of host authentication mechanism in current {POD} copy protection system}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {51}, number = {3}, pages = {922--924}, year = {2005}, url = {https://doi.org/10.1109/TCE.2005.1510504}, doi = {10.1109/TCE.2005.1510504}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/TianZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TianSW05, author = {Haibo Tian and Xi Sun and Yumin Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Virtual Bridge Certificate Authority Model}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {500--507}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_74}, doi = {10.1007/11596981\_74}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/TianSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.