@article{DBLP:journals/stvr/YangRZ24,
author = {Jia Yang and
Ou Ruan and
JiXin Zhang},
title = {Tensor-based gated graph neural network for automatic vulnerability
detection in source code},
journal = {Softw. Test. Verification Reliab.},
volume = {34},
number = {2},
year = {2024},
url = {https://doi.org/10.1002/stvr.1867},
doi = {10.1002/STVR.1867},
timestamp = {Thu, 29 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/stvr/YangRZ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccir/RuanZ22,
author = {Ou Ruan and
Jianqiang Zeng},
title = {A Delegated Offline Private Set Intersection Protocol for Cloud Computing
Environments},
booktitle = {Proceedings of the 2nd International Conference on Control and Intelligent
Robotics, {ICCIR} 2022, Nanjing, China, June 24-26, 2022},
pages = {735--739},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3548608.3559297},
doi = {10.1145/3548608.3559297},
timestamp = {Wed, 26 Oct 2022 14:31:02 +0200},
biburl = {https://dblp.org/rec/conf/iccir/RuanZ22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/XuWZWLR22,
author = {Zhongqiu Xu and
Mingzhi Wang and
Bingchen Zhang and
Yirong Wu and
Suihua Liu and
Ou Ruan},
title = {Nonconvex-NLTV Regularization-Based {SAR} Image Feature Enhancement
with Water Body Information Extraction Using {QILU-1} {SAR} Data},
booktitle = {{IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS}
2022, Kuala Lumpur, Malaysia, July 17-22, 2022},
pages = {2947--2950},
publisher = {{IEEE}},
year = {2022},
url = {https://doi.org/10.1109/IGARSS46834.2022.9883891},
doi = {10.1109/IGARSS46834.2022.9883891},
timestamp = {Fri, 30 Sep 2022 15:33:50 +0200},
biburl = {https://dblp.org/rec/conf/igarss/XuWZWLR22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RuanQ22,
author = {Ou Ruan and
Shanshan Qin},
title = {Secure and efficient publicly verifiable ridge regression outsourcing
scheme},
booktitle = {{IEEE} International Conference on Trust, Security and Privacy in
Computing and Communications, TrustCom 2022, Wuhan, China, December
9-11, 2022},
pages = {703--709},
publisher = {{IEEE}},
year = {2022},
url = {https://doi.org/10.1109/TrustCom56396.2022.00100},
doi = {10.1109/TRUSTCOM56396.2022.00100},
timestamp = {Mon, 27 Mar 2023 16:44:39 +0200},
biburl = {https://dblp.org/rec/conf/trustcom/RuanQ22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/RuanZZ21,
author = {Ou Ruan and
Lixiao Zhang and
Yuanyuan Zhang},
title = {Location-sharing protocol for privacy protection in mobile online
social networks},
journal = {{EURASIP} J. Wirel. Commun. Netw.},
volume = {2021},
number = {1},
pages = {127},
year = {2021},
url = {https://doi.org/10.1186/s13638-021-01999-z},
doi = {10.1186/S13638-021-01999-Z},
timestamp = {Thu, 20 May 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ejwcn/RuanZZ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RuanM20,
author = {Ou Ruan and
Hao Mao},
title = {Efficient Private Set Intersection Using Point-Value Polynomial Representation},
journal = {Secur. Commun. Networks},
volume = {2020},
pages = {8890677:1--8890677:12},
year = {2020},
url = {https://doi.org/10.1155/2020/8890677},
doi = {10.1155/2020/8890677},
timestamp = {Sat, 25 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/scn/RuanM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/RuanHM20,
author = {Ou Ruan and
Xiongbo Huang and
Hao Mao},
title = {An Efficient Private Set Intersection Protocol for the Cloud Computing
Environments},
booktitle = {6th {IEEE} International Conference on Big Data Security on Cloud,
{IEEE} International Conference on High Performance and Smart Computing,
and {IEEE} International Conference on Intelligent Data and Security,
BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020},
pages = {254--259},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00053},
doi = {10.1109/BIGDATASECURITY-HPSC-IDS49724.2020.00053},
timestamp = {Wed, 14 Jul 2021 09:36:30 +0200},
biburl = {https://dblp.org/rec/conf/bigdatasec/RuanHM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RuanWMZ19,
author = {Ou Ruan and
Zihao Wang and
Jing Mi and
Mingwu Zhang},
title = {New Approach to Set Representation and Practical Private Set-Intersection
Protocols},
journal = {{IEEE} Access},
volume = {7},
pages = {64897--64906},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2917057},
doi = {10.1109/ACCESS.2019.2917057},
timestamp = {Fri, 05 Jul 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/RuanWMZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RuanWWZ19,
author = {Ou Ruan and
Zihao Wang and
Qingping Wang and
Mingwu Zhang},
title = {Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated
Key Exchange},
journal = {Int. J. Netw. Secur.},
volume = {21},
number = {5},
pages = {861--871},
year = {2019},
url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p861-871.pdf},
timestamp = {Mon, 04 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijnsec/RuanWWZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/RuanWW19,
author = {Ou Ruan and
Qingping Wang and
Zihao Wang},
title = {Provably leakage-resilient three-party password-based authenticated
key exchange},
journal = {J. Ambient Intell. Humaniz. Comput.},
volume = {10},
number = {1},
pages = {163--173},
year = {2019},
url = {https://doi.org/10.1007/s12652-017-0628-8},
doi = {10.1007/S12652-017-0628-8},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jaihc/RuanWW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RuanYZ19,
author = {Ou Ruan and
Yang Yang and
Mingwu Zhang},
editor = {Joseph K. Liu and
Xinyi Huang},
title = {An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol},
booktitle = {Network and System Security - 13th International Conference, {NSS}
2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11928},
pages = {665--674},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-36938-5\_41},
doi = {10.1007/978-3-030-36938-5\_41},
timestamp = {Wed, 17 Aug 2022 14:30:35 +0200},
biburl = {https://dblp.org/rec/conf/nss/RuanYZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/RuanZZZH18,
author = {Ou Ruan and
Yuanyuan Zhang and
Mingwu Zhang and
Jing Zhou and
Lein Harn},
title = {After-the-Fact Leakage-Resilient Identity-Based Authenticated Key
Exchange},
journal = {{IEEE} Syst. J.},
volume = {12},
number = {2},
pages = {2017--2026},
year = {2018},
url = {https://doi.org/10.1109/JSYST.2017.2685524},
doi = {10.1109/JSYST.2017.2685524},
timestamp = {Fri, 11 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sj/RuanZZZH18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiaoZYR18,
author = {Yaqing Liao and
Jing Zhou and
Yang Yang and
Ou Ruan},
title = {An Efficient Oblivious Transfer Protocol with Access Control},
booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
Guilin, China, August 8-9, 2018},
pages = {29--34},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/AsiaJCIS.2018.00014},
doi = {10.1109/ASIAJCIS.2018.00014},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/asiajcis/LiaoZYR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RuanCZ17,
author = {Ou Ruan and
Jing Chen and
Mingwu Zhang},
title = {Provably Leakage-Resilient Password-Based Authenticated Key Exchange
in the Standard Model},
journal = {{IEEE} Access},
volume = {5},
pages = {26832--26841},
year = {2017},
url = {https://doi.org/10.1109/ACCESS.2017.2776160},
doi = {10.1109/ACCESS.2017.2776160},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/RuanCZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/WanLJLR17,
author = {Fang Wan and
HaiNing Li and
Huazhong Jin and
GuangBo Lei and
Ou Ruan},
editor = {Leonard Barolli and
Olivier Terzo},
title = {A Method for Estimating the Camera Parameters Based on Vanishing Points},
booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings
of the 11th International Conference on Complex, Intelligent, and
Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12,
2017},
series = {Advances in Intelligent Systems and Computing},
volume = {611},
pages = {499--507},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-61566-0\_45},
doi = {10.1007/978-3-319-61566-0\_45},
timestamp = {Thu, 06 Jul 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cisis/WanLJLR17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/DengCRWYT17,
author = {Na Deng and
Xu Chen and
Ou Ruan and
Chunzhi Wang and
Zhiwei Ye and
Jingbai Tian},
editor = {Leonard Barolli and
Olivier Terzo},
title = {PaEffExtr: {A} Method to Extract Effect Statements Automatically from
Patents},
booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings
of the 11th International Conference on Complex, Intelligent, and
Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12,
2017},
series = {Advances in Intelligent Systems and Computing},
volume = {611},
pages = {667--676},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-61566-0\_62},
doi = {10.1007/978-3-319-61566-0\_62},
timestamp = {Wed, 05 Jul 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cisis/DengCRWYT17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/DengCRWYT17,
author = {Na Deng and
Xu Chen and
Ou Ruan and
Chunzhi Wang and
Zhiwei Ye and
Jingbai Tian},
editor = {Leonard Barolli and
Mingwu Zhang and
Xu An Wang},
title = {The Construction Method of Clue Words Thesaurus in Chinese Patents
Based on Iteration and Self-filtering},
booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International
Conference on Emerging Internetworking, Data {\&} Web Technologies,
EIDWT-2017, Wuhan, China, June 10-11, 2017},
series = {Lecture Notes on Data Engineering and Communications Technologies},
volume = {6},
pages = {119--125},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-59463-7\_12},
doi = {10.1007/978-3-319-59463-7\_12},
timestamp = {Mon, 03 Apr 2023 12:49:11 +0200},
biburl = {https://dblp.org/rec/conf/eidwt/DengCRWYT17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WanJLR17,
author = {Fang Wan and
Huazhong Jin and
GuangBo Lei and
Ou Ruan},
editor = {Leonard Barolli and
Mingwu Zhang and
Xu An Wang},
title = {Fast Iterative Reconstruction Based on Condensed Hierarchy Tree},
booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International
Conference on Emerging Internetworking, Data {\&} Web Technologies,
EIDWT-2017, Wuhan, China, June 10-11, 2017},
series = {Lecture Notes on Data Engineering and Communications Technologies},
volume = {6},
pages = {390--399},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-59463-7\_39},
doi = {10.1007/978-3-319-59463-7\_39},
timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eidwt/WanJLR17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/JinWR17,
author = {Huazhong Jin and
Fang Wan and
Ou Ruan},
editor = {Leonard Barolli and
Mingwu Zhang and
Xu An Wang},
title = {Pavement Crack Detection Fused {HOG} and Watershed Algorithm of Range
Image},
booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International
Conference on Emerging Internetworking, Data {\&} Web Technologies,
EIDWT-2017, Wuhan, China, June 10-11, 2017},
series = {Lecture Notes on Data Engineering and Communications Technologies},
volume = {6},
pages = {475--488},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-59463-7\_47},
doi = {10.1007/978-3-319-59463-7\_47},
timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eidwt/JinWR17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WangRW17,
author = {Qingping Wang and
Ou Ruan and
Zihao Wang},
editor = {Leonard Barolli and
Mingwu Zhang and
Xu An Wang},
title = {Security Analysis and Improvements of Three-Party Password-Based Authenticated
Key Exchange Protocol},
booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International
Conference on Emerging Internetworking, Data {\&} Web Technologies,
EIDWT-2017, Wuhan, China, June 10-11, 2017},
series = {Lecture Notes on Data Engineering and Communications Technologies},
volume = {6},
pages = {497--508},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-59463-7\_49},
doi = {10.1007/978-3-319-59463-7\_49},
timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eidwt/WangRW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/RuanZC17,
author = {Ou Ruan and
Mingwu Zhang and
Jing Chen},
editor = {Shadi Ibrahim and
Kim{-}Kwang Raymond Choo and
Zheng Yan and
Witold Pedrycz},
title = {Leakage-Resilient Password-Based Authenticated Key Exchange},
booktitle = {Algorithms and Architectures for Parallel Processing - 17th International
Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10393},
pages = {285--296},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-65482-9\_19},
doi = {10.1007/978-3-319-65482-9\_19},
timestamp = {Tue, 14 May 2019 10:00:51 +0200},
biburl = {https://dblp.org/rec/conf/ica3pp/RuanZC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/XuWZR17,
author = {Hanqiu Xu and
Qingping Wang and
Jing Zhou and
Ou Ruan},
editor = {Leonard Barolli and
Tomoya Enokido},
title = {An Efficient Provably Secure Password-Based Authenticated Key Agreement},
booktitle = {Innovative Mobile and Internet Services in Ubiquitous Computing -
Proceedings of the 11th International Conference on Innovative Mobile
and Internet Services in Ubiquitous Computing (IMIS-2017), Torino,
Italy, 10-12 July 2017},
series = {Advances in Intelligent Systems and Computing},
volume = {612},
pages = {423--434},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-61542-4\_40},
doi = {10.1007/978-3-319-61542-4\_40},
timestamp = {Wed, 05 Jul 2017 12:58:46 +0200},
biburl = {https://dblp.org/rec/conf/imis/XuWZR17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/JinGWRL17,
author = {Huazhong Jin and
Feng Guan and
Fang Wan and
Ou Ruan and
Qing Li},
editor = {Leonard Barolli and
Tomoya Enokido},
title = {An Optimal Algorithm for Multiscale Segmentation of High Resolution
Remote Sensing Image Based on Spectral Clustering},
booktitle = {Innovative Mobile and Internet Services in Ubiquitous Computing -
Proceedings of the 11th International Conference on Innovative Mobile
and Internet Services in Ubiquitous Computing (IMIS-2017), Torino,
Italy, 10-12 July 2017},
series = {Advances in Intelligent Systems and Computing},
volume = {612},
pages = {686--695},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-61542-4\_68},
doi = {10.1007/978-3-319-61542-4\_68},
timestamp = {Wed, 05 Jul 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/imis/JinGWRL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RuanZZ16,
author = {Ou Ruan and
Jing Zhou and
Mingwu Zhang},
title = {An efficient resource-fair commit-prove-fair-open protocol},
journal = {Int. J. Electron. Secur. Digit. Forensics},
volume = {8},
number = {1},
pages = {17--34},
year = {2016},
url = {https://doi.org/10.1504/IJESDF.2016.073729},
doi = {10.1504/IJESDF.2016.073729},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijesdf/RuanZZ16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/RuanKHL15,
author = {Ou Ruan and
Neeraj Kumar and
Debiao He and
Jong{-}Hyouk Lee},
title = {Efficient provably secure password-based explicit authenticated key
agreement},
journal = {Pervasive Mob. Comput.},
volume = {24},
pages = {50--60},
year = {2015},
url = {https://doi.org/10.1016/j.pmcj.2015.06.008},
doi = {10.1016/J.PMCJ.2015.06.008},
timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/percom/RuanKHL15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RuanCZCZ14,
author = {Ou Ruan and
Jing Chen and
Jing Zhou and
Yongquan Cui and
Mingwu Zhang},
title = {An efficient fair UC-secure protocol for two-party computation},
journal = {Secur. Commun. Networks},
volume = {7},
number = {8},
pages = {1253--1263},
year = {2014},
url = {https://doi.org/10.1002/sec.857},
doi = {10.1002/SEC.857},
timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/scn/RuanCZCZ14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/PengRZC14,
author = {Shengbo Peng and
Ou Ruan and
Jing Zhou and
Zaixing Chen},
title = {A New Identity-Based Authentication Scheme for {SIP}},
booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
Wuhan, China, September 3-5, 2014},
pages = {90--95},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/AsiaJCIS.2014.14},
doi = {10.1109/ASIAJCIS.2014.14},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/asiajcis/PengRZC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RuanFZHL13,
author = {Ou Ruan and
Cai Fu and
Jing Zhou and
Lansheng Han and
Xiaoyang Liu},
title = {Efficient Fair UC-Secure Two-Party Computation on Committed Inputs},
booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
Symposium on Parallel and Distributed Processing with Applications,
{ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
pages = {544--551},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/TrustCom.2013.7},
doi = {10.1109/TRUSTCOM.2013.7},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/RuanFZHL13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/RuanZZC12,
author = {Ou Ruan and
Jing Zhou and
Minghui Zheng and
Guohua Cui},
title = {Efficient Fair Secure Two-Party Computation},
booktitle = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012,
Guilin, China, December 6-8, 2012},
pages = {243--248},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/APSCC.2012.13},
doi = {10.1109/APSCC.2012.13},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/apscc/RuanZZC12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuanFC11,
author = {Ou Ruan and
Cai Fu and
Guohua Cui},
title = {An Efficient Protocol for the Commit-Prove-Fair-Open functionality},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {577},
year = {2011},
url = {http://eprint.iacr.org/2011/577},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/RuanFC11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}