iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/35/10551.bib
@article{DBLP:journals/stvr/YangRZ24, author = {Jia Yang and Ou Ruan and JiXin Zhang}, title = {Tensor-based gated graph neural network for automatic vulnerability detection in source code}, journal = {Softw. Test. Verification Reliab.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/stvr.1867}, doi = {10.1002/STVR.1867}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/stvr/YangRZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iccir/RuanZ22, author = {Ou Ruan and Jianqiang Zeng}, title = {A Delegated Offline Private Set Intersection Protocol for Cloud Computing Environments}, booktitle = {Proceedings of the 2nd International Conference on Control and Intelligent Robotics, {ICCIR} 2022, Nanjing, China, June 24-26, 2022}, pages = {735--739}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548608.3559297}, doi = {10.1145/3548608.3559297}, timestamp = {Wed, 26 Oct 2022 14:31:02 +0200}, biburl = {https://dblp.org/rec/conf/iccir/RuanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/igarss/XuWZWLR22, author = {Zhongqiu Xu and Mingzhi Wang and Bingchen Zhang and Yirong Wu and Suihua Liu and Ou Ruan}, title = {Nonconvex-NLTV Regularization-Based {SAR} Image Feature Enhancement with Water Body Information Extraction Using {QILU-1} {SAR} Data}, booktitle = {{IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2022, Kuala Lumpur, Malaysia, July 17-22, 2022}, pages = {2947--2950}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IGARSS46834.2022.9883891}, doi = {10.1109/IGARSS46834.2022.9883891}, timestamp = {Fri, 30 Sep 2022 15:33:50 +0200}, biburl = {https://dblp.org/rec/conf/igarss/XuWZWLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/trustcom/RuanQ22, author = {Ou Ruan and Shanshan Qin}, title = {Secure and efficient publicly verifiable ridge regression outsourcing scheme}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {703--709}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00100}, doi = {10.1109/TRUSTCOM56396.2022.00100}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RuanQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ejwcn/RuanZZ21, author = {Ou Ruan and Lixiao Zhang and Yuanyuan Zhang}, title = {Location-sharing protocol for privacy protection in mobile online social networks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2021}, number = {1}, pages = {127}, year = {2021}, url = {https://doi.org/10.1186/s13638-021-01999-z}, doi = {10.1186/S13638-021-01999-Z}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/RuanZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/scn/RuanM20, author = {Ou Ruan and Hao Mao}, title = {Efficient Private Set Intersection Using Point-Value Polynomial Representation}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8890677:1--8890677:12}, year = {2020}, url = {https://doi.org/10.1155/2020/8890677}, doi = {10.1155/2020/8890677}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/RuanM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdatasec/RuanHM20, author = {Ou Ruan and Xiongbo Huang and Hao Mao}, title = {An Efficient Private Set Intersection Protocol for the Cloud Computing Environments}, booktitle = {6th {IEEE} International Conference on Big Data Security on Cloud, {IEEE} International Conference on High Performance and Smart Computing, and {IEEE} International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020}, pages = {254--259}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00053}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS49724.2020.00053}, timestamp = {Wed, 14 Jul 2021 09:36:30 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/RuanHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/RuanWMZ19, author = {Ou Ruan and Zihao Wang and Jing Mi and Mingwu Zhang}, title = {New Approach to Set Representation and Practical Private Set-Intersection Protocols}, journal = {{IEEE} Access}, volume = {7}, pages = {64897--64906}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2917057}, doi = {10.1109/ACCESS.2019.2917057}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RuanWMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijnsec/RuanWWZ19, author = {Ou Ruan and Zihao Wang and Qingping Wang and Mingwu Zhang}, title = {Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {5}, pages = {861--871}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p861-871.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RuanWWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jaihc/RuanWW19, author = {Ou Ruan and Qingping Wang and Zihao Wang}, title = {Provably leakage-resilient three-party password-based authenticated key exchange}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {10}, number = {1}, pages = {163--173}, year = {2019}, url = {https://doi.org/10.1007/s12652-017-0628-8}, doi = {10.1007/S12652-017-0628-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/RuanWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nss/RuanYZ19, author = {Ou Ruan and Yang Yang and Mingwu Zhang}, editor = {Joseph K. Liu and Xinyi Huang}, title = {An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {665--674}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_41}, doi = {10.1007/978-3-030-36938-5\_41}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/RuanYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/sj/RuanZZZH18, author = {Ou Ruan and Yuanyuan Zhang and Mingwu Zhang and Jing Zhou and Lein Harn}, title = {After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {2}, pages = {2017--2026}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2017.2685524}, doi = {10.1109/JSYST.2017.2685524}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/RuanZZZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/asiajcis/LiaoZYR18, author = {Yaqing Liao and Jing Zhou and Yang Yang and Ou Ruan}, title = {An Efficient Oblivious Transfer Protocol with Access Control}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {29--34}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00014}, doi = {10.1109/ASIAJCIS.2018.00014}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiaoZYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/RuanCZ17, author = {Ou Ruan and Jing Chen and Mingwu Zhang}, title = {Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model}, journal = {{IEEE} Access}, volume = {5}, pages = {26832--26841}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2776160}, doi = {10.1109/ACCESS.2017.2776160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RuanCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cisis/WanLJLR17, author = {Fang Wan and HaiNing Li and Huazhong Jin and GuangBo Lei and Ou Ruan}, editor = {Leonard Barolli and Olivier Terzo}, title = {A Method for Estimating the Camera Parameters Based on Vanishing Points}, booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12, 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {611}, pages = {499--507}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61566-0\_45}, doi = {10.1007/978-3-319-61566-0\_45}, timestamp = {Thu, 06 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisis/WanLJLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cisis/DengCRWYT17, author = {Na Deng and Xu Chen and Ou Ruan and Chunzhi Wang and Zhiwei Ye and Jingbai Tian}, editor = {Leonard Barolli and Olivier Terzo}, title = {PaEffExtr: {A} Method to Extract Effect Statements Automatically from Patents}, booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12, 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {611}, pages = {667--676}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61566-0\_62}, doi = {10.1007/978-3-319-61566-0\_62}, timestamp = {Wed, 05 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisis/DengCRWYT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/eidwt/DengCRWYT17, author = {Na Deng and Xu Chen and Ou Ruan and Chunzhi Wang and Zhiwei Ye and Jingbai Tian}, editor = {Leonard Barolli and Mingwu Zhang and Xu An Wang}, title = {The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering}, booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International Conference on Emerging Internetworking, Data {\&} Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {6}, pages = {119--125}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59463-7\_12}, doi = {10.1007/978-3-319-59463-7\_12}, timestamp = {Mon, 03 Apr 2023 12:49:11 +0200}, biburl = {https://dblp.org/rec/conf/eidwt/DengCRWYT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/eidwt/WanJLR17, author = {Fang Wan and Huazhong Jin and GuangBo Lei and Ou Ruan}, editor = {Leonard Barolli and Mingwu Zhang and Xu An Wang}, title = {Fast Iterative Reconstruction Based on Condensed Hierarchy Tree}, booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International Conference on Emerging Internetworking, Data {\&} Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {6}, pages = {390--399}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59463-7\_39}, doi = {10.1007/978-3-319-59463-7\_39}, timestamp = {Tue, 05 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eidwt/WanJLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/eidwt/JinWR17, author = {Huazhong Jin and Fang Wan and Ou Ruan}, editor = {Leonard Barolli and Mingwu Zhang and Xu An Wang}, title = {Pavement Crack Detection Fused {HOG} and Watershed Algorithm of Range Image}, booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International Conference on Emerging Internetworking, Data {\&} Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {6}, pages = {475--488}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59463-7\_47}, doi = {10.1007/978-3-319-59463-7\_47}, timestamp = {Tue, 05 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eidwt/JinWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/eidwt/WangRW17, author = {Qingping Wang and Ou Ruan and Zihao Wang}, editor = {Leonard Barolli and Mingwu Zhang and Xu An Wang}, title = {Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol}, booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International Conference on Emerging Internetworking, Data {\&} Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {6}, pages = {497--508}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59463-7\_49}, doi = {10.1007/978-3-319-59463-7\_49}, timestamp = {Tue, 05 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eidwt/WangRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ica3pp/RuanZC17, author = {Ou Ruan and Mingwu Zhang and Jing Chen}, editor = {Shadi Ibrahim and Kim{-}Kwang Raymond Choo and Zheng Yan and Witold Pedrycz}, title = {Leakage-Resilient Password-Based Authenticated Key Exchange}, booktitle = {Algorithms and Architectures for Parallel Processing - 17th International Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10393}, pages = {285--296}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65482-9\_19}, doi = {10.1007/978-3-319-65482-9\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/RuanZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/imis/XuWZR17, author = {Hanqiu Xu and Qingping Wang and Jing Zhou and Ou Ruan}, editor = {Leonard Barolli and Tomoya Enokido}, title = {An Efficient Provably Secure Password-Based Authenticated Key Agreement}, booktitle = {Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {612}, pages = {423--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61542-4\_40}, doi = {10.1007/978-3-319-61542-4\_40}, timestamp = {Wed, 05 Jul 2017 12:58:46 +0200}, biburl = {https://dblp.org/rec/conf/imis/XuWZR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/imis/JinGWRL17, author = {Huazhong Jin and Feng Guan and Fang Wan and Ou Ruan and Qing Li}, editor = {Leonard Barolli and Tomoya Enokido}, title = {An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering}, booktitle = {Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {612}, pages = {686--695}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61542-4\_68}, doi = {10.1007/978-3-319-61542-4\_68}, timestamp = {Wed, 05 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imis/JinGWRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijesdf/RuanZZ16, author = {Ou Ruan and Jing Zhou and Mingwu Zhang}, title = {An efficient resource-fair commit-prove-fair-open protocol}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {8}, number = {1}, pages = {17--34}, year = {2016}, url = {https://doi.org/10.1504/IJESDF.2016.073729}, doi = {10.1504/IJESDF.2016.073729}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/RuanZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/percom/RuanKHL15, author = {Ou Ruan and Neeraj Kumar and Debiao He and Jong{-}Hyouk Lee}, title = {Efficient provably secure password-based explicit authenticated key agreement}, journal = {Pervasive Mob. Comput.}, volume = {24}, pages = {50--60}, year = {2015}, url = {https://doi.org/10.1016/j.pmcj.2015.06.008}, doi = {10.1016/J.PMCJ.2015.06.008}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/RuanKHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/scn/RuanCZCZ14, author = {Ou Ruan and Jing Chen and Jing Zhou and Yongquan Cui and Mingwu Zhang}, title = {An efficient fair UC-secure protocol for two-party computation}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1253--1263}, year = {2014}, url = {https://doi.org/10.1002/sec.857}, doi = {10.1002/SEC.857}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RuanCZCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/asiajcis/PengRZC14, author = {Shengbo Peng and Ou Ruan and Jing Zhou and Zaixing Chen}, title = {A New Identity-Based Authentication Scheme for {SIP}}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {90--95}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.14}, doi = {10.1109/ASIAJCIS.2014.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/PengRZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/trustcom/RuanFZHL13, author = {Ou Ruan and Cai Fu and Jing Zhou and Lansheng Han and Xiaoyang Liu}, title = {Efficient Fair UC-Secure Two-Party Computation on Committed Inputs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {544--551}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.7}, doi = {10.1109/TRUSTCOM.2013.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RuanFZHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/apscc/RuanZZC12, author = {Ou Ruan and Jing Zhou and Minghui Zheng and Guohua Cui}, title = {Efficient Fair Secure Two-Party Computation}, booktitle = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012, Guilin, China, December 6-8, 2012}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/APSCC.2012.13}, doi = {10.1109/APSCC.2012.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/RuanZZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/RuanFC11, author = {Ou Ruan and Cai Fu and Guohua Cui}, title = {An Efficient Protocol for the Commit-Prove-Fair-Open functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2011}, url = {http://eprint.iacr.org/2011/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RuanFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }