If you made any changes in Pure these will be visible here soon.

Research Output

2020

Enabling efficient privacy-assured outlier detection over encrypted incremental data sets

Lai, S., Yuan, X., Sakzad, A., Salehi, M., Liu, J. K. & Liu, D., Apr 2020, In : IEEE Internet of Things Journal. 7, 4, p. 2651-2662 12 p., 8882332.

Research output: Contribution to journalArticleResearchpeer-review

Geometric range search on encrypted data with Forward/Backward security

Kasra Kermanshahi, S. K., Sun, S-F., Liu, J. K., Steinfeld, R., Nepal, S., Lau, W. F. & Au, M., 23 Mar 2020, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Private machine learning classification based on fully homomorphic encryption

Sun, X., Zhang, P., Liu, J. K., Yu, J. & Xie, W., Apr 2020, In : IEEE Transactions on Emerging Topics in Computing. 8, 2, p. 352-364 13 p.

Research output: Contribution to journalArticleResearchpeer-review

10 Citations (Scopus)
2019

A flexible instant payment system based on blockchain

Zhong, L., Wang, H., Xie, J., Qin, B., Liu, J. K. & Wu, Q., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 289-306 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

A generic construction of tightly secure signatures in the multi-user setting

Zhang, X., Liu, S., Gu, D. & Liu, J. K., 5 Jul 2019, In : Theoretical Computer Science. 775, p. 32-52 21 p.

Research output: Contribution to journalArticleResearchpeer-review

A multi-client DSSE scheme supporting range queries

Loh, R., Zuo, C., Liu, J. K. & Sun, S. F., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 289-307 19 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications

Meng, M. H., Bai, G., Liu, J. K., Luo, X. & Wang, Y., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 349-369 21 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Building a dynamic searchable encrypted medical database for multi-client

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., Jul 2019, In : Information Sciences. 527, p. 394-405 28 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Consolidating hash power in blockchain shards with a forest

Zhao, J., Yu, J. & Liu, J. K., 2019, Information Security and Cryptology : 15th International Conference, Inscrypt 2019 Nanjing, China, December 6–8, 2019 Revised Selected Papers. Liu, Z. & Yung, M. (eds.). Cham Switzerland: Springer, p. 309-322 14 p. (Lecture Notes in Computer Science ; vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

DGM: a dynamic and revocable Group Merkle signature

Buser, M., Liu, J., Steinfeld, R., Sakzad, A. & Sun, S-F., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 194-214 21 p. (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Dynamic Searchable Symmetric Encryption with forward and stronger backward privacy

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2019, Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part II. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Cham Switzerland: Springer, p. 283-303 21 p. (Lecture Notes in Computer Science ; vol. 11736 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Efficient and Adaptive Procurement Protocol with Purchasing Privacy

Jiang, P., Guo, F., Susilo, W., Au, M. H., Huang, X. & Liu, J. K., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient threshold password-authenticated secret sharing protocols for cloud computing

Yi, X., Tari, Z., Hao, F., Chen, L., Liu, J. K., Yang, X., Lam, K. Y., Khalil, I. & Zomaya, A. Y., Jun 2019, In : Journal of Parallel and Distributed Computing. 128, p. 57-70 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Evaluating CryptoNote-style blockchains

Han, R., Yu, J., Liu, J. & Zhang, P., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 29-48 20 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Fast-to-finalize Nakamoto-like consensus

Tang, S., Chow, S. S. M., Liu, Z. & Liu, J. K., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 271-288 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Generic multi-keyword ranked search on encrypted cloud data

Kasra Kermanshahi, S., Liu, J. K., Steinfeld, R. & Nepal, S., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 322-343 22 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

GraphSE2: an encrypted graph database for privacy-preserving social search

Lai, S., Yuan, X., Sun, S-F., Liu, J. K., Liu, Y. & Liu, D., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 41-54 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications

Esgin, M. F., Steinfeld, R., Liu, J. K. & Liu, D., 2019, Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference Santa Barbara, CA, USA, August 18–22, 2019 Proceedings, Part I. Boldyreva, A. & Micciancio, D. (eds.). Cham Switzerland: Springer, p. 115-146 32 p. (Lecture Notes in Computer Science ; vol. 11692 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets

Alberto Torres, W., Kuchta, V., Steinfeld, R., Sakzad, A., Liu, J. K. & Cheng, J., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

MatRiCT: efficient, scalable and post-quantum blockchain confidential transactions protocol

Esgin, M. F., Zhao, R. K., Steinfeld, R., Liu, J. K. & Liu, D., Nov 2019, CCS'19 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Wang, X. & Katz, J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 567-584 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

On the unforkability of Monero

Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D. & Yu, J., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 621-632 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File

Proof-of-QoS: QoS based blockchain consensus protocol

Yu, B., Liu, J., Nepal, S., Yu, J. & Rimba, P., Nov 2019, In : Computers & Security. 87, 13 p., 101580.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Revocable and linkable ring signature

Zhang, X., Liu, J. K., Steinfeld, R., Kuchta, V. & Yu, J., 2019, Information Security and Cryptology : 15th International Conference, Inscrypt 2019 Nanjing, China, December 6–8, 2019 Revised Selected Papers. Liu, Z. & Yung, M. (eds.). Cham Switzerland: Springer, p. 3-27 25 p. (Lecture Notes in Computer Science ; vol. 2020).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Strong leakage and tamper-resilient PKE from refined hash proof system

Sun, S. F., Gu, D., Au, M. H., Han, S., Yu, Y. & Liu, J., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 486-506 21 p. (Lecture Notes in Computer Science; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Time-dependent decision-making and decentralization in Proof-of-Work Cryptocurrencies

Zolotavkin, Y., Garcia, J. & Liu, J., 2019, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. Delaune, S. & Jia, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 108-121 14 p. 8823663

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards multi-user searchable encryption supporting Boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W., Baek, J., You, I. & Chen, X., 28 Mar 2019, In : Journal of Universal Computer Science. 25, 3, p. 222-244 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2 Citations (Scopus)
2018

Access control encryption with efficient verifiable sanitized decryption

Wang, H., Chen, K., Liu, J. K., Hu, Z. & Long, Y., Oct 2018, In : Information Sciences. 465, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Adding confidential transactions to cryptocurrency IOTA with Bulletproofs

Ince, P., Liu, J. K. & Zhang, P., 2018, Network and System Security : 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland: Springer, p. 32-45 14 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

A multi-client dynamic searchable symmetric encryption system with physical deletion

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security : 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 516-528 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

54 Citations (Scopus)

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

36 Citations (Scopus)

Attribute-based hybrid boolean keyword search over outsourced encrypted data

He, K., Guo, J., Weng, J., Weng, J., Liu, J. K. & Yi, X., 6 Aug 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Compact ring signature in the standard model for blockchain

Ren, H., Zhang, P., Shentu, Q., Liu, J. K. & Yuen, T. H., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 50-65 16 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 228-246 19 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

Expressive attribute-based keyword search with constant-size ciphertext

Han, J., Yang, Y., Liu, J. K., Li, J., Liang, K. & Shen, J., Aug 2018, In : Soft Computing. 22, 15, p. 5163-5177 15 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Zuo, C., Shao, J., Liu, J. K., Wei, G. & Ling, Y., Jan 2018, In : IEEE Transactions on Information Forensics and Security. 13, 1, p. 186-196 11 p.

Research output: Contribution to journalArticleResearchpeer-review

23 Citations (Scopus)

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018 Guangzhou, China, November 15–17, 2018 Proceedings, Part IV. Vaidya, J. & Li, J. (eds.). Cham Switzerland: Springer, p. 85-97 13 p. (Lecture Notes in Computer Science ; vol. 11337 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption

Li, Y., Tao, X., Wu, W. & Liu, J. K., 2018, In : International Journal of Embedded Systems. 10, 1, p. 62-70 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2 Citations (Scopus)

IoTChain: establishing trust in the Internet of Things ecosystem using Blockchain

Yu, B., Wright, J., Nepal, S., Zhu, L., Liu, J. & Ranjan, R., Jul 2018, In : IEEE Cloud Computing. 5, 4, p. 12-23 12 p.

Research output: Contribution to journalArticleOther

34 Citations (Scopus)

Leakage-resilient chosen-ciphertext secure functional encryption from garbled circuits

Wang, H., Chen, K., Liu, J. K. & Hu, Z., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 119-140 22 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Monero ring attack: recreating zero mixin transaction effect

Wijaya, D. A., Liu, J., Steinfeld, R. & Liu, D., 5 Sep 2018, Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1196-1201 6 p. 8456034

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Platform-independent secure blockchain-based voting system

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P. & Au, M. H., 2018, Information Security: 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science ; vol. 11060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

Position paper on blockchain technology: smart contract and applications

Meng, W., Wang, J., Wang, X., Liu, J., Yu, Z., Li, J., Zhao, Y. & Chow, S. S. M., 2018, Network and System Security: 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland : Springer, p. 474-483 10 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)