Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Jiwu Jing

download as .bib file

@article{DBLP:journals/tdsc/WangSLWJWL24,
  author       = {Jie Wang and
                  Kun Sun and
                  Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Shengye Wan and
                  Qi Li},
  title        = {CacheIEE: Cache-Assisted Isolated Execution Environment on {ARM} Multi-Core
                  Platforms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {254--269},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3251418},
  doi          = {10.1109/TDSC.2023.3251418},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangSLWJWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QiaoYSHJ23,
  author       = {Wenxiao Qiao and
                  Hailun Yan and
                  Siwei Sun and
                  Lei Hu and
                  Jiwu Jing},
  title        = {New cryptanalysis of LowMC with algebraic techniques},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2057--2075},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01178-1},
  doi          = {10.1007/S10623-022-01178-1},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/ChenMJ23,
  author       = {Zhaohui Chen and
                  Yuan Ma and
                  Jiwu Jing},
  title        = {Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for
                  NTT-Based Post-Quantum Cryptography},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {42},
  number       = {1},
  pages        = {322--326},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCAD.2022.3174142},
  doi          = {10.1109/TCAD.2022.3174142},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/ChenMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangCJ23,
  author       = {Feng Yang and
                  Hui Cui and
                  Jiwu Jing},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Generic Constructions of Server-Aided Revocable {ABE} with Verifiable
                  Transformation},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {459--479},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_25},
  doi          = {10.1007/978-3-031-41181-6\_25},
  timestamp    = {Mon, 16 Oct 2023 19:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YangCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/BianZWLMDJ23,
  author       = {Yi Bian and
                  Fangyu Zheng and
                  Yuewu Wang and
                  Lingguang Lei and
                  Yuan Ma and
                  Jiankuo Dong and
                  Jiwu Jing},
  title        = {AsyncGBP: Unleashing the Potential of Heterogeneous Computing for
                  {SSL/TLS} with GPU-based Provider},
  booktitle    = {Proceedings of the 52nd International Conference on Parallel Processing,
                  {ICPP} 2023, Salt Lake City, UT, USA, August 7-10, 2023},
  pages        = {337--346},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605573.3605620},
  doi          = {10.1145/3605573.3605620},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpp/BianZWLMDJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangYWJ22,
  author       = {Mingyue Wang and
                  Shen Yan and
                  Wei Wang and
                  Jiwu Jing},
  title        = {Secure zero-effort two-factor authentication based on time-frequency
                  audio analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {237--261},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050306},
  doi          = {10.1504/IJICS.2022.10050306},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangYWJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLCWZJ22,
  author       = {Ze Wang and
                  Jingqiang Lin and
                  Quanwei Cai and
                  Qiongxiao Wang and
                  Daren Zha and
                  Jiwu Jing},
  title        = {Blockchain-Based Certificate Transparency and Revocation Transparency},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {681--697},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2983022},
  doi          = {10.1109/TDSC.2020.2983022},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLCWZJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiaZXJL22,
  author       = {Shijie Jia and
                  Qionglu Zhang and
                  Luning Xia and
                  Jiwu Jing and
                  Peng Liu},
  title        = {{MDEFTL:} Incorporating Multi-Snapshot Plausible Deniability into
                  Flash Translation Layer},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3494--3507},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3100897},
  doi          = {10.1109/TDSC.2021.3100897},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiaZXJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLWJZ22,
  author       = {Yanchu Li and
                  Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Quan Zhou},
  title        = {TrustSAMP: Securing Streaming Music Against Multivector Attacks on
                  {ARM} Platform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1709--1724},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3170274},
  doi          = {10.1109/TIFS.2022.3170274},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLWJZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LiLLWWLCJW22,
  author       = {Bingyu Li and
                  Jingqiang Lin and
                  Fengjun Li and
                  Qiongxiao Wang and
                  Wei Wang and
                  Qi Li and
                  Guangshen Cheng and
                  Jiwu Jing and
                  Congli Wang},
  title        = {The Invisible Side of Certificate Transparency: Exploring the Reliability
                  of Monitors in the Wild},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {30},
  number       = {2},
  pages        = {749--765},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNET.2021.3123507},
  doi          = {10.1109/TNET.2021.3123507},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/LiLLWWLCJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGHJHZY22,
  author       = {Siwei Sun and
                  Tianyu Liu and
                  Zhi Guan and
                  Yifei He and
                  Jiwu Jing and
                  Lei Hu and
                  Zhenfeng Zhang and
                  Hailun Yan},
  title        = {{LMS-SM3} and {HSS-SM3:} Instantiating Hash-based Post-Quantum Signature
                  Schemes with {SM3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1491},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1491},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGHJHZY22a,
  author       = {Siwei Sun and
                  Tianyu Liu and
                  Zhi Guan and
                  Yifei He and
                  Jiwu Jing and
                  Lei Hu and
                  Zhenfeng Zhang and
                  Hailun Yan},
  title        = {{XMSS-SM3} and {MT-XMSS-SM3:} Instantiating Extended Merkle Signature
                  Schemes with {SM3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1552},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1552},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/ChenMCLJ21,
  author       = {Zhaohui Chen and
                  Yuan Ma and
                  Tianyu Chen and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber
                  on FPGAs},
  journal      = {Integr.},
  volume       = {78},
  pages        = {25--35},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vlsi.2020.12.005},
  doi          = {10.1016/J.VLSI.2020.12.005},
  timestamp    = {Thu, 08 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/integration/ChenMCLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/ChenML0LJ21,
  author       = {Tianyu Chen and
                  Yuan Ma and
                  Jingqiang Lin and
                  Yuan Cao and
                  Na Lv and
                  Jiwu Jing},
  title        = {A Lightweight Full Entropy {TRNG} With On-Chip Entropy Assurance},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {40},
  number       = {12},
  pages        = {2431--2444},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCAD.2021.3096464},
  doi          = {10.1109/TCAD.2021.3096464},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/ChenML0LJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiGLLCJW21,
  author       = {Congwu Li and
                  Le Guan and
                  Jingqiang Lin and
                  Bo Luo and
                  Quanwei Cai and
                  Jiwu Jing and
                  Jing Wang},
  title        = {Mimosa: Protecting Private Keys Against Memory Disclosure Attacks
                  Using Hardware Transactional Memory},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1196--1213},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2897666},
  doi          = {10.1109/TDSC.2019.2897666},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiGLLCJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangLSWJHW21,
  author       = {Huan Chang and
                  Lingguang Lei and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing and
                  Yi He and
                  Pingjian Wang},
  title        = {Vulnerable Service Invocation and Countermeasures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1733--1750},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2936848},
  doi          = {10.1109/TDSC.2019.2936848},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChangLSWJHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLWWJ21,
  author       = {Bingyu Li and
                  Jingqiang Lin and
                  Qiongxiao Wang and
                  Ze Wang and
                  Jiwu Jing},
  title        = {Locally-Centralized Certificate Validation and its Application in
                  Desktop Virtualization Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {1380--1395},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3035265},
  doi          = {10.1109/TIFS.2020.3035265},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLWWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/ChenKAMJ21,
  author       = {Zhaohui Chen and
                  Emre Karabulut and
                  Aydin Aysu and
                  Yuan Ma and
                  Jiwu Jing},
  title        = {An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium
                  Post-Quantum Signature},
  booktitle    = {39th {IEEE} International Conference on Computer Design, {ICCD} 2021,
                  Storrs, CT, USA, October 24-27, 2021},
  pages        = {583--590},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCD53106.2021.00094},
  doi          = {10.1109/ICCD53106.2021.00094},
  timestamp    = {Tue, 28 Dec 2021 14:09:48 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/ChenKAMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmai2/LiJL21,
  author       = {Chang Li and
                  Jiwu Jing and
                  Yuheng Liu},
  title        = {Mobile user authentication-Turn it to unlock},
  booktitle    = {{ICMAI} 2021: 6th International Conference on Mathematics and Artificial
                  Intelligence, Chengdu, China, March 19 - 21, 2021},
  pages        = {101--107},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460569.3460577},
  doi          = {10.1145/3460569.3460577},
  timestamp    = {Wed, 27 Sep 2023 13:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/icmai2/LiJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-10396,
  author       = {Chengqian Guo and
                  Jingqiang Lin and
                  Quanwei Cai and
                  Fengjun Li and
                  Qiongxiao Wang and
                  Jiwu Jing and
                  Bin Zhao and
                  Wei Wang},
  title        = {{UPPRESSO:} Untraceable and Unlinkable Privacy-PREserving Single Sign-On
                  Services},
  journal      = {CoRR},
  volume       = {abs/2110.10396},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.10396},
  eprinttype    = {arXiv},
  eprint       = {2110.10396},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-10396.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvCZYMJL20a,
  author       = {Na Lv and
                  Tianyu Chen and
                  Shuangyi Zhu and
                  Jing Yang and
                  Yuan Ma and
                  Jiwu Jing and
                  Jingqiang Lin},
  title        = {Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural
                  Network for Random Number Generators"},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {3451823:1--3451823:1},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/3451823},
  doi          = {10.1155/2020/3451823},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LvCZYMJL20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvCZYMJL20,
  author       = {Na Lv and
                  Tianyu Chen and
                  Shuangyi Zhu and
                  Jing Yang and
                  Yuan Ma and
                  Jiwu Jing and
                  Jingqiang Lin},
  title        = {High-Efficiency Min-Entropy Estimation Based on Neural Network for
                  Random Number Generators},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {4241713:1--4241713:18},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/4241713},
  doi          = {10.1155/2020/4241713},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LvCZYMJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuMLYLJ20,
  author       = {Shuangyi Zhu and
                  Yuan Ma and
                  Xusheng Li and
                  Jing Yang and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying
                  Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1696--1708},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2947871},
  doi          = {10.1109/TIFS.2019.2947871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuMLYLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/ChenMCLJ20,
  author       = {Zhaohui Chen and
                  Yuan Ma and
                  Tianyu Chen and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {Towards Efficient Kyber on FPGAs: {A} Processor for Vector of Polynomials},
  booktitle    = {25th Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2020, Beijing, China, January 13-16, 2020},
  pages        = {247--252},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ASP-DAC47756.2020.9045459},
  doi          = {10.1109/ASP-DAC47756.2020.9045459},
  timestamp    = {Mon, 30 Mar 2020 12:39:40 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/ChenMCLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wang0LWWJ20,
  author       = {Jie Wang and
                  Kun Sun and
                  Lingguang Lei and
                  Shengye Wan and
                  Yuewu Wang and
                  Jiwu Jing},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Cache-in-the-Middle {(CITM)} Attacks: Manipulating Sensitive Data
                  in Isolated Execution Environments},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1001--1015},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417886},
  doi          = {10.1145/3372297.3417886},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wang0LWWJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YouCLJ20,
  author       = {Weijing You and
                  Bo Chen and
                  Limin Liu and
                  Jiwu Jing},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Deduplication-Friendly Watermarking for Multimedia Data in Public
                  Clouds},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {67--87},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_4},
  doi          = {10.1007/978-3-030-58951-6\_4},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YouCLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/WangWL0JZ20,
  author       = {Jie Wang and
                  Yuewu Wang and
                  Lingguang Lei and
                  Kun Sun and
                  Jiwu Jing and
                  Quan Zhou},
  editor       = {Jin Nakazawa and
                  Polly Huang},
  title        = {TrustICT: an efficient trusted interaction interface between isolated
                  execution domains on {ARM} multi-core processors},
  booktitle    = {SenSys '20: The 18th {ACM} Conference on Embedded Networked Sensor
                  Systems, Virtual Event, Japan, November 16-19, 2020},
  pages        = {271--284},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384419.3430718},
  doi          = {10.1145/3384419.3430718},
  timestamp    = {Wed, 04 May 2022 13:03:25 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/WangWL0JZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangWLJZ20,
  author       = {Shan Liang and
                  Yuewu Wang and
                  Lingguang Lei and
                  Jiwu Jing and
                  Quan Zhou},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {SecureESFS: Sharing Android External Storage Files in {A} Securer
                  Way},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1339--1347},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00180},
  doi          = {10.1109/TRUSTCOM50675.2020.00180},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangWLJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Ma0LLJ19,
  author       = {Ziqiang Ma and
                  Quanwei Cai and
                  Jingqiang Lin and
                  Bo Luo and
                  Jiwu Jing},
  title        = {Towards the optimal performance of integrating Warm and Delay against
                  remote cache timing side channels on block ciphers},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {5},
  pages        = {547--580},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191296},
  doi          = {10.3233/JCS-191296},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Ma0LLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaCLYJ19,
  author       = {Yuan Ma and
                  Tianyu Chen and
                  Jingqiang Lin and
                  Jing Yang and
                  Jiwu Jing},
  title        = {Entropy Estimation for {ADC} Sampling-Based True Random Number Generators},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {11},
  pages        = {2887--2900},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2908798},
  doi          = {10.1109/TIFS.2019.2908798},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaCLYJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiLLWLJW19,
  author       = {Bingyu Li and
                  Jingqiang Lin and
                  Fengjun Li and
                  Qiongxiao Wang and
                  Qi Li and
                  Jiwu Jing and
                  Congli Wang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Certificate Transparency in the Wild: Exploring the Reliability of
                  Monitors},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2505--2520},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345653},
  doi          = {10.1145/3319535.3345653},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiLLWLJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Ma0LJYM19,
  author       = {Ziqiang Ma and
                  Quanwei Cai and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Dingfeng Ye and
                  Lingjia Meng},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Evaluating the Cache Side Channel Attacks Against {ECDSA}},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {325--345},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_19},
  doi          = {10.1007/978-3-030-42921-8\_19},
  timestamp    = {Mon, 06 Apr 2020 19:10:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Ma0LJYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChuWLLJ019,
  author       = {Dawei Chu and
                  Yuewu Wang and
                  Lingguang Lei and
                  Yanchu Li and
                  Jiwu Jing and
                  Kun Sun},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {412--438},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_20},
  doi          = {10.1007/978-3-030-29962-0\_20},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChuWLLJ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuanLMLXJ18,
  author       = {Le Guan and
                  Jingqiang Lin and
                  Ziqiang Ma and
                  Bo Luo and
                  Luning Xia and
                  Jiwu Jing},
  title        = {Copker: {A} Cryptographic Engine Against Cold-Boot Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {742--754},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2631548},
  doi          = {10.1109/TDSC.2016.2631548},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuanLMLXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LinLWJ0Z18,
  author       = {Xin Lin and
                  Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Kun Sun and
                  Quan Zhou},
  title        = {A Measurement Study on Linux Container Security: Attacks and Countermeasures},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {418--429},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274720},
  doi          = {10.1145/3274694.3274720},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LinLWJ0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/WangLCWJZ18,
  author       = {Ze Wang and
                  Jingqiang Lin and
                  Quanwei Cai and
                  Qiongxiao Wang and
                  Jiwu Jing and
                  Daren Zha},
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Blockchain-Based Certificate Transparency and Revocation Transparency},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  pages        = {144--162},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58820-8\_11},
  doi          = {10.1007/978-3-662-58820-8\_11},
  timestamp    = {Wed, 16 Mar 2022 23:55:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/WangLCWJZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DongZPLJZ17,
  author       = {Jiankuo Dong and
                  Fangyu Zheng and
                  Wuqiong Pan and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Yuan Zhao},
  title        = {Utilizing the Double-Precision Floating-Point Computing Power of GPUs
                  for {RSA} Acceleration},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {3508786:1--3508786:15},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/3508786},
  doi          = {10.1155/2017/3508786},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DongZPLJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PanZZZJ17,
  author       = {Wuqiong Pan and
                  Fangyu Zheng and
                  Yuan Zhao and
                  Wen Tao Zhu and
                  Jiwu Jing},
  title        = {An Efficient Elliptic Curve Cryptography Signature Server With {GPU}
                  Acceleration},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {111--122},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2603974},
  doi          = {10.1109/TIFS.2016.2603974},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PanZZZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhuMCLJ17,
  author       = {Shuangyi Zhu and
                  Yuan Ma and
                  Tianyu Chen and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {Analysis and Improvement of Entropy Estimators in {NIST} {SP} 800-90B
                  for Non-IID Entropy Sources},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {151--168},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.151-168},
  doi          = {10.13154/TOSC.V2017.I3.151-168},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhuMCLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeiHSJWLW17,
  author       = {Lingguang Lei and
                  Yi He and
                  Kun Sun and
                  Jiwu Jing and
                  Yuewu Wang and
                  Qi Li and
                  Jian Weng},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Vulnerable Implicit Service: {A} Revisit},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1051--1063},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133975},
  doi          = {10.1145/3133956.3133975},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeiHSJWLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MaLJ17,
  author       = {Yuan Ma and
                  Jingqiang Lin and
                  Jiwu Jing},
  editor       = {Helena Handschuh},
  title        = {On the Entropy of Oscillator-Based True Random Number Generators},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_10},
  doi          = {10.1007/978-3-319-52153-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MaLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LinLGJ16,
  author       = {Jingqiang Lin and
                  Bo Luo and
                  Le Guan and
                  Jiwu Jing},
  title        = {Secure Computing Using Registers and Caches: The Problem, Challenges,
                  and Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {63--70},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.130},
  doi          = {10.1109/MSP.2016.130},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LinLGJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhuMLZJ16,
  author       = {Shuangyi Zhu and
                  Yuan Ma and
                  Jingqiang Lin and
                  Jia Zhuang and
                  Jiwu Jing},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {More Powerful and Reliable Second-Level Statistical Randomness Tests
                  for {NIST} {SP} 800-22},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {307--329},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_11},
  doi          = {10.1007/978-3-662-53887-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhuMLZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LiuZMLJ16,
  author       = {Zongbin Liu and
                  Qinglong Zhang and
                  Cunqing Ma and
                  Changting Li and
                  Jiwu Jing},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {{HPAZ:} {A} high-throughput pipeline architecture of {ZUC} in hardware},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {269--272},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459319/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LiuZMLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangMCLJ16,
  author       = {Jing Yang and
                  Yuan Ma and
                  Tianyu Chen and
                  Jingqiang Lin and
                  Jiwu Jing},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {Extracting More Entropy for TRNGs Based on Coherent Sampling},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {694--709},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_38},
  doi          = {10.1007/978-3-319-59608-2\_38},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangMCLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuMLZJ16,
  author       = {Shuangyi Zhu and
                  Yuan Ma and
                  Jingqiang Lin and
                  Jia Zhuang and
                  Jiwu Jing},
  title        = {More Powerful and Reliable Second-level Statistical Randomness Tests
                  for {NIST} {SP} 800-22},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/863},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuMLZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaLJ16,
  author       = {Yuan Ma and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {On the Entropy of Oscillator-Based True Random Number Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1091},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LinZWZJG15,
  author       = {Jingqiang Lin and
                  Wen Tao Zhu and
                  Qiongxiao Wang and
                  Nan Zhang and
                  Jiwu Jing and
                  Neng Gao},
  title        = {{RIKE+} : using revocable identities to support key escrow in public
                  key infrastructures with flexibility},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {136--147},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0552},
  doi          = {10.1049/IET-IFS.2013.0552},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LinZWZJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunSWJ15,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing},
  title        = {Reliable and Trustworthy Memory Acquisition on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2547--2561},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2467356},
  doi          = {10.1109/TIFS.2015.2467356},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunSWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunSWJ15,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {976--988},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813692},
  doi          = {10.1145/2810103.2813692},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunSWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhangLXJL15,
  author       = {Zhongwen Zhang and
                  Peng Liu and
                  Ji Xiang and
                  Jiwu Jing and
                  Lingguang Lei},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation
                  Attacks against Android Camera Service},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699103},
  doi          = {10.1145/2699026.2699103},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhangLXJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/ChenMLWJ15,
  author       = {Tianyu Chen and
                  Yuan Ma and
                  Jingqiang Lin and
                  Zhan Wang and
                  Jiwu Jing},
  title        = {An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness
                  Test},
  booktitle    = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2015, New York, NY, USA, November 3-5, 2015},
  pages        = {515--517},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSCloud.2015.10},
  doi          = {10.1109/CSCLOUD.2015.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/ChenMLWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SunSWJW15,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing and
                  Haining Wang},
  title        = {TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile
                  Devices},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {367--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.11},
  doi          = {10.1109/DSN.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SunSWJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Bit Error Probability Evaluation of {RO} PUFs},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_23},
  doi          = {10.1007/978-3-319-23318-5\_23},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {347--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_21},
  doi          = {10.1007/978-3-319-22425-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangSWJ15,
  author       = {Xueqiang Wang and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing},
  title        = {DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/deepdroid-dynamically-enforcing-enterprise-policy-android-devices},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangSWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GuanLLJW15,
  author       = {Le Guan and
                  Jingqiang Lin and
                  Bo Luo and
                  Jiwu Jing and
                  Jing Wang},
  title        = {Protecting Private Keys against Memory Disclosure Attacks Using Hardware
                  Transactional Memory},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {3--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.8},
  doi          = {10.1109/SP.2015.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GuanLLJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2014-1,
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23829-6},
  doi          = {10.1007/978-3-319-23829-6},
  isbn         = {978-3-319-23828-9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2014-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2014-2,
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23802-9},
  doi          = {10.1007/978-3-319-23802-9},
  isbn         = {978-3-319-23801-2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2014-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLMLJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Changting Li and
                  Jiwu Jing},
  title        = {{FROPUF:} How to Extract More Entropy from Two Ring Oscillators in
                  FPGA-Based PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLMLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangWJWL14,
  author       = {Zhongwen Zhang and
                  Yuewu Wang and
                  Jiwu Jing and
                  Qiongxiao Wang and
                  Lingguang Lei},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Once Root Always a Threat: Analyzing the Security Threats of Android
                  Permission System},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {354--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_23},
  doi          = {10.1007/978-3-319-08344-5\_23},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangWJWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLLXJ14,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Miao Li and
                  Ji Xiang and
                  Jiwu Jing},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {A High-Throughput Unrolled {ZUC} Core for 100Gbps Data Transmission},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {370--385},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_24},
  doi          = {10.1007/978-3-319-08344-5\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLLXJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuWSZGJ14,
  author       = {Xingjie Yu and
                  Zhan Wang and
                  Kun Sun and
                  Wen Tao Zhu and
                  Neng Gao and
                  Jiwu Jing},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Remotely wiping sensitive data on stolen smartphones},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {537--542},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590318},
  doi          = {10.1145/2590296.2590318},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuWSZGJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaLCXLJ14,
  author       = {Yuan Ma and
                  Jingqiang Lin and
                  Tianyu Chen and
                  Changwei Xu and
                  Zongbin Liu and
                  Jiwu Jing},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Entropy Evaluation for Oscillator-Based True Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {544--561},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_30},
  doi          = {10.1007/978-3-662-44709-3\_30},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MaLCXLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SunSWJJ14,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing and
                  Sushil Jajodia},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {TrustDump: Reliable Memory Acquisition on Smartphones},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {202--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_12},
  doi          = {10.1007/978-3-319-11203-9\_12},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SunSWJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangS0J14,
  author       = {Lingchen Zhang and
                  Sachin Shetty and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {RootkitDet: Practical End-to-End Defense against Kernel Rootkits in
                  a Cloud Environment},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {475--493},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_27},
  doi          = {10.1007/978-3-319-11212-1\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangS0J14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangWLLJ14,
  author       = {Xueqiang Wang and
                  Yuewu Wang and
                  Limin Liu and
                  Lingguang Lei and
                  Jiwu Jing},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors
                  of Android Apps},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {255--268},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_16},
  doi          = {10.1007/978-3-319-15943-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangWLLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/ShangZLXJ14,
  author       = {Ming Shang and
                  Qinglong Zhang and
                  Zongbin Liu and
                  Ji Xiang and
                  Jiwu Jing},
  title        = {An Ultra-Compact Hardware Implementation of {SMS4}},
  booktitle    = {{IIAI} 3rd International Conference on Advanced Applied Informatics,
                  {IIAI-AAI} 2014, Kokura Kita-ku, Japan, August 31 - Sept. 4, 2014},
  pages        = {86--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IIAI-AAI.2014.28},
  doi          = {10.1109/IIAI-AAI.2014.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/ShangZLXJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhengPLJZ14,
  author       = {Fangyu Zheng and
                  Wuqiong Pan and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Yuan Zhao},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Exploiting the Floating-Point Computing Power of GPUs for {RSA}},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_12},
  doi          = {10.1007/978-3-319-13257-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhengPLJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YuCWCZJ14,
  author       = {Xingjie Yu and
                  Bo Chen and
                  Zhan Wang and
                  Bing Chang and
                  Wen Tao Zhu and
                  Jiwu Jing},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption
                  Storage for Mobile Devices},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {555--567},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_36},
  doi          = {10.1007/978-3-319-13257-0\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YuCWCZJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GuanLLJ14,
  author       = {Le Guan and
                  Jingqiang Lin and
                  Bo Luo and
                  Jiwu Jing},
  title        = {Copker: Computing with Private Keys without {RAM}},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/copker-computing-private-keys-without-ram},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GuanLLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GuanLJWM14,
  author       = {Le Guan and
                  Fengjun Li and
                  Jiwu Jing and
                  Jing Wang and
                  Ziqiang Ma},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {virtio-ct: {A} Secure Cryptographic Token Service in Hypervisors},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  pages        = {285--300},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23802-9\_22},
  doi          = {10.1007/978-3-319-23802-9\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GuanLJWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhengPLJZ14,
  author       = {Fangyu Zheng and
                  Wuqiong Pan and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Yuan Zhao},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Exploiting the Potential of GPUs for Modular Multiplication in {ECC}},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {295--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_23},
  doi          = {10.1007/978-3-319-15087-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhengPLJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/securecloud14/WangSJJ14,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Proof of Isolation for Cloud Storage},
  booktitle    = {Secure Cloud Computing},
  pages        = {95--121},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8\_5},
  doi          = {10.1007/978-1-4614-9278-8\_5},
  timestamp    = {Thu, 13 Feb 2020 15:16:45 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud14/WangSJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinLJW13,
  author       = {Jingqiang Lin and
                  Peng Liu and
                  Jiwu Jing and
                  Qiongxiao Wang},
  title        = {Impossibility of finding any third family of server protocols integrating
                  Byzantine quorum systems with threshold signature schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {612--630},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.593},
  doi          = {10.1002/SEC.593},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinLJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/0005MJ13,
  author       = {Peng Liu and
                  Refik Molva and
                  Jiwu Jing},
  title        = {Special issue on "security and privacy in pervasive and ubiquitous
                  computing and communication systems"},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1522--1523},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.947},
  doi          = {10.1002/SEC.947},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0005MJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangSJJ13,
  author       = {Zhan Wang and
                  Kun Sun and
                  Jiwu Jing and
                  Sushil Jajodia},
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {Verification of data redundancy in cloud storage},
  booktitle    = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484402.2484407},
  doi          = {10.1145/2484402.2484407},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangSJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangJL13,
  author       = {Zhan Wang and
                  Jiwu Jing and
                  Liang Li},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Time evolving graphical password for securing mobile devices},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {347--352},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484358},
  doi          = {10.1145/2484313.2484358},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangSJJ13,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {TerraCheck: Verification of Dedicated Cloud Storage},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_8},
  doi          = {10.1007/978-3-642-39256-6\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangSJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangLLGJ13,
  author       = {Jing Wang and
                  Peng Liu and
                  Limin Liu and
                  Le Guan and
                  Jiwu Jing},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Fingerprint Embedding: {A} Proactive Strategy of Detecting Timing
                  Channels},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {229--244},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_17},
  doi          = {10.1007/978-3-319-02726-5\_17},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangLLGJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MaLPJ13,
  author       = {Yuan Ma and
                  Zongbin Liu and
                  Wuqiong Pan and
                  Jiwu Jing},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves
                  over {\textbackslash}mathrm p},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {421--437},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_21},
  doi          = {10.1007/978-3-662-43414-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MaLPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangWXLGJ13,
  author       = {Pingjian Wang and
                  Lei Wang and
                  Ji Xiang and
                  Peng Liu and
                  Neng Gao and
                  Jiwu Jing},
  title        = {MJBlocker: {A} Lightweight and Run-Time Malicious JavaScript Extensions
                  Blocker},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {119--128},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.14},
  doi          = {10.1109/SERE.2013.14},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangWXLGJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGJ013,
  author       = {Zongbin Liu and
                  Neng Gao and
                  Jiwu Jing and
                  Peng Liu},
  title        = {{HPAZ:} a High-throughput Pipeline Architecture of {ZUC} in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGJ013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qre/LinJL12,
  author       = {Jingqiang Lin and
                  Jiwu Jing and
                  Peng Liu},
  title        = {Evaluating Intrusion-Tolerant Certification Authority Systems},
  journal      = {Qual. Reliab. Eng. Int.},
  volume       = {28},
  number       = {8},
  pages        = {825--841},
  year         = {2012},
  url          = {https://doi.org/10.1002/qre.1270},
  doi          = {10.1002/QRE.1270},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qre/LinJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangLJG12,
  author       = {Nan Zhang and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Neng Gao},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {{RIKE:} Using Revocable Identities to Support Key Escrow in PKIs},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_4},
  doi          = {10.1007/978-3-642-31284-7\_4},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangLJG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PanZYJ12,
  author       = {Wuqiong Pan and
                  Yulong Zhang and
                  Meng Yu and
                  Jiwu Jing},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Improving Virtualization Security by Splitting Hypervisor into Smaller
                  Components},
  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  pages        = {298--313},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4\_23},
  doi          = {10.1007/978-3-642-31540-4\_23},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/PanZYJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LinLJ12,
  author       = {Jingqiang Lin and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Using Signaling Games to Model the Multi-step Attack-Defense Scenarios
                  on Confidentiality},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {118--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_7},
  doi          = {10.1007/978-3-642-34266-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LinLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangSJJ12,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  title        = {Disk storage isolation and verification in cloud},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {771--776},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503206},
  doi          = {10.1109/GLOCOM.2012.6503206},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangSJJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaXLJLY12,
  author       = {Yuan Ma and
                  Luning Xia and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Zongbin Liu and
                  Xingjie Yu},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Hardware Performance Optimization and Evaluation of {SM3} Hash Algorithm
                  on {FPGA}},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_10},
  doi          = {10.1007/978-3-642-34129-8\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaXLJLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeiWJZY12,
  author       = {Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Zhongwen Zhang and
                  Xingjie Yu},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {MeadDroid: Detecting Monetary Theft Attacks in Android by {DVM} Monitoring},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {78--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_7},
  doi          = {10.1007/978-3-642-37682-5\_7},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LeiWJZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangXJZ12,
  author       = {Lei Wang and
                  Ji Xiang and
                  Jiwu Jing and
                  Lingchen Zhang},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Towards Fine-Grained Access Control on Browser Extensions},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {158--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_11},
  doi          = {10.1007/978-3-642-29101-2\_11},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WangXJZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LinLJZ12,
  author       = {Jingqiang Lin and
                  Bo Luo and
                  Jiwu Jing and
                  Xiaokun Zhang},
  title        = {{GRADE:} Graceful Degradation in Byzantine Quorum Systems},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {171--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.34},
  doi          = {10.1109/SRDS.2012.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LinLJZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXLJM12,
  author       = {Lingchen Zhang and
                  Luning Xia and
                  Zongbin Liu and
                  Jiwu Jing and
                  Yuan Ma},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Evaluating the Optimized Implementations of {SNOW3G} and {ZUC} on
                  {FPGA}},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {436--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.150},
  doi          = {10.1109/TRUSTCOM.2012.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXLJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWJZ12,
  author       = {Wentao Wang and
                  Yuewu Wang and
                  Jiwu Jing and
                  Zhongwen Zhang},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {A Scalable Anonymity Scheme Based on {DHT} Distributed Inquiry},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1358--1363},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.55},
  doi          = {10.1109/TRUSTCOM.2012.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWJZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZhouJXW12,
  author       = {Jian Zhou and
                  Jiwu Jing and
                  Ji Xiang and
                  Lei Wang},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Privacy Preserving Social Network Publication on Bipartite Graphs},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {58--70},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_7},
  doi          = {10.1007/978-3-642-30955-7\_7},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ZhouJXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangJLJ11,
  author       = {Shengzhi Zhang and
                  Xiaoqi Jia and
                  Peng Liu and
                  Jiwu Jing},
  title        = {{PEDA:} Comprehensive Damage Assessment for Production Environment
                  Server Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {4},
  pages        = {1323--1334},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2162062},
  doi          = {10.1109/TIFS.2011.2162062},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangJLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PanJXLY11,
  author       = {Wuqiong Pan and
                  Jiwu Jing and
                  Luning Xia and
                  Zongbin Liu and
                  Meng Yu},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {An Efficient {RSA} Implementation without Precomputation},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {251--268},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_19},
  doi          = {10.1007/978-3-642-34704-7\_19},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/PanJXLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangJLZP11,
  author       = {Lei Wang and
                  Jiwu Jing and
                  Zongbin Liu and
                  Lingchen Zhang and
                  Wuqiong Pan},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Evaluating Optimized Implementations of Stream Cipher {ZUC} Algorithm
                  on {FPGA}},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {202--215},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_17},
  doi          = {10.1007/978-3-642-25243-3\_17},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangJLZP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LvJLJT11,
  author       = {Chunli Lv and
                  Xiaoqi Jia and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Lijun Tian},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {An Efficient Group-Based Secret Sharing Scheme},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {288--301},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_22},
  doi          = {10.1007/978-3-642-21031-0\_22},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LvJLJT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiuXJL11,
  author       = {Zongbin Liu and
                  Luning Xia and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {105--113},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/LvJLJTS11,
  author       = {Chunli Lv and
                  Xiaoqi Jia and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Lijun Tian and
                  Mingli Sun},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Efficient Secret Sharing Schemes},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {114--121},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_14},
  doi          = {10.1007/978-3-642-22339-6\_14},
  timestamp    = {Mon, 08 Apr 2019 12:52:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/LvJLJTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuHGJZ11,
  author       = {Limin Liu and
                  Jin Han and
                  Debin Gao and
                  Jiwu Jing and
                  Daren Zha},
  title        = {Launching Return-Oriented Programming Attacks against Randomized Relocatable
                  Executables},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.9},
  doi          = {10.1109/TRUSTCOM.2011.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuHGJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuFJ11,
  author       = {Mei Liu and
                  Ge Fu and
                  Jiwu Jing},
  title        = {eHCBAC: Flexible Column Based Access Control for Electronic Healthcare
                  Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {745--750},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.97},
  doi          = {10.1109/TRUSTCOM.2011.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuFJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangJL11,
  author       = {Nan Zhang and
                  Jiwu Jing and
                  Peng Liu},
  title        = {{CLOUD} {SHREDDER:} Removing the Laptop On-road Data Disclosure Threat
                  in the Cloud Computing Era},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1592--1599},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.221},
  doi          = {10.1109/TRUSTCOM.2011.221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2009,
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16342-5},
  doi          = {10.1007/978-3-642-16342-5},
  isbn         = {978-3-642-16341-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JhiLLGJK10,
  author       = {Yoon{-}chan Jhi and
                  Peng Liu and
                  Lunquan Li and
                  Qijun Gu and
                  Jiwu Jing and
                  George Kesidis},
  title        = {{PWC:} a proactive worm containment solution for enterprise networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {4},
  pages        = {334--354},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.112},
  doi          = {10.1002/SEC.112},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/WangJL10,
  author       = {Qiongxiao Wang and
                  Jiwu Jing and
                  Jingqiang Lin},
  title        = {A Secure Storage System Combining Secret Sharing Schemes and Byzantine
                  Quorum Mechanisms},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {596--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.123},
  doi          = {10.1109/CIT.2010.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/WangJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/JiaSJL10,
  author       = {Xiaoqi Jia and
                  Jun Shao and
                  Jiwu Jing and
                  Peng Liu},
  title        = {CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1299--1305},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.234},
  doi          = {10.1109/CIT.2010.234},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/JiaSJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangJLJ10,
  author       = {Shengzhi Zhang and
                  Xiaoqi Jia and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Cross-layer comprehensive intrusion harm analysis for production workload
                  server systems},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {297--306},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920306},
  doi          = {10.1145/1920261.1920306},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangJLJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ZhaJLLJ10,
  author       = {Daren Zha and
                  Jiwu Jing and
                  Peng Liu and
                  Jingqiang Lin and
                  Xiaoqi Jia},
  editor       = {David Taniar and
                  Osvaldo Gervasi and
                  Beniamino Murgante and
                  Eric Pardede and
                  Bernady O. Apduhan},
  title        = {Proactive Identification and Prevention of Unexpected Future Rule
                  Conflicts in Attribute Based Access Control},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2010, International
                  Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6019},
  pages        = {468--481},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12189-0\_41},
  doi          = {10.1007/978-3-642-12189-0\_41},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ZhaJLLJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iitsi/WangLJX10,
  author       = {Pingjian Wang and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Yongquan Xie},
  title        = {Mediated Hierarchical Identity-Based Combined Public Key Schemes},
  booktitle    = {Third International Symposium on Intelligent Information Technology
                  and Security Informatics, {IITSI} 2010, Jinggangshan, China, April
                  2-4, 2010},
  pages        = {614--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IITSI.2010.20},
  doi          = {10.1109/IITSI.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iitsi/WangLJX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JiaXJL10,
  author       = {Xiaoqi Jia and
                  Xi Xiong and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Using Purpose Capturing Signatures to Defeat Computer Virus Mutating},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {153--171},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_12},
  doi          = {10.1007/978-3-642-12827-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JiaXJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuJL10,
  author       = {Zongbin Liu and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Rate-Based Watermark Traceback: {A} New Approach},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_13},
  doi          = {10.1007/978-3-642-12827-1\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhaJK10,
  author       = {Daren Zha and
                  Jiwu Jing and
                  Le Kang},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Mitigating the Malicious Trust Expansion in Social Network Service},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {264--275},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_20},
  doi          = {10.1007/978-3-642-12827-1\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhaJK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LvJTJS10,
  author       = {Chunli Lv and
                  Xiaoqi Jia and
                  Lijun Tian and
                  Jiwu Jing and
                  Mingli Sun},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Efficient Ideal Threshold Secret Sharing Schemes Based on {EXCLUSIVE-OR}
                  Operations},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.82},
  doi          = {10.1109/NSS.2010.82},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/LvJTJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LinLJW10,
  author       = {Jingqiang Lin and
                  Peng Liu and
                  Jiwu Jing and
                  Qiongxiao Wang},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Impossibility of Finding Any Third Family of Server Protocols Integrating
                  Byzantine Quorum Systems with Threshold Signature Schemes},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {307--325},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_18},
  doi          = {10.1007/978-3-642-16161-2\_18},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LinLJW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/NieJW09,
  author       = {Xiaofeng Nie and
                  Jiwu Jing and
                  Yuewu Wang},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer
                  File-Sharing Worms},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {313--323},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_23},
  doi          = {10.1007/978-3-642-16342-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/NieJW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetc/WangXJ09,
  author       = {Jing Wang and
                  Luning Xia and
                  Jiwu Jing},
  title        = {An Ultra-kernel Model for Dedicated Security Systems},
  booktitle    = {2009 International Conference on Education Technology and Computer,
                  {ICETC} 2009, Singapore, 17-20 April 2009},
  pages        = {122--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICETC.2009.18},
  doi          = {10.1109/ICETC.2009.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icetc/WangXJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anss/WangLJJ08,
  author       = {Yuewu Wang and
                  Peng Liu and
                  Jiwu Jing and
                  Xiaoqi Jia},
  title        = {A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation
                  Model and Its Application},
  booktitle    = {Proceedings 41st Annual Simulation Symposium {(ANSS-41} 2008), April
                  14-16, 2008, Ottawa, Canada},
  pages        = {308--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ANSS-41.2008.29},
  doi          = {10.1109/ANSS-41.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anss/WangLJJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiaZJL08,
  author       = {Xiaoqi Jia and
                  Shengzhi Zhang and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Jason Nieh and
                  Angelos Stavrou},
  title        = {Using virtual machines to do cross-layer damage assessment},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456482.1456487},
  doi          = {10.1145/1456482.1456487},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiaZJL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/NieWJL08,
  author       = {Xiaofeng Nie and
                  Yuewu Wang and
                  Jiwu Jing and
                  Qi Liu},
  title        = {Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm
                  Propagation},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {863--867},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.610},
  doi          = {10.1109/CSSE.2008.610},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/NieWJL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/WuJL08,
  author       = {Jingjing Wu and
                  Jiwu Jing and
                  Jingqiang Lin},
  title        = {A Decentralized Certification Authority Based on Real World Trust
                  Relationships},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {1123--1126},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.644},
  doi          = {10.1109/CSSE.2008.644},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/WuJL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/LiuJW08,
  author       = {Qi Liu and
                  Jiwu Jing and
                  Yuewu Wang},
  title        = {An Improved Method of Hybrid Worm Simulation},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {612--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.48},
  doi          = {10.1109/WAIM.2008.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/LiuJW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JhiLLGJK07,
  author       = {Yoon{-}chan Jhi and
                  Peng Liu and
                  Lunquan Li and
                  Qijun Gu and
                  Jiwu Jing and
                  George Kesidis},
  title        = {{PWC:} {A} proactive worm containment solution for enterprise networks},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {433--442},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550364},
  doi          = {10.1109/SECCOM.2007.4550364},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/JhiLLGJK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LinJL07,
  author       = {Jingqiang Lin and
                  Jiwu Jing and
                  Peng Liu},
  title        = {Framework for Intrusion Tolerant Certification Authority System Evaluation},
  booktitle    = {26th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2007),
                  Beijing, China, October 10-12, 2007},
  pages        = {231--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SRDS.2007.14},
  doi          = {10.1109/SRDS.2007.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LinJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/XiaJ06,
  author       = {Luning Xia and
                  Jiwu Jing},
  title        = {An Administrative Model for Role-Based Access Control Using Hierarchical
                  Namespace},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala
                  Lumpur, Malaysia, July 6-9, 2006},
  pages        = {30},
  publisher    = {AISeL},
  year         = {2006},
  url          = {http://aisel.aisnet.org/pacis2006/30},
  timestamp    = {Thu, 01 Mar 2012 19:27:42 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/XiaJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/LiuJLWLI04,
  author       = {Peng Liu and
                  Jiwu Jing and
                  Pramote Luenam and
                  Ying Wang and
                  Lunquan Li and
                  Supawadee Ingsriswang},
  title        = {The Design and Implementation of a Self-Healing Database System},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {247--269},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:JIIS.0000047394.02444.8d},
  doi          = {10.1023/B:JIIS.0000047394.02444.8D},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/LiuJLWLI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jing0FXGL03,
  author       = {Jiwu Jing and
                  Peng Liu and
                  Dengguo Feng and
                  Ji Xiang and
                  Neng Gao and
                  Jingqiang Lin},
  editor       = {Peng Liu and
                  Partha P. Pal},
  title        = {{ARECA:} a highly attack resilient certification authority},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Survivable and Self-Regenerative
                  Systems, in Association with 10th {ACM} Conference on Computer and
                  Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October
                  31, 2003},
  pages        = {53--63},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1036921.1036927},
  doi          = {10.1145/1036921.1036927},
  timestamp    = {Fri, 20 Jan 2023 16:46:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Jing0FXGL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}