Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jiwu Jing
@article{DBLP:journals/tdsc/WangSLWJWL24, author = {Jie Wang and Kun Sun and Lingguang Lei and Yuewu Wang and Jiwu Jing and Shengye Wan and Qi Li}, title = {CacheIEE: Cache-Assisted Isolated Execution Environment on {ARM} Multi-Core Platforms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {254--269}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3251418}, doi = {10.1109/TDSC.2023.3251418}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangSLWJWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QiaoYSHJ23, author = {Wenxiao Qiao and Hailun Yan and Siwei Sun and Lei Hu and Jiwu Jing}, title = {New cryptanalysis of LowMC with algebraic techniques}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2057--2075}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01178-1}, doi = {10.1007/S10623-022-01178-1}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/ChenMJ23, author = {Zhaohui Chen and Yuan Ma and Jiwu Jing}, title = {Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {42}, number = {1}, pages = {322--326}, year = {2023}, url = {https://doi.org/10.1109/TCAD.2022.3174142}, doi = {10.1109/TCAD.2022.3174142}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/ChenMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangCJ23, author = {Feng Yang and Hui Cui and Jiwu Jing}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Generic Constructions of Server-Aided Revocable {ABE} with Verifiable Transformation}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {459--479}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_25}, doi = {10.1007/978-3-031-41181-6\_25}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/YangCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/BianZWLMDJ23, author = {Yi Bian and Fangyu Zheng and Yuewu Wang and Lingguang Lei and Yuan Ma and Jiankuo Dong and Jiwu Jing}, title = {AsyncGBP: Unleashing the Potential of Heterogeneous Computing for {SSL/TLS} with GPU-based Provider}, booktitle = {Proceedings of the 52nd International Conference on Parallel Processing, {ICPP} 2023, Salt Lake City, UT, USA, August 7-10, 2023}, pages = {337--346}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605573.3605620}, doi = {10.1145/3605573.3605620}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpp/BianZWLMDJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangYWJ22, author = {Mingyue Wang and Shen Yan and Wei Wang and Jiwu Jing}, title = {Secure zero-effort two-factor authentication based on time-frequency audio analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {237--261}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050306}, doi = {10.1504/IJICS.2022.10050306}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangYWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLCWZJ22, author = {Ze Wang and Jingqiang Lin and Quanwei Cai and Qiongxiao Wang and Daren Zha and Jiwu Jing}, title = {Blockchain-Based Certificate Transparency and Revocation Transparency}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {681--697}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2983022}, doi = {10.1109/TDSC.2020.2983022}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangLCWZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiaZXJL22, author = {Shijie Jia and Qionglu Zhang and Luning Xia and Jiwu Jing and Peng Liu}, title = {{MDEFTL:} Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3494--3507}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3100897}, doi = {10.1109/TDSC.2021.3100897}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiaZXJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLWJZ22, author = {Yanchu Li and Lingguang Lei and Yuewu Wang and Jiwu Jing and Quan Zhou}, title = {TrustSAMP: Securing Streaming Music Against Multivector Attacks on {ARM} Platform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1709--1724}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3170274}, doi = {10.1109/TIFS.2022.3170274}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLWJZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LiLLWWLCJW22, author = {Bingyu Li and Jingqiang Lin and Fengjun Li and Qiongxiao Wang and Wei Wang and Qi Li and Guangshen Cheng and Jiwu Jing and Congli Wang}, title = {The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {30}, number = {2}, pages = {749--765}, year = {2022}, url = {https://doi.org/10.1109/TNET.2021.3123507}, doi = {10.1109/TNET.2021.3123507}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/LiLLWWLCJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGHJHZY22, author = {Siwei Sun and Tianyu Liu and Zhi Guan and Yifei He and Jiwu Jing and Lei Hu and Zhenfeng Zhang and Hailun Yan}, title = {{LMS-SM3} and {HSS-SM3:} Instantiating Hash-based Post-Quantum Signature Schemes with {SM3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1491}, year = {2022}, url = {https://eprint.iacr.org/2022/1491}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGHJHZY22a, author = {Siwei Sun and Tianyu Liu and Zhi Guan and Yifei He and Jiwu Jing and Lei Hu and Zhenfeng Zhang and Hailun Yan}, title = {{XMSS-SM3} and {MT-XMSS-SM3:} Instantiating Extended Merkle Signature Schemes with {SM3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1552}, year = {2022}, url = {https://eprint.iacr.org/2022/1552}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/ChenMCLJ21, author = {Zhaohui Chen and Yuan Ma and Tianyu Chen and Jingqiang Lin and Jiwu Jing}, title = {High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs}, journal = {Integr.}, volume = {78}, pages = {25--35}, year = {2021}, url = {https://doi.org/10.1016/j.vlsi.2020.12.005}, doi = {10.1016/J.VLSI.2020.12.005}, timestamp = {Thu, 08 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/integration/ChenMCLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/ChenML0LJ21, author = {Tianyu Chen and Yuan Ma and Jingqiang Lin and Yuan Cao and Na Lv and Jiwu Jing}, title = {A Lightweight Full Entropy {TRNG} With On-Chip Entropy Assurance}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {40}, number = {12}, pages = {2431--2444}, year = {2021}, url = {https://doi.org/10.1109/TCAD.2021.3096464}, doi = {10.1109/TCAD.2021.3096464}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/ChenML0LJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiGLLCJW21, author = {Congwu Li and Le Guan and Jingqiang Lin and Bo Luo and Quanwei Cai and Jiwu Jing and Jing Wang}, title = {Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1196--1213}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2897666}, doi = {10.1109/TDSC.2019.2897666}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiGLLCJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangLSWJHW21, author = {Huan Chang and Lingguang Lei and Kun Sun and Yuewu Wang and Jiwu Jing and Yi He and Pingjian Wang}, title = {Vulnerable Service Invocation and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1733--1750}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2936848}, doi = {10.1109/TDSC.2019.2936848}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangLSWJHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLWWJ21, author = {Bingyu Li and Jingqiang Lin and Qiongxiao Wang and Ze Wang and Jiwu Jing}, title = {Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1380--1395}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3035265}, doi = {10.1109/TIFS.2020.3035265}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLWWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/ChenKAMJ21, author = {Zhaohui Chen and Emre Karabulut and Aydin Aysu and Yuan Ma and Jiwu Jing}, title = {An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature}, booktitle = {39th {IEEE} International Conference on Computer Design, {ICCD} 2021, Storrs, CT, USA, October 24-27, 2021}, pages = {583--590}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCD53106.2021.00094}, doi = {10.1109/ICCD53106.2021.00094}, timestamp = {Tue, 28 Dec 2021 14:09:48 +0100}, biburl = {https://dblp.org/rec/conf/iccd/ChenKAMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmai2/LiJL21, author = {Chang Li and Jiwu Jing and Yuheng Liu}, title = {Mobile user authentication-Turn it to unlock}, booktitle = {{ICMAI} 2021: 6th International Conference on Mathematics and Artificial Intelligence, Chengdu, China, March 19 - 21, 2021}, pages = {101--107}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460569.3460577}, doi = {10.1145/3460569.3460577}, timestamp = {Wed, 27 Sep 2023 13:41:06 +0200}, biburl = {https://dblp.org/rec/conf/icmai2/LiJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-10396, author = {Chengqian Guo and Jingqiang Lin and Quanwei Cai and Fengjun Li and Qiongxiao Wang and Jiwu Jing and Bin Zhao and Wei Wang}, title = {{UPPRESSO:} Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services}, journal = {CoRR}, volume = {abs/2110.10396}, year = {2021}, url = {https://arxiv.org/abs/2110.10396}, eprinttype = {arXiv}, eprint = {2110.10396}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-10396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvCZYMJL20a, author = {Na Lv and Tianyu Chen and Shuangyi Zhu and Jing Yang and Yuan Ma and Jiwu Jing and Jingqiang Lin}, title = {Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators"}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {3451823:1--3451823:1}, year = {2020}, url = {https://doi.org/10.1155/2020/3451823}, doi = {10.1155/2020/3451823}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LvCZYMJL20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvCZYMJL20, author = {Na Lv and Tianyu Chen and Shuangyi Zhu and Jing Yang and Yuan Ma and Jiwu Jing and Jingqiang Lin}, title = {High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {4241713:1--4241713:18}, year = {2020}, url = {https://doi.org/10.1155/2020/4241713}, doi = {10.1155/2020/4241713}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LvCZYMJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuMLYLJ20, author = {Shuangyi Zhu and Yuan Ma and Xusheng Li and Jing Yang and Jingqiang Lin and Jiwu Jing}, title = {On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1696--1708}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2947871}, doi = {10.1109/TIFS.2019.2947871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuMLYLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/ChenMCLJ20, author = {Zhaohui Chen and Yuan Ma and Tianyu Chen and Jingqiang Lin and Jiwu Jing}, title = {Towards Efficient Kyber on FPGAs: {A} Processor for Vector of Polynomials}, booktitle = {25th Asia and South Pacific Design Automation Conference, {ASP-DAC} 2020, Beijing, China, January 13-16, 2020}, pages = {247--252}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ASP-DAC47756.2020.9045459}, doi = {10.1109/ASP-DAC47756.2020.9045459}, timestamp = {Mon, 30 Mar 2020 12:39:40 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/ChenMCLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wang0LWWJ20, author = {Jie Wang and Kun Sun and Lingguang Lei and Shengye Wan and Yuewu Wang and Jiwu Jing}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Cache-in-the-Middle {(CITM)} Attacks: Manipulating Sensitive Data in Isolated Execution Environments}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1001--1015}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417886}, doi = {10.1145/3372297.3417886}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wang0LWWJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YouCLJ20, author = {Weijing You and Bo Chen and Limin Liu and Jiwu Jing}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {67--87}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_4}, doi = {10.1007/978-3-030-58951-6\_4}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YouCLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/WangWL0JZ20, author = {Jie Wang and Yuewu Wang and Lingguang Lei and Kun Sun and Jiwu Jing and Quan Zhou}, editor = {Jin Nakazawa and Polly Huang}, title = {TrustICT: an efficient trusted interaction interface between isolated execution domains on {ARM} multi-core processors}, booktitle = {SenSys '20: The 18th {ACM} Conference on Embedded Networked Sensor Systems, Virtual Event, Japan, November 16-19, 2020}, pages = {271--284}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384419.3430718}, doi = {10.1145/3384419.3430718}, timestamp = {Wed, 04 May 2022 13:03:25 +0200}, biburl = {https://dblp.org/rec/conf/sensys/WangWL0JZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangWLJZ20, author = {Shan Liang and Yuewu Wang and Lingguang Lei and Jiwu Jing and Quan Zhou}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {SecureESFS: Sharing Android External Storage Files in {A} Securer Way}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1339--1347}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00180}, doi = {10.1109/TRUSTCOM50675.2020.00180}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiangWLJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Ma0LLJ19, author = {Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Bo Luo and Jiwu Jing}, title = {Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers}, journal = {J. Comput. Secur.}, volume = {27}, number = {5}, pages = {547--580}, year = {2019}, url = {https://doi.org/10.3233/JCS-191296}, doi = {10.3233/JCS-191296}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Ma0LLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaCLYJ19, author = {Yuan Ma and Tianyu Chen and Jingqiang Lin and Jing Yang and Jiwu Jing}, title = {Entropy Estimation for {ADC} Sampling-Based True Random Number Generators}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {11}, pages = {2887--2900}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2908798}, doi = {10.1109/TIFS.2019.2908798}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaCLYJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLLWLJW19, author = {Bingyu Li and Jingqiang Lin and Fengjun Li and Qiongxiao Wang and Qi Li and Jiwu Jing and Congli Wang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Certificate Transparency in the Wild: Exploring the Reliability of Monitors}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2505--2520}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345653}, doi = {10.1145/3319535.3345653}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiLLWLJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Ma0LJYM19, author = {Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Jiwu Jing and Dingfeng Ye and Lingjia Meng}, editor = {Zhe Liu and Moti Yung}, title = {Evaluating the Cache Side Channel Attacks Against {ECDSA}}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {325--345}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_19}, doi = {10.1007/978-3-030-42921-8\_19}, timestamp = {Mon, 06 Apr 2020 19:10:55 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Ma0LJYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChuWLLJ019, author = {Dawei Chu and Yuewu Wang and Lingguang Lei and Yanchu Li and Jiwu Jing and Kun Sun}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {412--438}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_20}, doi = {10.1007/978-3-030-29962-0\_20}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChuWLLJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuanLMLXJ18, author = {Le Guan and Jingqiang Lin and Ziqiang Ma and Bo Luo and Luning Xia and Jiwu Jing}, title = {Copker: {A} Cryptographic Engine Against Cold-Boot Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {742--754}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2631548}, doi = {10.1109/TDSC.2016.2631548}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuanLMLXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LinLWJ0Z18, author = {Xin Lin and Lingguang Lei and Yuewu Wang and Jiwu Jing and Kun Sun and Quan Zhou}, title = {A Measurement Study on Linux Container Security: Attacks and Countermeasures}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {418--429}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274720}, doi = {10.1145/3274694.3274720}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LinLWJ0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/WangLCWJZ18, author = {Ze Wang and Jingqiang Lin and Quanwei Cai and Qiongxiao Wang and Jiwu Jing and Daren Zha}, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Blockchain-Based Certificate Transparency and Revocation Transparency}, booktitle = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, pages = {144--162}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58820-8\_11}, doi = {10.1007/978-3-662-58820-8\_11}, timestamp = {Wed, 16 Mar 2022 23:55:54 +0100}, biburl = {https://dblp.org/rec/conf/fc/WangLCWJZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DongZPLJZ17, author = {Jiankuo Dong and Fangyu Zheng and Wuqiong Pan and Jingqiang Lin and Jiwu Jing and Yuan Zhao}, title = {Utilizing the Double-Precision Floating-Point Computing Power of GPUs for {RSA} Acceleration}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {3508786:1--3508786:15}, year = {2017}, url = {https://doi.org/10.1155/2017/3508786}, doi = {10.1155/2017/3508786}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DongZPLJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PanZZZJ17, author = {Wuqiong Pan and Fangyu Zheng and Yuan Zhao and Wen Tao Zhu and Jiwu Jing}, title = {An Efficient Elliptic Curve Cryptography Signature Server With {GPU} Acceleration}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {111--122}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2603974}, doi = {10.1109/TIFS.2016.2603974}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PanZZZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhuMCLJ17, author = {Shuangyi Zhu and Yuan Ma and Tianyu Chen and Jingqiang Lin and Jiwu Jing}, title = {Analysis and Improvement of Entropy Estimators in {NIST} {SP} 800-90B for Non-IID Entropy Sources}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {151--168}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.151-168}, doi = {10.13154/TOSC.V2017.I3.151-168}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhuMCLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeiHSJWLW17, author = {Lingguang Lei and Yi He and Kun Sun and Jiwu Jing and Yuewu Wang and Qi Li and Jian Weng}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Vulnerable Implicit Service: {A} Revisit}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1051--1063}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133975}, doi = {10.1145/3133956.3133975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeiHSJWLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MaLJ17, author = {Yuan Ma and Jingqiang Lin and Jiwu Jing}, editor = {Helena Handschuh}, title = {On the Entropy of Oscillator-Based True Random Number Generators}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {165--180}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_10}, doi = {10.1007/978-3-319-52153-4\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MaLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LinLGJ16, author = {Jingqiang Lin and Bo Luo and Le Guan and Jiwu Jing}, title = {Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {63--70}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.130}, doi = {10.1109/MSP.2016.130}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LinLGJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhuMLZJ16, author = {Shuangyi Zhu and Yuan Ma and Jingqiang Lin and Jia Zhuang and Jiwu Jing}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {More Powerful and Reliable Second-Level Statistical Randomness Tests for {NIST} {SP} 800-22}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {307--329}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_11}, doi = {10.1007/978-3-662-53887-6\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhuMLZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LiuZMLJ16, author = {Zongbin Liu and Qinglong Zhang and Cunqing Ma and Changting Li and Jiwu Jing}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {{HPAZ:} {A} high-throughput pipeline architecture of {ZUC} in hardware}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {269--272}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459319/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/LiuZMLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangMCLJ16, author = {Jing Yang and Yuan Ma and Tianyu Chen and Jingqiang Lin and Jiwu Jing}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {Extracting More Entropy for TRNGs Based on Coherent Sampling}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {694--709}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_38}, doi = {10.1007/978-3-319-59608-2\_38}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/YangMCLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuMLZJ16, author = {Shuangyi Zhu and Yuan Ma and Jingqiang Lin and Jia Zhuang and Jiwu Jing}, title = {More Powerful and Reliable Second-level Statistical Randomness Tests for {NIST} {SP} 800-22}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2016}, url = {http://eprint.iacr.org/2016/863}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuMLZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaLJ16, author = {Yuan Ma and Jingqiang Lin and Jiwu Jing}, title = {On the Entropy of Oscillator-Based True Random Number Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1091}, year = {2016}, url = {http://eprint.iacr.org/2016/1091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LinZWZJG15, author = {Jingqiang Lin and Wen Tao Zhu and Qiongxiao Wang and Nan Zhang and Jiwu Jing and Neng Gao}, title = {{RIKE+} : using revocable identities to support key escrow in public key infrastructures with flexibility}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {2}, pages = {136--147}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2013.0552}, doi = {10.1049/IET-IFS.2013.0552}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LinZWZJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunSWJ15, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing}, title = {Reliable and Trustworthy Memory Acquisition on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2547--2561}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2467356}, doi = {10.1109/TIFS.2015.2467356}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunSWJ15, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {976--988}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813692}, doi = {10.1145/2810103.2813692}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhangLXJL15, author = {Zhongwen Zhang and Peng Liu and Ji Xiang and Jiwu Jing and Lingguang Lei}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {99--110}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699103}, doi = {10.1145/2699026.2699103}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhangLXJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/ChenMLWJ15, author = {Tianyu Chen and Yuan Ma and Jingqiang Lin and Zhan Wang and Jiwu Jing}, title = {An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test}, booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015}, pages = {515--517}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSCloud.2015.10}, doi = {10.1109/CSCLOUD.2015.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/ChenMLWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SunSWJW15, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing and Haining Wang}, title = {TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {367--378}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.11}, doi = {10.1109/DSN.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SunSWJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Bit Error Probability Evaluation of {RO} PUFs}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {421--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_23}, doi = {10.1007/978-3-319-23318-5\_23}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {347--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_21}, doi = {10.1007/978-3-319-22425-1\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangSWJ15, author = {Xueqiang Wang and Kun Sun and Yuewu Wang and Jiwu Jing}, title = {DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/deepdroid-dynamically-enforcing-enterprise-policy-android-devices}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GuanLLJW15, author = {Le Guan and Jingqiang Lin and Bo Luo and Jiwu Jing and Jing Wang}, title = {Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {3--19}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.8}, doi = {10.1109/SP.2015.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GuanLLJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2014-1, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23829-6}, doi = {10.1007/978-3-319-23829-6}, isbn = {978-3-319-23828-9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2014-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2014-2, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23802-9}, doi = {10.1007/978-3-319-23802-9}, isbn = {978-3-319-23801-2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2014-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLMLJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Changting Li and Jiwu Jing}, title = {{FROPUF:} How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2015}, url = {http://eprint.iacr.org/2015/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLMLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangWJWL14, author = {Zhongwen Zhang and Yuewu Wang and Jiwu Jing and Qiongxiao Wang and Lingguang Lei}, editor = {Willy Susilo and Yi Mu}, title = {Once Root Always a Threat: Analyzing the Security Threats of Android Permission System}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {354--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_23}, doi = {10.1007/978-3-319-08344-5\_23}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangWJWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLLXJ14, author = {Qinglong Zhang and Zongbin Liu and Miao Li and Ji Xiang and Jiwu Jing}, editor = {Willy Susilo and Yi Mu}, title = {A High-Throughput Unrolled {ZUC} Core for 100Gbps Data Transmission}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {370--385}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_24}, doi = {10.1007/978-3-319-08344-5\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLLXJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuWSZGJ14, author = {Xingjie Yu and Zhan Wang and Kun Sun and Wen Tao Zhu and Neng Gao and Jiwu Jing}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Remotely wiping sensitive data on stolen smartphones}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {537--542}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590318}, doi = {10.1145/2590296.2590318}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuWSZGJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaLCXLJ14, author = {Yuan Ma and Jingqiang Lin and Tianyu Chen and Changwei Xu and Zongbin Liu and Jiwu Jing}, editor = {Lejla Batina and Matthew Robshaw}, title = {Entropy Evaluation for Oscillator-Based True Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {544--561}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_30}, doi = {10.1007/978-3-662-44709-3\_30}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MaLCXLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SunSWJJ14, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing and Sushil Jajodia}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {TrustDump: Reliable Memory Acquisition on Smartphones}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {202--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_12}, doi = {10.1007/978-3-319-11203-9\_12}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SunSWJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangS0J14, author = {Lingchen Zhang and Sachin Shetty and Peng Liu and Jiwu Jing}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {475--493}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_27}, doi = {10.1007/978-3-319-11212-1\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangS0J14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangWLLJ14, author = {Xueqiang Wang and Yuewu Wang and Limin Liu and Lingguang Lei and Jiwu Jing}, editor = {Jooyoung Lee and Jongsung Kim}, title = {WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {255--268}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_16}, doi = {10.1007/978-3-319-15943-0\_16}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WangWLLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/ShangZLXJ14, author = {Ming Shang and Qinglong Zhang and Zongbin Liu and Ji Xiang and Jiwu Jing}, title = {An Ultra-Compact Hardware Implementation of {SMS4}}, booktitle = {{IIAI} 3rd International Conference on Advanced Applied Informatics, {IIAI-AAI} 2014, Kokura Kita-ku, Japan, August 31 - Sept. 4, 2014}, pages = {86--90}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IIAI-AAI.2014.28}, doi = {10.1109/IIAI-AAI.2014.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/ShangZLXJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhengPLJZ14, author = {Fangyu Zheng and Wuqiong Pan and Jingqiang Lin and Jiwu Jing and Yuan Zhao}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Exploiting the Floating-Point Computing Power of GPUs for {RSA}}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {198--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_12}, doi = {10.1007/978-3-319-13257-0\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhengPLJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YuCWCZJ14, author = {Xingjie Yu and Bo Chen and Zhan Wang and Bing Chang and Wen Tao Zhu and Jiwu Jing}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {555--567}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_36}, doi = {10.1007/978-3-319-13257-0\_36}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YuCWCZJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GuanLLJ14, author = {Le Guan and Jingqiang Lin and Bo Luo and Jiwu Jing}, title = {Copker: Computing with Private Keys without {RAM}}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/copker-computing-private-keys-without-ram}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GuanLLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GuanLJWM14, author = {Le Guan and Fengjun Li and Jiwu Jing and Jing Wang and Ziqiang Ma}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {virtio-ct: {A} Secure Cryptographic Token Service in Hypervisors}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, pages = {285--300}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23802-9\_22}, doi = {10.1007/978-3-319-23802-9\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GuanLJWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhengPLJZ14, author = {Fangyu Zheng and Wuqiong Pan and Jingqiang Lin and Jiwu Jing and Yuan Zhao}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Exploiting the Potential of GPUs for Modular Multiplication in {ECC}}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {295--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_23}, doi = {10.1007/978-3-319-15087-1\_23}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhengPLJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/WangSJJ14, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Proof of Isolation for Cloud Storage}, booktitle = {Secure Cloud Computing}, pages = {95--121}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_5}, doi = {10.1007/978-1-4614-9278-8\_5}, timestamp = {Thu, 13 Feb 2020 15:16:45 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud14/WangSJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinLJW13, author = {Jingqiang Lin and Peng Liu and Jiwu Jing and Qiongxiao Wang}, title = {Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {612--630}, year = {2013}, url = {https://doi.org/10.1002/sec.593}, doi = {10.1002/SEC.593}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinLJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0005MJ13, author = {Peng Liu and Refik Molva and Jiwu Jing}, title = {Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1522--1523}, year = {2013}, url = {https://doi.org/10.1002/sec.947}, doi = {10.1002/SEC.947}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0005MJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangSJJ13, author = {Zhan Wang and Kun Sun and Jiwu Jing and Sushil Jajodia}, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {Verification of data redundancy in cloud storage}, booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, pages = {11--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484402.2484407}, doi = {10.1145/2484402.2484407}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangSJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangJL13, author = {Zhan Wang and Jiwu Jing and Liang Li}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Time evolving graphical password for securing mobile devices}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {347--352}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484358}, doi = {10.1145/2484313.2484358}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangSJJ13, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, editor = {Lingyu Wang and Basit Shafiq}, title = {TerraCheck: Verification of Dedicated Cloud Storage}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {113--127}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_8}, doi = {10.1007/978-3-642-39256-6\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/WangSJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangLLGJ13, author = {Jing Wang and Peng Liu and Limin Liu and Le Guan and Jiwu Jing}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Fingerprint Embedding: {A} Proactive Strategy of Detecting Timing Channels}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {229--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_17}, doi = {10.1007/978-3-319-02726-5\_17}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangLLGJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MaLPJ13, author = {Yuan Ma and Zongbin Liu and Wuqiong Pan and Jiwu Jing}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over {\textbackslash}mathrm p}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {421--437}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_21}, doi = {10.1007/978-3-662-43414-7\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MaLPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WangWXLGJ13, author = {Pingjian Wang and Lei Wang and Ji Xiang and Peng Liu and Neng Gao and Jiwu Jing}, title = {MJBlocker: {A} Lightweight and Run-Time Malicious JavaScript Extensions Blocker}, booktitle = {{IEEE} 7th International Conference on Software Security and Reliability, {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013}, pages = {119--128}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE.2013.14}, doi = {10.1109/SERE.2013.14}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/WangWXLGJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGJ013, author = {Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu}, title = {{HPAZ:} a High-throughput Pipeline Architecture of {ZUC} in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2013}, url = {http://eprint.iacr.org/2013/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGJ013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qre/LinJL12, author = {Jingqiang Lin and Jiwu Jing and Peng Liu}, title = {Evaluating Intrusion-Tolerant Certification Authority Systems}, journal = {Qual. Reliab. Eng. Int.}, volume = {28}, number = {8}, pages = {825--841}, year = {2012}, url = {https://doi.org/10.1002/qre.1270}, doi = {10.1002/QRE.1270}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qre/LinJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangLJG12, author = {Nan Zhang and Jingqiang Lin and Jiwu Jing and Neng Gao}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {{RIKE:} Using Revocable Identities to Support Key Escrow in PKIs}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {48--65}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_4}, doi = {10.1007/978-3-642-31284-7\_4}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangLJG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PanZYJ12, author = {Wuqiong Pan and Yulong Zhang and Meng Yu and Jiwu Jing}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Improving Virtualization Security by Splitting Hypervisor into Smaller Components}, booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, pages = {298--313}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4\_23}, doi = {10.1007/978-3-642-31540-4\_23}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/PanZYJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LinLJ12, author = {Jingqiang Lin and Peng Liu and Jiwu Jing}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {118--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_7}, doi = {10.1007/978-3-642-34266-0\_7}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LinLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangSJJ12, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, title = {Disk storage isolation and verification in cloud}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {771--776}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503206}, doi = {10.1109/GLOCOM.2012.6503206}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangSJJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaXLJLY12, author = {Yuan Ma and Luning Xia and Jingqiang Lin and Jiwu Jing and Zongbin Liu and Xingjie Yu}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Hardware Performance Optimization and Evaluation of {SM3} Hash Algorithm on {FPGA}}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {105--118}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_10}, doi = {10.1007/978-3-642-34129-8\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaXLJLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeiWJZY12, author = {Lingguang Lei and Yuewu Wang and Jiwu Jing and Zhongwen Zhang and Xingjie Yu}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {MeadDroid: Detecting Monetary Theft Attacks in Android by {DVM} Monitoring}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {78--91}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_7}, doi = {10.1007/978-3-642-37682-5\_7}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LeiWJZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangXJZ12, author = {Lei Wang and Ji Xiang and Jiwu Jing and Lingchen Zhang}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Towards Fine-Grained Access Control on Browser Extensions}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {158--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_11}, doi = {10.1007/978-3-642-29101-2\_11}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WangXJZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LinLJZ12, author = {Jingqiang Lin and Bo Luo and Jiwu Jing and Xiaokun Zhang}, title = {{GRADE:} Graceful Degradation in Byzantine Quorum Systems}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {171--180}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.34}, doi = {10.1109/SRDS.2012.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/LinLJZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXLJM12, author = {Lingchen Zhang and Luning Xia and Zongbin Liu and Jiwu Jing and Yuan Ma}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Evaluating the Optimized Implementations of {SNOW3G} and {ZUC} on {FPGA}}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {436--442}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.150}, doi = {10.1109/TRUSTCOM.2012.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXLJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWJZ12, author = {Wentao Wang and Yuewu Wang and Jiwu Jing and Zhongwen Zhang}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {A Scalable Anonymity Scheme Based on {DHT} Distributed Inquiry}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {1358--1363}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.55}, doi = {10.1109/TRUSTCOM.2012.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWJZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZhouJXW12, author = {Jian Zhou and Jiwu Jing and Ji Xiang and Lei Wang}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Preserving Social Network Publication on Bipartite Graphs}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {58--70}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_7}, doi = {10.1007/978-3-642-30955-7\_7}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ZhouJXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangJLJ11, author = {Shengzhi Zhang and Xiaoqi Jia and Peng Liu and Jiwu Jing}, title = {{PEDA:} Comprehensive Damage Assessment for Production Environment Server Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {4}, pages = {1323--1334}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2162062}, doi = {10.1109/TIFS.2011.2162062}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangJLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PanJXLY11, author = {Wuqiong Pan and Jiwu Jing and Luning Xia and Zongbin Liu and Meng Yu}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {An Efficient {RSA} Implementation without Precomputation}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {251--268}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_19}, doi = {10.1007/978-3-642-34704-7\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PanJXLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangJLZP11, author = {Lei Wang and Jiwu Jing and Zongbin Liu and Lingchen Zhang and Wuqiong Pan}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Evaluating Optimized Implementations of Stream Cipher {ZUC} Algorithm on {FPGA}}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {202--215}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_17}, doi = {10.1007/978-3-642-25243-3\_17}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangJLZP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LvJLJT11, author = {Chunli Lv and Xiaoqi Jia and Jingqiang Lin and Jiwu Jing and Lijun Tian}, editor = {Feng Bao and Jian Weng}, title = {An Efficient Group-Based Secret Sharing Scheme}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {288--301}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_22}, doi = {10.1007/978-3-642-21031-0\_22}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LvJLJT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiuXJL11, author = {Zongbin Liu and Luning Xia and Jiwu Jing and Peng Liu}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {105--113}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/LvJLJTS11, author = {Chunli Lv and Xiaoqi Jia and Jingqiang Lin and Jiwu Jing and Lijun Tian and Mingli Sun}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Efficient Secret Sharing Schemes}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {114--121}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_14}, doi = {10.1007/978-3-642-22339-6\_14}, timestamp = {Mon, 08 Apr 2019 12:52:12 +0200}, biburl = {https://dblp.org/rec/conf/sta/LvJLJTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuHGJZ11, author = {Limin Liu and Jin Han and Debin Gao and Jiwu Jing and Daren Zha}, title = {Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.9}, doi = {10.1109/TRUSTCOM.2011.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuHGJZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuFJ11, author = {Mei Liu and Ge Fu and Jiwu Jing}, title = {eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {745--750}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.97}, doi = {10.1109/TRUSTCOM.2011.97}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuFJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangJL11, author = {Nan Zhang and Jiwu Jing and Peng Liu}, title = {{CLOUD} {SHREDDER:} Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {1592--1599}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.221}, doi = {10.1109/TRUSTCOM.2011.221}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2009, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16342-5}, doi = {10.1007/978-3-642-16342-5}, isbn = {978-3-642-16341-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JhiLLGJK10, author = {Yoon{-}chan Jhi and Peng Liu and Lunquan Li and Qijun Gu and Jiwu Jing and George Kesidis}, title = {{PWC:} a proactive worm containment solution for enterprise networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {4}, pages = {334--354}, year = {2010}, url = {https://doi.org/10.1002/sec.112}, doi = {10.1002/SEC.112}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/WangJL10, author = {Qiongxiao Wang and Jiwu Jing and Jingqiang Lin}, title = {A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {596--603}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.123}, doi = {10.1109/CIT.2010.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/WangJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/JiaSJL10, author = {Xiaoqi Jia and Jun Shao and Jiwu Jing and Peng Liu}, title = {CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1299--1305}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.234}, doi = {10.1109/CIT.2010.234}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/JiaSJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangJLJ10, author = {Shengzhi Zhang and Xiaoqi Jia and Peng Liu and Jiwu Jing}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Cross-layer comprehensive intrusion harm analysis for production workload server systems}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {297--306}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920306}, doi = {10.1145/1920261.1920306}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangJLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ZhaJLLJ10, author = {Daren Zha and Jiwu Jing and Peng Liu and Jingqiang Lin and Xiaoqi Jia}, editor = {David Taniar and Osvaldo Gervasi and Beniamino Murgante and Eric Pardede and Bernady O. Apduhan}, title = {Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control}, booktitle = {Computational Science and Its Applications - {ICCSA} 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {6019}, pages = {468--481}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12189-0\_41}, doi = {10.1007/978-3-642-12189-0\_41}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ZhaJLLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iitsi/WangLJX10, author = {Pingjian Wang and Jingqiang Lin and Jiwu Jing and Yongquan Xie}, title = {Mediated Hierarchical Identity-Based Combined Public Key Schemes}, booktitle = {Third International Symposium on Intelligent Information Technology and Security Informatics, {IITSI} 2010, Jinggangshan, China, April 2-4, 2010}, pages = {614--618}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IITSI.2010.20}, doi = {10.1109/IITSI.2010.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iitsi/WangLJX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JiaXJL10, author = {Xiaoqi Jia and Xi Xiong and Jiwu Jing and Peng Liu}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Using Purpose Capturing Signatures to Defeat Computer Virus Mutating}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {153--171}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_12}, doi = {10.1007/978-3-642-12827-1\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JiaXJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuJL10, author = {Zongbin Liu and Jiwu Jing and Peng Liu}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Rate-Based Watermark Traceback: {A} New Approach}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {172--186}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_13}, doi = {10.1007/978-3-642-12827-1\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhaJK10, author = {Daren Zha and Jiwu Jing and Le Kang}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Mitigating the Malicious Trust Expansion in Social Network Service}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {264--275}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_20}, doi = {10.1007/978-3-642-12827-1\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhaJK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LvJTJS10, author = {Chunli Lv and Xiaoqi Jia and Lijun Tian and Jiwu Jing and Mingli Sun}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Efficient Ideal Threshold Secret Sharing Schemes Based on {EXCLUSIVE-OR} Operations}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {136--143}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.82}, doi = {10.1109/NSS.2010.82}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/LvJTJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LinLJW10, author = {Jingqiang Lin and Peng Liu and Jiwu Jing and Qiongxiao Wang}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {307--325}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_18}, doi = {10.1007/978-3-642-16161-2\_18}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/LinLJW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/NieJW09, author = {Xiaofeng Nie and Jiwu Jing and Yuewu Wang}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {313--323}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_23}, doi = {10.1007/978-3-642-16342-5\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/NieJW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetc/WangXJ09, author = {Jing Wang and Luning Xia and Jiwu Jing}, title = {An Ultra-kernel Model for Dedicated Security Systems}, booktitle = {2009 International Conference on Education Technology and Computer, {ICETC} 2009, Singapore, 17-20 April 2009}, pages = {122--127}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICETC.2009.18}, doi = {10.1109/ICETC.2009.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icetc/WangXJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anss/WangLJJ08, author = {Yuewu Wang and Peng Liu and Jiwu Jing and Xiaoqi Jia}, title = {A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application}, booktitle = {Proceedings 41st Annual Simulation Symposium {(ANSS-41} 2008), April 14-16, 2008, Ottawa, Canada}, pages = {308--318}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ANSS-41.2008.29}, doi = {10.1109/ANSS-41.2008.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anss/WangLJJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaZJL08, author = {Xiaoqi Jia and Shengzhi Zhang and Jiwu Jing and Peng Liu}, editor = {Jason Nieh and Angelos Stavrou}, title = {Using virtual machines to do cross-layer damage assessment}, booktitle = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {29--38}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456482.1456487}, doi = {10.1145/1456482.1456487}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiaZJL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/NieWJL08, author = {Xiaofeng Nie and Yuewu Wang and Jiwu Jing and Qi Liu}, title = {Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {863--867}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.610}, doi = {10.1109/CSSE.2008.610}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/NieWJL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/WuJL08, author = {Jingjing Wu and Jiwu Jing and Jingqiang Lin}, title = {A Decentralized Certification Authority Based on Real World Trust Relationships}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {1123--1126}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.644}, doi = {10.1109/CSSE.2008.644}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/WuJL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/LiuJW08, author = {Qi Liu and Jiwu Jing and Yuewu Wang}, title = {An Improved Method of Hybrid Worm Simulation}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {612--618}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.48}, doi = {10.1109/WAIM.2008.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/LiuJW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JhiLLGJK07, author = {Yoon{-}chan Jhi and Peng Liu and Lunquan Li and Qijun Gu and Jiwu Jing and George Kesidis}, title = {{PWC:} {A} proactive worm containment solution for enterprise networks}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {433--442}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550364}, doi = {10.1109/SECCOM.2007.4550364}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/JhiLLGJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LinJL07, author = {Jingqiang Lin and Jiwu Jing and Peng Liu}, title = {Framework for Intrusion Tolerant Certification Authority System Evaluation}, booktitle = {26th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2007), Beijing, China, October 10-12, 2007}, pages = {231--241}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SRDS.2007.14}, doi = {10.1109/SRDS.2007.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/LinJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/XiaJ06, author = {Luning Xia and Jiwu Jing}, title = {An Administrative Model for Role-Based Access Control Using Hierarchical Namespace}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala Lumpur, Malaysia, July 6-9, 2006}, pages = {30}, publisher = {AISeL}, year = {2006}, url = {http://aisel.aisnet.org/pacis2006/30}, timestamp = {Thu, 01 Mar 2012 19:27:42 +0100}, biburl = {https://dblp.org/rec/conf/pacis/XiaJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/LiuJLWLI04, author = {Peng Liu and Jiwu Jing and Pramote Luenam and Ying Wang and Lunquan Li and Supawadee Ingsriswang}, title = {The Design and Implementation of a Self-Healing Database System}, journal = {J. Intell. Inf. Syst.}, volume = {23}, number = {3}, pages = {247--269}, year = {2004}, url = {https://doi.org/10.1023/B:JIIS.0000047394.02444.8d}, doi = {10.1023/B:JIIS.0000047394.02444.8D}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/LiuJLWLI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Jing0FXGL03, author = {Jiwu Jing and Peng Liu and Dengguo Feng and Ji Xiang and Neng Gao and Jingqiang Lin}, editor = {Peng Liu and Partha P. Pal}, title = {{ARECA:} a highly attack resilient certification authority}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Survivable and Self-Regenerative Systems, in Association with 10th {ACM} Conference on Computer and Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October 31, 2003}, pages = {53--63}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1036921.1036927}, doi = {10.1145/1036921.1036927}, timestamp = {Fri, 20 Jan 2023 16:46:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Jing0FXGL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.