default search action
Jiwu Jing
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Jie Wang, Kun Sun, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, Qi Li:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. IEEE Trans. Dependable Secur. Comput. 21(1): 254-269 (2024) - [j31]Shouyin Xu, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, Siyuan Ma, Jie Wang, Heqing Huang:
Condo: Enhancing Container Isolation Through Kernel Permission Data Protection. IEEE Trans. Inf. Forensics Secur. 19: 6168-6183 (2024) - [c87]Junlin He, Lingguang Lei, Yuewu Wang, Pingjian Wang, Jiwu Jing:
ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme Based on RP Anonymization. ESORICS (2) 2024: 268-288 - [i8]Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, Yuewu Wang:
How to Recover the Full Plaintext of XCB. IACR Cryptol. ePrint Arch. 2024: 1527 (2024) - 2023
- [j30]Wenxiao Qiao, Hailun Yan, Siwei Sun, Lei Hu, Jiwu Jing:
New cryptanalysis of LowMC with algebraic techniques. Des. Codes Cryptogr. 91(5): 2057-2075 (2023) - [j29]Zhaohui Chen, Yuan Ma, Jiwu Jing:
Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(1): 322-326 (2023) - [c86]Feng Yang, Hui Cui, Jiwu Jing:
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation. ACNS Workshops 2023: 459-479 - [c85]Yi Bian, Fangyu Zheng, Yuewu Wang, Lingguang Lei, Yuan Ma, Jiankuo Dong, Jiwu Jing:
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider. ICPP 2023: 337-346 - 2022
- [j28]Mingyue Wang, Shen Yan, Wei Wang, Jiwu Jing:
Secure zero-effort two-factor authentication based on time-frequency audio analysis. Int. J. Inf. Comput. Secur. 18(3/4): 237-261 (2022) - [j27]Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 681-697 (2022) - [j26]Shijie Jia, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Trans. Dependable Secur. Comput. 19(5): 3494-3507 (2022) - [j25]Yanchu Li, Lingguang Lei, Yuewu Wang, Jiwu Jing, Quan Zhou:
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. IEEE Trans. Inf. Forensics Secur. 17: 1709-1724 (2022) - [j24]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE/ACM Trans. Netw. 30(2): 749-765 (2022) - [i7]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1491 (2022) - [i6]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1552 (2022) - 2021
- [j23]Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs. Integr. 78: 25-35 (2021) - [j22]Tianyu Chen, Yuan Ma, Jingqiang Lin, Yuan Cao, Na Lv, Jiwu Jing:
A Lightweight Full Entropy TRNG With On-Chip Entropy Assurance. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(12): 2431-2444 (2021) - [j21]Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, Jing Wang:
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Trans. Dependable Secur. Comput. 18(3): 1196-1213 (2021) - [j20]Huan Chang, Lingguang Lei, Kun Sun, Yuewu Wang, Jiwu Jing, Yi He, Pingjian Wang:
Vulnerable Service Invocation and Countermeasures. IEEE Trans. Dependable Secur. Comput. 18(4): 1733-1750 (2021) - [j19]Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing:
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. IEEE Trans. Inf. Forensics Secur. 16: 1380-1395 (2021) - [c84]Zhaohui Chen, Emre Karabulut, Aydin Aysu, Yuan Ma, Jiwu Jing:
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature. ICCD 2021: 583-590 - [c83]Chang Li, Jiwu Jing, Yuheng Liu:
Mobile user authentication-Turn it to unlock. ICMAI 2021: 101-107 - [i5]Chengqian Guo, Jingqiang Lin, Quanwei Cai, Fengjun Li, Qiongxiao Wang, Jiwu Jing, Bin Zhao, Wei Wang:
UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services. CoRR abs/2110.10396 (2021) - 2020
- [j18]Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". Secur. Commun. Networks 2020: 3451823:1-3451823:1 (2020) - [j17]Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. Secur. Commun. Networks 2020: 4241713:1-4241713:18 (2020) - [j16]Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE Trans. Inf. Forensics Secur. 15: 1696-1708 (2020) - [c82]Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials. ASP-DAC 2020: 247-252 - [c81]Jie Wang, Kun Sun, Lingguang Lei, Shengye Wan, Yuewu Wang, Jiwu Jing:
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments. CCS 2020: 1001-1015 - [c80]Weijing You, Bo Chen, Limin Liu, Jiwu Jing:
Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds. ESORICS (1) 2020: 67-87 - [c79]Jie Wang, Yuewu Wang, Lingguang Lei, Kun Sun, Jiwu Jing, Quan Zhou:
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors. SenSys 2020: 271-284 - [c78]Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou:
SecureESFS: Sharing Android External Storage Files in A Securer Way. TrustCom 2020: 1339-1347
2010 – 2019
- 2019
- [j15]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing:
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. J. Comput. Secur. 27(5): 547-580 (2019) - [j14]Yuan Ma, Tianyu Chen, Jingqiang Lin, Jing Yang, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE Trans. Inf. Forensics Secur. 14(11): 2887-2900 (2019) - [c77]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c76]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng:
Evaluating the Cache Side Channel Attacks Against ECDSA. Inscrypt 2019: 325-345 - [c75]Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, Kun Sun:
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. ESORICS (2) 2019: 412-438 - 2018
- [j13]Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE Trans. Dependable Secur. Comput. 15(5): 742-754 (2018) - [c74]Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun, Quan Zhou:
A Measurement Study on Linux Container Security: Attacks and Countermeasures. ACSAC 2018: 418-429 - [c73]Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, Daren Zha:
Blockchain-Based Certificate Transparency and Revocation Transparency. Financial Cryptography Workshops 2018: 144-162 - 2017
- [j12]Jiankuo Dong, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Secur. Commun. Networks 2017: 3508786:1-3508786:15 (2017) - [j11]Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Trans. Inf. Forensics Secur. 12(1): 111-122 (2017) - [j10]Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. IACR Trans. Symmetric Cryptol. 2017(3): 151-168 (2017) - [c72]Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng:
Vulnerable Implicit Service: A Revisit. CCS 2017: 1051-1063 - [c71]Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. CT-RSA 2017: 165-180 - 2016
- [j9]Jingqiang Lin, Bo Luo, Le Guan, Jiwu Jing:
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. IEEE Secur. Priv. 14(6): 63-70 (2016) - [c70]Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. ASIACRYPT (1) 2016: 307-329 - [c69]Zongbin Liu, Qinglong Zhang, Cunqing Ma, Changting Li, Jiwu Jing:
HPAZ: A high-throughput pipeline architecture of ZUC in hardware. DATE 2016: 269-272 - [c68]Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Extracting More Entropy for TRNGs Based on Coherent Sampling. SecureComm 2016: 694-709 - [i4]Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22. IACR Cryptol. ePrint Arch. 2016: 863 (2016) - [i3]Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. IACR Cryptol. ePrint Arch. 2016: 1091 (2016) - 2015
- [j8]Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao:
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. IET Inf. Secur. 9(2): 136-147 (2015) - [j7]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing:
Reliable and Trustworthy Memory Acquisition on Smartphones. IEEE Trans. Inf. Forensics Secur. 10(12): 2547-2561 (2015) - [c67]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing:
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens. CCS 2015: 976-988 - [c66]Zhongwen Zhang, Peng Liu, Ji Xiang, Jiwu Jing, Lingguang Lei:
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. CODASPY 2015: 99-110 - [c65]Tianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing:
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. CSCloud 2015: 515-517 - [c64]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang:
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. DSN 2015: 367-378 - [c63]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of RO PUFs. ISC 2015: 421-436 - [c62]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing:
Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). IWSEC 2015: 347-356 - [c61]Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing:
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. NDSS 2015 - [c60]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang:
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Symposium on Security and Privacy 2015: 3-19 - [e3]Jing Tian, Jiwu Jing, Mudhakar Srivatsa:
International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 152, Springer 2015, ISBN 978-3-319-23828-9 [contents] - [e2]Jing Tian, Jiwu Jing, Mudhakar Srivatsa:
International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 153, Springer 2015, ISBN 978-3-319-23801-2 [contents] - [i2]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. IACR Cryptol. ePrint Arch. 2015: 545 (2015) - 2014
- [c59]Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei:
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. ACISP 2014: 354-369 - [c58]Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing:
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. ACISP 2014: 370-385 - [c57]Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing:
Remotely wiping sensitive data on stolen smartphones. AsiaCCS 2014: 537-542 - [c56]Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing:
Entropy Evaluation for Oscillator-Based True Random Number Generators. CHES 2014: 544-561 - [c55]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia:
TrustDump: Reliable Memory Acquisition on Smartphones. ESORICS (1) 2014: 202-218 - [c54]Lingchen Zhang, Sachin Shetty, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. ESORICS (2) 2014: 475-493 - [c53]Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing:
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps. ICISC 2014: 255-268 - [c52]Ming Shang, Qinglong Zhang, Zongbin Liu, Ji Xiang, Jiwu Jing:
An Ultra-Compact Hardware Implementation of SMS4. IIAI-AAI 2014: 86-90 - [c51]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Floating-Point Computing Power of GPUs for RSA. ISC 2014: 198-215 - [c50]Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing:
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices. ISC 2014: 555-567 - [c49]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing:
Copker: Computing with Private Keys without RAM. NDSS 2014 - [c48]Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma:
virtio-ct: A Secure Cryptographic Token Service in Hypervisors. SecureComm (2) 2014: 285-300 - [c47]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Potential of GPUs for Modular Multiplication in ECC. WISA 2014: 295-306 - [p1]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
Proof of Isolation for Cloud Storage. Secure Cloud Computing 2014: 95-121 - 2013
- [j6]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. Secur. Commun. Networks 6(5): 612-630 (2013) - [j5]Peng Liu, Refik Molva, Jiwu Jing:
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems". Secur. Commun. Networks 6(12): 1522-1523 (2013) - [c46]Zhan Wang, Kun Sun, Jiwu Jing, Sushil Jajodia:
Verification of data redundancy in cloud storage. SCC@ASIACCS 2013: 11-18 - [c45]Zhan Wang, Jiwu Jing, Liang Li:
Time evolving graphical password for securing mobile devices. AsiaCCS 2013: 347-352 - [c44]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
TerraCheck: Verification of Dedicated Cloud Storage. DBSec 2013: 113-127 - [c43]Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing:
Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels. ICICS 2013: 229-244 - [c42]Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing:
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p. Selected Areas in Cryptography 2013: 421-437 - [c41]Pingjian Wang, Lei Wang, Ji Xiang, Peng Liu, Neng Gao, Jiwu Jing:
MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker. SERE 2013: 119-128 - [i1]Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu:
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware. IACR Cryptol. ePrint Arch. 2013: 461 (2013) - 2012
- [j4]Jingqiang Lin, Jiwu Jing, Peng Liu:
Evaluating Intrusion-Tolerant Certification Authority Systems. Qual. Reliab. Eng. Int. 28(8): 825-841 (2012) - [c40]Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao:
RIKE: Using Revocable Identities to Support Key Escrow in PKIs. ACNS 2012: 48-65 - [c39]Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing:
Improving Virtualization Security by Splitting Hypervisor into Smaller Components. DBSec 2012: 298-313 - [c38]Jingqiang Lin, Peng Liu, Jiwu Jing:
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. GameSec 2012: 118-137 - [c37]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
Disk storage isolation and verification in cloud. GLOBECOM 2012: 771-776 - [c36]Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu:
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. ICICS 2012: 105-118 - [c35]Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu:
MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. ICISC 2012: 78-91 - [c34]Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang:
Towards Fine-Grained Access Control on Browser Extensions. ISPEC 2012: 158-169 - [c33]Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang:
GRADE: Graceful Degradation in Byzantine Quorum Systems. SRDS 2012: 171-180 - [c32]Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma:
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. TrustCom 2012: 436-442 - [c31]Wentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang:
A Scalable Anonymity Scheme Based on DHT Distributed Inquiry. TrustCom 2012: 1358-1363 - [c30]Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang:
Privacy Preserving Social Network Publication on Bipartite Graphs. WISTP 2012: 58-70 - 2011
- [j3]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. IEEE Trans. Inf. Forensics Secur. 6(4): 1323-1334 (2011) - [c29]Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu:
An Efficient RSA Implementation without Precomputation. Inscrypt 2011: 251-268 - [c28]Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan:
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. ICICS 2011: 202-215 - [c27]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:
An Efficient Group-Based Secret Sharing Scheme. ISPEC 2011: 288-301 - [c26]Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu:
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. SECRYPT 2011: 105-113 - [c25]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun:
Efficient Secret Sharing Schemes. STA 2011: 114-121 - [c24]Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha:
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. TrustCom 2011: 37-44 - [c23]Mei Liu, Ge Fu, Jiwu Jing:
eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. TrustCom 2011: 745-750 - [c22]Nan Zhang, Jiwu Jing, Peng Liu:
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era. TrustCom 2011: 1592-1599 - [e1]Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing:
Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6151, Springer 2011, ISBN 978-3-642-16341-8 [contents] - 2010
- [j2]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: a proactive worm containment solution for enterprise networks. Secur. Commun. Networks 3(4): 334-354 (2010) - [c21]Qiongxiao Wang, Jiwu Jing, Jingqiang Lin:
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. CIT 2010: 596-603 - [c20]Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu:
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. CIT 2010: 1299-1305 - [c19]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
Cross-layer comprehensive intrusion harm analysis for production workload server systems. ACSAC 2010: 297-306 - [c18]Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia:
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. ICCSA (4) 2010: 468-481 - [c17]Pingjian Wang, Jingqiang Lin, Jiwu Jing, Yongquan Xie:
Mediated Hierarchical Identity-Based Combined Public Key Schemes. IITSI 2010: 614-618 - [c16]Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu:
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. ISPEC 2010: 153-171 - [c15]Zongbin Liu, Jiwu Jing, Peng Liu:
Rate-Based Watermark Traceback: A New Approach. ISPEC 2010: 172-186 - [c14]Daren Zha, Jiwu Jing, Le Kang:
Mitigating the Malicious Trust Expansion in Social Network Service. ISPEC 2010: 264-275 - [c13]Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun:
Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. NSS 2010: 136-143 - [c12]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SecureComm 2010: 307-325
2000 – 2009
- 2009
- [c11]Xiaofeng Nie, Jiwu Jing, Yuewu Wang:
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. Inscrypt 2009: 313-323 - [c10]Jing Wang, Luning Xia, Jiwu Jing:
An Ultra-kernel Model for Dedicated Security Systems. ICETC 2009: 122-127 - 2008
- [c9]Yuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia:
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318 - [c8]Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu:
Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38 - [c7]Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu:
Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. CSSE (3) 2008: 863-867 - [c6]Jingjing Wu, Jiwu Jing, Jingqiang Lin:
A Decentralized Certification Authority Based on Real World Trust Relationships. CSSE (3) 2008: 1123-1126 - [c5]Qi Liu, Jiwu Jing, Yuewu Wang:
An Improved Method of Hybrid Worm Simulation. WAIM 2008: 612-618 - 2007
- [c4]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: A proactive worm containment solution for enterprise networks. SecureComm 2007: 433-442 - [c3]Jingqiang Lin, Jiwu Jing, Peng Liu:
Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241 - 2006
- [c2]Luning Xia, Jiwu Jing:
An Administrative Model for Role-Based Access Control Using Hierarchical Namespace. PACIS 2006: 30 - 2004
- [j1]Peng Liu, Jiwu Jing, Pramote Luenam, Ying Wang, Lunquan Li, Supawadee Ingsriswang:
The Design and Implementation of a Self-Healing Database System. J. Intell. Inf. Syst. 23(3): 247-269 (2004) - 2003
- [c1]Jiwu Jing, Peng Liu, Dengguo Feng, Ji Xiang, Neng Gao, Jingqiang Lin:
ARECA: a highly attack resilient certification authority. SSRS@CCS 2003: 53-63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint