oracle forensics,个人主页

阅读: 评论:0

oracle forensics,个人主页

oracle forensics,个人主页

​代表性学术论文:

(1)Privacy-Preserving and Standard-Compatible AKA Protocol, The 30th USENIX Security Symposium(USENIX Security,四大安全顶会), 2021,通讯作者

(2)Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication, ACM CCS(四大安全顶会), 2016,第1作者(3)Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities, Network and Distributed System Security Symposium (NDSS,四大安全顶会), 2020,第1作者

(4)Multiple Handshakes Security of TLS 1.3 Candidates, IEEE Symposium on Security & Privacy(四大安全顶会), 2016,通讯作者(5)Dumbo: Faster Asynchronous BFT Protocols, ACM Conference on Computer and Communications Security (CCS,四大安全顶会), 2020,第5作者

(6)IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited, Advances in Cryptology - CRYPTO(三大密码顶会), 2018,通讯作者

(7)On the Hardness of the Computational Ring-LWR Problem and Its Applications, Advances in Cryptology - ASIACRYPT(三大密码顶会), 2018,通讯作者

(8)Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Advances in Cryptology - CRYPTO 2016,Lecture Notes in Computer Science 9816(三大密码顶会), 2016,通讯作者

(9)Authenticated Key Exchange from Ideal Lattices, Advances in Cryptology - EUROCRYPT 2015(三大密码顶会), 2015,通讯作者

(10)Black-box Separations for One-More (Static) CDH and Its Generalization, Advances in Cryptology - ASIACRYPT 2014(三大密码顶会), 2014,通讯作者

(11)Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension, Theory of Cryptography Conference(TCC,CCF-B), 2017,通讯作者

(12)Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes, Public-Key Cryptography (PKC, CCF-B), 2020,通讯作者

(13)Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model, Public Key Cryptography (CCF-B), 2019,通讯作者

(14)Simpler Efficient Group Signatures from Lattices, PKC 2015,Lecture Notes in Computer Science 9020, 2015,通讯作者

(15)Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks, Security Standardisation Research - SSR 2015, 2015,第1作者

(16)Accountable Proxy Re-encryption for Secure Data Sharing, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2021,通讯作者

(17)Puncturable Signatures and Applications in_Proof-of-Stake Blockchain Protocols, IEEE Transactions on Information Forensics and Security (CCF-A), 2020,第5作者

(18)Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3, IEEE Transactions on Dependable and Secure Computing(CCF-A), 2017,第3作者​

(19)Towards Secure Data Distribution Systems in Mobile Cloud Computing, IEEE Transactions on Mobile Computing(CCF-A), 2017,第2作者

(20)Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme, IEEE Trans. Parallel Distrib. Syst.(CCF-A), 2013,

(21)UC-secure Two-Server Password-Based Authentication Protocol and Its Applications, ASIACCS(CACR-B), 2016,第2作者

(22)Ciphertext Policy Attribute-Based Encryption from Lattices , ASIACCS(CACR-B), 2012,通讯作者

(23)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network, European Symposium on Research in Computer Security (ESORICS, CCF-B), 2019,第2作者

(24)Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model, Post-quantum Cryptography (CACR-B), 2019,通讯作者

(25)Modular Security Analysis of OAuth 2.0 in the Three-Party Setting, IEEE European Symposium on Security and Privacy, 2020,第3作者

(26)PRE: Stronger Security Notions and Efficient Construction with Non-interactive Opening, Theoretical Computer Science(CCF-B), 2014,通讯作者

(27)Optiwords: A new password policy for creating memorable and strong passwords, Computers & Security (CCF-B), 2019,通讯作者

(28)Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications, Computers & Security (CCF-B), 2019,第2作者

(29)Non-transferable Proxy Re-encryption, The Computer Journal (CCF-B), 2019,通讯作者

(30)LPSE: Lightweight password-strength estimation for password meters, Computers & Security(CCF-B), 2018,第2作者

(31)Attribute-based signature scheme with constant size signature in the standard model, IET Information Security(CACR-B), 2012,第3作者

(32)Certificateless signature: a new security model and an improved generic construction, Des. Codes Cryptography(CCF-B), 2007,第3作者

(33)Certificateless Public-Key Signature: Security Model and Efficient Construction, ACNS, 2006,第1作者

本文发布于:2024-02-04 04:43:23,感谢您对本站的认可!

本文链接:https://www.4u4v.net/it/170699319052156.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:个人主页   oracle   forensics
留言与评论(共有 0 条评论)
   
验证码:

Copyright ©2019-2022 Comsenz Inc.Powered by ©

网站地图1 网站地图2 网站地图3 网站地图4 网站地图5 网站地图6 网站地图7 网站地图8 网站地图9 网站地图10 网站地图11 网站地图12 网站地图13 网站地图14 网站地图15 网站地图16 网站地图17 网站地图18 网站地图19 网站地图20 网站地图21 网站地图22/a> 网站地图23