Hongda Li

According to our database1, Hongda Li authored at least 54 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Some Low Round Zero Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2020

Analysis of bitcoin backbone protocol in the non-flat model.
Sci. China Inf. Sci., 2020

DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
An internal model frame-based disturbance attenuation control scheme for quad-rotors transporting unknown payloads.
Trans. Inst. Meas. Control, 2019

UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting.
IACR Cryptol. ePrint Arch., 2019

Efficient Zero-Knowledge for NP from Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2019

Towards a reliable firewall for software-defined networks.
Comput. Secur., 2019

Hierarchical Functional Signcryption: Notion and Construction.
Proceedings of the Provable Security, 2019

Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation.
IACR Cryptol. ePrint Arch., 2018

Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards.
CoRR, 2018

Enhancing Security Education Through Designing SDN Security Labs in CloudLab.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Micropaying to a Distributed Payee with Instant Confirmation.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Augmented Black-Box Simulation and Zero Knowledge Argument for NP.
IACR Cryptol. ePrint Arch., 2017

Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention.
CoRR, 2017

Attribute-based non-interactive key exchange.
Sci. China Inf. Sci., 2017

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Towards Effective Virtualization of Intrusion Detection Systems.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Performance considerations of network functions virtualization using containers.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Secure Mobile Agent from Leakage-Resilient Proxy Signatures.
Mob. Inf. Syst., 2015

Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

On Zero Knowledge Argument with PQT Soundness.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Constrained Verifiable Random Functions from Indistinguishability Obfuscation.
Proceedings of the Provable Security, 2015

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model.
Proceedings of the Advances in Information and Computer Security, 2015

The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

One-Round Witness Indistinguishability from Indistinguishability Obfuscation.
Proceedings of the Information Security Practice and Experience, 2015

Verifiable Random Functions from (Leveled) Multilinear Maps.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP.
IACR Cryptol. ePrint Arch., 2014

Joint Signature and Encryption in the Presence of Continual Leakage.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Attribute-Based Signatures for Circuits from Multilinear Maps.
Proceedings of the Information Security - 17th International Conference, 2014

Functional Signatures from Indistinguishability Obfuscation.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Ring Signatures of Constant Size Without Random Oracles.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.
Proceedings of the Network and System Security - 7th International Conference, 2013

Leakage-Resilient Proxy Signatures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

ID-Based Signcryption with Restrictive Unsigncryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Universally composable zero-knowledge sets.
Int. J. Grid Util. Comput., 2012

Round-optimal zero-knowledge proofs of knowledge for NP.
Sci. China Inf. Sci., 2012

A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP.
Proceedings of the Internet and Distributed Computing Systems, 2012

A Leakage-Resilient Zero Knowledge Proof for Lattice Problem.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2010
On constant-round zero-knowledge proofs of knowledge for NP-relations.
Sci. China Inf. Sci., 2010

2008
Existence of 3-round zero-knowledge proof systems for NP.
Sci. China Ser. F Inf. Sci., 2008

2006
Finding Important Vocabulary Within Ontology.
Proceedings of the Semantic Web, 2006

2005
Efficient reduction of 1 out of n oblivious transfers in random oracle model.
IACR Cryptol. ePrint Arch., 2005

An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...