Jiangtao Li

Affiliations:
  • Intel
  • Purdue University


According to our database1, Jiangtao Li authored at least 38 papers between 2003 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
Entropy loss in PUF-based key generation schemes: The repetition code pitfall.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

13fJ/bit probing-resilient 250K PUF array with soft darkbit masking for 1.94% bit-error in 22nm tri-gate CMOS.
Proceedings of the ESSCIRC 2014, 2014

2013
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Flexible and scalable digital signatures in TPM 2.0.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A practical device authentication scheme using SRAM PUFs.
J. Cryptogr. Eng., 2012

VLR group signatures with indisputable exculpability and efficient revocation.
Int. J. Inf. Priv. Secur. Integr., 2012

A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes.
Proceedings of the Trusted Systems, 4th International Conference, 2012

2011
Enhanced privacy ID from bilinear pairing for hardware authentication and attestation.
Int. J. Inf. Priv. Secur. Integr., 2011

A Practical Device Authentication Scheme Using SRAM PUFs.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM.
Proceedings of the Trusted Systems - Third International Conference, 2011

A (Corrected) DAA Scheme Using Batch Proof and Verification.
Proceedings of the Trusted Systems - Third International Conference, 2011

2010
A note on the Chen-Morrissey-Smart DAA scheme.
Inf. Process. Lett., 2010

Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol.
IACR Cryptol. ePrint Arch., 2010

A Pairing-Based DAA Scheme Further Reducing TPM Resources.
IACR Cryptol. ePrint Arch., 2010

An Anonymous Attestation Scheme with Optional Traceability.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

VLR Group Signatures with Indisputable Exculpability and Efficient Revocation.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Silicon PUFs in Practice.
Proceedings of the ISSE 2010, 2010

Revocation of Direct Anonymous Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010

2009
Automated trust negotiation using cryptographic credentials.
ACM Trans. Inf. Syst. Secur., 2009

Denial of service attacks and defenses in decentralized trust management.
Int. J. Inf. Sec., 2009

Simplified security notions of direct anonymous attestation and a concrete scheme from pairings.
Int. J. Inf. Sec., 2009

Enhanced Privacy ID from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2009

2008
Algebraic Construction for Zero-Knowledge Sets.
J. Comput. Sci. Technol., 2008

A New Direct Anonymous Attestation Scheme from Bilinear Maps.
Proceedings of the Trusted Computing, 2008

2007
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities.
IACR Cryptol. ePrint Arch., 2007

Dynamic Virtual Credit Card Numbers.
Proceedings of the Financial Cryptography and Data Security, 2007

Universal Accumulators with Efficient Nonmembership Proofs.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
OACerts: Oblivious Attribute Certificates.
IEEE Trans. Dependable Secur. Comput., 2006

Attribute-Based Access Control with Hidden Policies and Hidden Credentials.
IEEE Trans. Computers, 2006

Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
Proceedings of the Network and Distributed System Security Symposium, 2006

A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Efficient Correlated Action Selection.
Proceedings of the Financial Cryptography and Data Security, 2006

Secure and Private Collaborative Linear Programming.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Secure outsourcing of sequence comparisons .
Int. J. Inf. Sec., 2005

Policy-hiding access control in open environment.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

2004
Hidden access control policies with hidden credentials.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Private collaborative forecasting and benchmarking.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

2003
Enhanced Smart-card based License Management.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003


  Loading...