Jingqiang Lin

According to our database1, Jingqiang Lin
  • authored at least 49 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources.
IACR Trans. Symmetric Cryptol., 2017

Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration.
Security and Communication Networks, 2017

Cyber-Physical Systems Security - A Survey.
IEEE Internet of Things Journal, 2017

Cyber-Physical Systems Security - A Survey.
CoRR, 2017

Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

High-Performance Symmetric Cryptography Server with GPU Acceleration.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

On the Entropy of Oscillator-Based True Random Number Generators.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Generating Correlated Digital Certificates: Framework and Applications.
IEEE Trans. Information Forensics and Security, 2016

Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Security & Privacy, 2016

More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22.
IACR Cryptology ePrint Archive, 2016

On the Entropy of Oscillator-Based True Random Number Generators.
IACR Cryptology ePrint Archive, 2016

Extracting More Entropy for TRNGs Based on Coherent Sampling.
Proceedings of the Security and Privacy in Communication Networks, 2016

RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng., 2015

RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Information Security, 2015

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Extracting Robust Keys from NAND Flash Physical Unclonable Functions.
Proceedings of the Information Security - 18th International Conference, 2015

Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge.
Proceedings of the Computer Security - ESORICS 2015, 2015

An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Exploiting the Potential of GPUs for Modular Multiplication in ECC.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Copker: Computing with Private Keys without RAM.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Exploiting the Floating-Point Computing Power of GPUs for RSA.
Proceedings of the Information Security - 17th International Conference, 2014

A game-theory analysis of the rat-group attack in smart grids.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

SEDB: Building Secure Database Services for Sensitive Data.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Entropy Evaluation for Oscillator-Based True Random Number Generators.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Security and Communication Networks, 2013

2012
Evaluating Intrusion-Tolerant Certification Authority Systems.
Quality and Reliability Eng. Int., 2012

Offline RFID Grouping Proofs with Trusted Timestamps.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Efficient Missing Tag Detection in a Large RFID System.
Proceedings of the 11th IEEE International Conference on Trust, 2012

GRADE: Graceful Degradation in Byzantine Quorum Systems.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

RIKE: Using Revocable Identities to Support Key Escrow in PKIs.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
An Efficient Group-Based Secret Sharing Scheme.
Proceedings of the Information Security Practice and Experience, 2011

2010
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.
Proceedings of the Security and Privacy in Communication Networks, 2010

Mediated Hierarchical Identity-Based Combined Public Key Schemes.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010

A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2008
A Decentralized Certification Authority Based on Real World Trust Relationships.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Framework for Intrusion Tolerant Certification Authority System Evaluation.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007


  Loading...