Lingchen Zhang

According to our database1, Lingchen Zhang authored at least 20 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers.
Int. J. Inf. Comput. Secur., 2021

2020
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
IEEE Trans. Inf. Forensics Secur., 2020

2019
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Secure Cryptography Infrastructures in the Cloud.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Android Control Flow Obfuscation Based on Dynamic Entry Points Modification.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

Perceptual-DualGAN: Perceptual Losses for Image to Image Translation with Generative Adversarial Nets.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack.
Proceedings of the Information Security - 20th International Conference, 2017

Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A PUF and Software Collaborative Key Protection Scheme.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
Proceedings of the Applied Cryptography and Network Security, 2017

Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs.
Proceedings of the Security and Privacy in Communication Networks, 2016

Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2014
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014

2012
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards Fine-Grained Access Control on Browser Extensions.
Proceedings of the Information Security Practice and Experience, 2012

2011
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA.
Proceedings of the Information and Communications Security - 13th International Conference, 2011


  Loading...