Luning Xia

According to our database1, Luning Xia authored at least 20 papers between 2006 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer.
IEEE Trans. Dependable Secur. Comput., 2022

2019
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

eHIFS: An Efficient History Independent File System.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Copker: A Cryptographic Engine Against Cold-Boot Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Chord: Thwarting Relay Attacks Among Near Field Communications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting.
Proceedings of the Information Security Practice and Experience, 2016

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Extracting Robust Keys from NAND Flash Physical Unclonable Functions.
Proceedings of the Information Security - 18th International Conference, 2015

Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge.
Proceedings of the Computer Security - ESORICS 2015, 2015

2012
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

An Efficient RSA Implementation without Precomputation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2009
An Ultra-kernel Model for Dedicated Security Systems.
Proceedings of the 2009 International Conference on Education Technology and Computer, 2009

2006
An Administrative Model for Role-Based Access Control Using Hierarchical Namespace.
Proceedings of the Pacific Asia Conference on Information Systems, 2006


  Loading...