Qiongxiao Wang

Orcid: 0000-0002-8012-8295

According to our database1, Qiongxiao Wang authored at least 45 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

HPVES: High Performance Video Encryption Scheme with Cryptographic USB Key.
Proceedings of the IEEE International Conference on Communications, 2023

2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022

Blockchain-Based Certificate Transparency and Revocation Transparency.
IEEE Trans. Dependable Secur. Comput., 2022

Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks.
Proceedings of the IEEE International Conference on Trust, 2022

Replicated Additive Secret Sharing with the Optimized Number of Shares.
Proceedings of the Security and Privacy in Communication Networks, 2022

LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021

UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services.
CoRR, 2021

SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX.
Proceedings of the IEEE International Performance, 2021

Informer: Protecting Intel SGX from Cross-Core Side Channel Threats.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Exploring the Security Issues of Trusted CA Certificate Management.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Building a Secure Video Conference System with Customized Cryptographic USB Keys.
Proceedings of the ICC 2021, 2021

Certificate Transparency for ECQV Implicit Certificates.
Proceedings of the ICC 2021, 2021

SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECC.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes.
Proceedings of the 19th IEEE International Conference on Trust, 2020

P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

On the Verification of Signed Messages.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs.
Proceedings of the Security and Privacy in Communication Networks, 2019

Analyzing the Browser Security Warnings on HTTPS Errors.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards the Trust-Enhancements of Single Sign-On Services.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecur., 2018

Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Chord: Thwarting Relay Attacks Among Near Field Communications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2017

2015
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Inf. Secur., 2015

2014
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

SEDB: Building Secure Database Services for Sensitive Data.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Secur. Commun. Networks, 2013

2010
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...