Quanwei Cai

Affiliations:
  • Institute of Information Engineering, CAS, University of Chinese Academy of Sciences, China


According to our database1, Quanwei Cai authored at least 22 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Blockchain-Based Certificate Transparency and Revocation Transparency.
IEEE Trans. Dependable Secur. Comput., 2022

Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
Proceedings of the Security and Privacy in Communication Networks, 2022

2021
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory.
IEEE Trans. Dependable Secur. Comput., 2021

UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services.
CoRR, 2021

Building a Secure Video Conference System with Customized Cryptographic USB Keys.
Proceedings of the ICC 2021, 2021

2020
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Traceable Revocable Anonymous Registration Scheme with Zero-knowledge Proof on Blockchain.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

On the Verification of Signed Messages.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

Applications and Developments of the Lattice Attack in Side Channel Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.
J. Comput. Secur., 2019

The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Enforcing Access Control in Distributed Version Control Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Secure Cryptography Infrastructures in the Cloud.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Evaluating the Cache Side Channel Attacks Against ECDSA.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

TF-BIV: transparent and fine-grained binary integrity verification in the cloud.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection.
Proceedings of the Information Security - 21st International Conference, 2018

Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

2017
A-Tor: Accountable Anonymity in Tor.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2014
TST: A New Randomness Test Method Based on Coupon Collector's Problem.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

SEDB: Building Secure Database Services for Sensitive Data.
Proceedings of the Information and Communications Security - 16th International Conference, 2014


  Loading...