Wei Wang

Orcid: 0000-0002-1484-0313

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
  • Chinese Academy of Sciences, Data Assurance and Communication Security Research Center, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China (PhD 2016)


According to our database1, Wei Wang authored at least 30 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure.
ACM Trans. Embed. Comput. Syst., November, 2023

Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

HPVES: High Performance Video Encryption Scheme with Cryptographic USB Key.
Proceedings of the IEEE International Conference on Communications, 2023

Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON.
Proceedings of the IEEE International Conference on Communications, 2023

Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation.
Proceedings of the Computer Security - ESORICS 2023, 2023

cPSIR: Circuit-Based Private Stateful Information Retrieval for Private Media Consumption.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022

μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware.
CoRR, 2022

ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

$\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services.
CoRR, 2021

Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World.
Proceedings of the 20th IEEE International Conference on Trust, 2021

SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX.
Proceedings of the IEEE International Performance, 2021

Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild.
Proceedings of the 28th International Conference on Telecommunications, 2021

After Everything is Connected: A Client Certificate-Oriented Perspective of IoT Device Security Analysis.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

Informer: Protecting Intel SGX from Cross-Core Side Channel Threats.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Certificate Transparency for ECQV Implicit Certificates.
Proceedings of the ICC 2021, 2021

SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECC.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Traceable Revocable Anonymous Registration Scheme with Zero-knowledge Proof on Blockchain.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

On the Verification of Signed Messages.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2015
vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge.
Proceedings of the Computer Security - ESORICS 2015, 2015


  Loading...