Xiaozhuo Gu

According to our database1, Xiaozhuo Gu authored at least 27 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Efficient module learning with errors-based post-quantum password-authenticated key exchange.
IET Inf. Secur., January, 2023

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Speedy Error Reconciliation.
IACR Cryptol. ePrint Arch., 2022

2021
A Certificateless Searchable Public Key Encryption Scheme for Multiple Receivers.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
PIV4DB: Probabilistic Integrity Verification for Cloud Database.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
Saber on ESP32.
IACR Cryptol. ePrint Arch., 2019

Secure Multi-receiver Communications: Models, Proofs, and Implementation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2017
Enforcing ACL Access Control on Android Platform.
Proceedings of the Information Security - 20th International Conference, 2017

Splitting Third-Party Libraries' Privileges from Android Apps.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Combining Statistics-Based and CNN-Based Information for Sentence Classification.
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016

A Practical Scheme for Data Secure Transport in VoIP Conferencing.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
How to get Group key efficiently in mobile ad hoc networks?
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
A Pairing-Free Certificateless Authenticated Group Key Agreement Protocol.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
A Key Tree Merge Algorithm in Multi-privileged Groups.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Reducing rekeying time using an integrated group key agreement scheme.
J. Commun. Networks, 2012

2010
Design Universal Security Scheme for Broadband Router.
Int. J. Netw. Secur., 2010

2009
Huffman-based join-exit-tree scheme for contributory key management.
Comput. Secur., 2009

2008
Compensation Buffer Sizing for Providing User-Level QoS Guarantee of Media Flows.
Proceedings of IEEE International Conference on Communications, 2008

Study on a Novel Scheduling Algorithm ofthe Multiple-Plane and Multiple-Stage Switching Fabric.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Performance Study on the MPMS Fabric: A Novel Parallel and Distributed Switching System Architecture.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Join-Tree-Based Contributory Group Key Management.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

An Efficient Conference Key Updating Scheme with the Knowledge of Group Dynamics.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Design and Buffer Sizing of TCAM-Based Pipelined Forwarding Engines.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...