Bangdao Chen

Orcid: 0000-0003-3225-4286

According to our database1, Bangdao Chen authored at least 30 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.
Frontiers Comput. Sci., April, 2024

DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network.
IEEE Trans. Inf. Forensics Secur., 2024

Proof of Finalization: A Self-Fulfilling Function of Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections.
IEEE Open J. Comput. Soc., 2024

PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain.
IEEE Internet Things J., 2024

2023
OWL: A data sharing scheme with controllable anonymity and integrity for group users.
Comput. Commun., September, 2023

2022
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection.
IEEE Trans. Netw. Serv. Manag., December, 2022

TENET: Towards Self-sovereign and Fair Multi-party Computation Ecology Empowered by Decentralized TEE Network.
CoRR, 2022

Committable: A Decentralised and Trustless Open-Source Protocol.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts.
CoRR, 2021

2020
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues.
IEEE Access, 2020

Protect Your Smart Contract Against Unfair Payment.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Seraph: enabling cross-platform security analysis for EVM and WASM smart contracts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Untethered Soft Actuators by Liquid-Vapor Phase Transition: Remote and Programmable Actuation.
Adv. Intell. Syst., 2019

2018
ReGuard: finding reentrancy bugs in smart contracts.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2016
Using Weighted SVM for Identifying User from Gait with Smart Phone.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

2013
Reverse Authentication in Financial Transactions and Identity Management.
Mob. Networks Appl., 2013

Human interactive secure key and identity exchange protocols in body sensor networks.
IET Inf. Secur., 2013

2012
Using human interactive security protocols to secure payments.
PhD thesis, 2012

Human Interactive Secure ID Management in Body Sensor Networks.
J. Networks, 2012

Social Networks for Importing and Exporting Security.
Proceedings of the Large-Scale Complex IT Systems. Development, Operation and Management, 2012

Bootstrapping body sensor networks using human controlled LED-camera channels.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

User interactive Internet of things privacy preserved access control.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Mobile Electronic Identity: Securing Payment on Mobile Phones.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

When Context Is Better Than Identity: Authentication by Context Using Empirical Channels.
Proceedings of the Security Protocols XIX, 2011

When Context Is Better Than Identity (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Body sensor network key distribution using human interactive channels.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

2010
The Missing Link: Human Interactive Security Protocols in Mobile Payment.
Proceedings of the Advances in Information and Computer Security, 2010


  Loading...