Dawu Gu
Orcid: 0000-0002-0504-9538
According to our database1,
Dawu Gu
authored at least 334 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
VLDB J., September, 2024
Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections.
IEEE Trans. Mob. Comput., April, 2024
Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation.
IEEE Trans. Inf. Forensics Secur., 2024
Theor. Comput. Sci., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices.
IACR Cryptol. ePrint Arch., 2024
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security.
IACR Cryptol. ePrint Arch., 2024
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust.
CoRR, 2024
MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority.
Proceedings of the 33rd USENIX Security Symposium, 2024
Trapped by Your WORDs: (Ab)using Processor Exception for Generic Binary Instrumentation on Bare-metal Embedded Devices.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024
2023
Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
J. Comput. Sci. Technol., September, 2023
Theor. Comput. Sci., May, 2023
A nonprofiled side-channel analysis based on variational lower bound related to mutual information.
Sci. China Inf. Sci., January, 2023
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model.
IACR Cryptol. ePrint Arch., 2023
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs.
IACR Cryptol. ePrint Arch., 2023
Abusing Processor Exception for General Binary Instrumentation on Bare-metal Embedded Devices.
CoRR, 2023
Proceedings of the IEEE International Conference on Software Analysis, 2023
RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks.
Proceedings of the IEEE International Conference on Software Analysis, 2023
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Information Security - 26th International Conference, 2023
On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Android.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Very Large Scale Integr. Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022
Theor. Comput. Sci., 2022
Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids.
IEEE Syst. J., 2022
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems.
J. Syst. Archit., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Dagstuhl Artifacts Ser., 2022
Sci. China Inf. Sci., 2022
Sci. China Inf. Sci., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IEEE Trans. Software Eng., 2021
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks.
J. Inf. Secur. Appl., 2021
New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries.
Inf. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness.
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Des. Codes Cryptogr., 2021
Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021
Sci. China Inf. Sci., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization.
J. Comput. Sci. Technol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Sci. China Inf. Sci., 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
Secur. Commun. Networks, 2019
J. Comput. Sci. Technol., 2019
KSII Trans. Internet Inf. Syst., 2019
J. Inf. Secur. Appl., 2019
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Des. Codes Cryptogr., 2019
Comput. J., 2019
Sci. China Inf. Sci., 2019
Sci. China Inf. Sci., 2019
Sci. China Inf. Sci., 2019
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions.
IEEE Access, 2019
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2018
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
Sci. China Inf. Sci., 2018
Sci. China Inf. Sci., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017
J. Comput. Syst. Sci., 2017
KSII Trans. Internet Inf. Syst., 2017
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Theory and Applications of Models of Computation, 2017
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 25th International Conference on Program Comprehension, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the International Conference on Algorithmic Learning Theory, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Secur. Commun. Networks, 2016
J. Netw. Comput. Appl., 2016
IET Inf. Secur., 2016
Improved impossible differential attack on reduced version of Camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> functions.
IET Inf. Secur., 2016
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Inf. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Comput. J., 2016
Sci. China Inf. Sci., 2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015
IET Inf. Secur., 2015
ACM Comput. Surv., 2015
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015
Comput. J., 2015
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.
Electron. Colloquium Comput. Complex., 2014
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Security analysis and enhancement for three-party password-based authenticated key exchange protocol.
Secur. Commun. Networks, 2012
Math. Comput. Model., 2012
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012
J. Networks, 2012
Inf. Sci., 2012
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
2011
J. Comput., 2011
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2011
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
J. Syst. Softw., 2010
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles.
J. Syst. Softw., 2010
Int. J. Found. Comput. Sci., 2010
Proceedings of the Advances in Neural Networks, 2010
Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
J. Syst. Softw., 2009
Inf. Process. Lett., 2009
Int. J. Distributed Sens. Networks, 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Cryptologia, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
Informatica (Slovenia), 2008
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008
Proceedings of The 2008 IEEE International Conference on Networking, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
2007
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.
Proceedings of the Provable Security, 2007
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
2002
Proceedings of the Information Security, 5th International Conference, 2002
2001
ACM SIGOPS Oper. Syst. Rev., 2001