Jianxiong Shao

According to our database1, Jianxiong Shao authored at least 9 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Formal analysis of HMAC authorisation in the TPM2.0 specification.
IET Inf. Secur., 2018

2016
Computational Soundness Results for Stateful Applied pi Calculus.
CoRR, 2016

Computational Soundness Results for Stateful Applied π Calculus.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

2015
Formal Analysis of Enhanced Authorization in the TPM 2.0.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Direct Anonymous Attestation in practice: Implementation and efficient revocation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication.
Proceedings of the Information Security - 17th International Conference, 2014

ExBLACR: Extending BLACR System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Type-Based Analysis of Protected Storage in the TPM (full version).
IACR Cryptol. ePrint Arch., 2013

Type-Based Analysis of Protected Storage in the TPM.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...