Jingqiang Lin

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2022
Replicated Additive Secret Sharing with the Optimized Number of Shares.
Proceedings of the Security and Privacy in Communication Networks, 2022

Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021

A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment.
IEEE Internet Things J., 2021

High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs.
Integr., 2021

From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Exploring the Security Issues of Trusted CA Certificate Management.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data.
IEEE Trans. Inf. Forensics Secur., 2020

Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators".
Secur. Commun. Networks, 2020

High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators.
Secur. Commun. Networks, 2020

PIV4DB: Probabilistic Integrity Verification for Cloud Database.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Proceedings of the Computer Security - ESORICS 2020, 2020

Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

2019
Entropy Estimation for ADC Sampling-Based True Random Number Generators.
IEEE Trans. Inf. Forensics Secur., 2019

On the Security of TRNGs Based on Multiple Ring Oscillators.
Proceedings of the Security and Privacy in Communication Networks, 2019

Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs.
Proceedings of the Security and Privacy in Communication Networks, 2019

Practical Verification of Data Encryption for Cloud Storage Services.
Proceedings of the Services Computing - SCC 2019, 2019

Secure Multi-receiver Communications: Models, Proofs, and Implementation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Towards the Trust-Enhancements of Single Sign-On Services.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

CacheGuard: a security-enhanced directory architecture against continuous attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
Neural Network Based Min-entropy Estimation for Random Number Generators.
Proceedings of the Security and Privacy in Communication Networks, 2018

Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs.
Proceedings of the Security and Privacy in Communication Networks, 2018

PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Chord: Thwarting Relay Attacks Among Near Field Communications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources.
IACR Trans. Symmetric Cryptol., 2017

Cyber-Physical Systems Security - A Survey.
IEEE Internet Things J., 2017

SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

High-Performance Symmetric Cryptography Server with GPU Acceleration.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Generating Correlated Digital Certificates: Framework and Applications.
IEEE Trans. Inf. Forensics Secur., 2016

Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Secur. Priv., 2016

More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22.
IACR Cryptol. ePrint Arch., 2016

On the Entropy of Oscillator-Based True Random Number Generators.
IACR Cryptol. ePrint Arch., 2016

Extracting More Entropy for TRNGs Based on Coherent Sampling.
Proceedings of the Security and Privacy in Communication Networks, 2016

RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng., 2015

RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Inf. Secur., 2015

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Exploiting the Potential of GPUs for Modular Multiplication in ECC.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Copker: Computing with Private Keys without RAM.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Exploiting the Floating-Point Computing Power of GPUs for RSA.
Proceedings of the Information Security - 17th International Conference, 2014

A game-theory analysis of the rat-group attack in smart grids.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Entropy Evaluation for Oscillator-Based True Random Number Generators.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2012
Offline RFID Grouping Proofs with Trusted Timestamps.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Efficient Missing Tag Detection in a Large RFID System.
Proceedings of the 11th IEEE International Conference on Trust, 2012

GRADE: Graceful Degradation in Byzantine Quorum Systems.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

RIKE: Using Revocable Identities to Support Key Escrow in PKIs.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Efficient Secret Sharing Schemes.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

An Efficient Group-Based Secret Sharing Scheme.
Proceedings of the Information Security Practice and Experience, 2011

2010
Mediated Hierarchical Identity-Based Combined Public Key Schemes.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2008
A Decentralized Certification Authority Based on Real World Trust Relationships.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...