Jingqiang Lin
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
Bibliography
2024
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021
A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment.
IEEE Internet Things J., 2021
High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs.
Integr., 2021
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators".
Secur. Commun. Networks, 2020
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators.
Secur. Commun. Networks, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Services Computing - SCC 2019, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources.
IACR Trans. Symmetric Cryptol., 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Secur. Priv., 2016
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2015
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng., 2015
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Inf. Secur., 2015
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008