Jiwu Jing
Orcid: 0000-0002-3409-6149
According to our database1,
Jiwu Jing
authored at least 124 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Des. Codes Cryptogr., May, 2023
Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2023
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider.
Proceedings of the 52nd International Conference on Parallel Processing, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer.
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Inf. Comput. Secur., 2022
IACR Cryptol. ePrint Arch., 2022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022
2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs.
Integr., 2021
CoRR, 2021
Proceedings of the ICMAI 2021: 6th International Conference on Mathematics and Artificial Intelligence, Chengdu, China, March 19, 2021
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators".
Secur. Commun. Networks, 2020
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators.
Secur. Commun. Networks, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.
J. Comput. Secur., 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources.
IACR Trans. Symmetric Cryptol., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration.
Secur. Commun. Networks, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Secur. Priv., 2016
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Information Security - 17th International Conference, 2014
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Secur. Commun. Networks, 2013
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".
Secur. Commun. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Qual. Reliab. Eng. Int., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Secur. Commun. Networks, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the Information Security, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the 2009 International Conference on Education Technology and Computer, 2009
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008
2007
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
2006
Proceedings of the Pacific Asia Conference on Information Systems, 2006
2004
J. Intell. Inf. Syst., 2004
2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003