Qiongxiao Wang
Orcid: 0000-0002-8012-8295
According to our database1,
Qiongxiao Wang
authored at least 48 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
ESCORT: Efficient Status Check and Revocation Transparency for Linkage-Based Pseudonym Certificates in VANETs.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE International Conference on Communications, 2023
2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
IEEE Trans. Inf. Forensics Secur., 2021
CoRR, 2021
SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX.
Proceedings of the IEEE International Performance, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecur., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2017
2015
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Inf. Secur., 2015
2014
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Secur. Commun. Networks, 2013
2010
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010