Wenting Li

Orcid: 0000-0002-9036-2392

Affiliations:
  • NEC Laboratories Europe, Heidelberg, Germany


According to our database1, Wenting Li authored at least 18 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains.
IEEE Trans. Serv. Comput., 2022

2021
Outsourcing Proofs of Retrievability.
IEEE Trans. Cloud Comput., 2021

EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

Regulating Storage Overhead in Existing PoW-based Blockchains.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

2019
Proofs of Writing for Robust Storage.
IEEE Trans. Parallel Distributed Syst., 2019

Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing.
IEEE Trans. Computers, 2019

Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Toward Fairness of Cryptocurrency Payments.
IEEE Secur. Priv., 2018

2017
Sharding PoW-based Blockchains via Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 2017

Securing Proof-of-Stake Blockchain Protocols.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Towards Fairness of Cryptocurrency Payments.
CoRR, 2016

2015
Secure Erasure and Code Update in Legacy Sensors.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

2014
PrivLoc: Preventing Location Tracking in Geofencing Services.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
PoWerStore: proofs of writing for efficient and robust storage.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Proofs of Writing for Efficient and Robust Storage
CoRR, 2012

Assisting Server for Secure Multi-Party Computation.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012


  Loading...