An enhancement of timestamp-based password authentication scheme L Fan, JH Li, HW Zhu Computers & Security 21 (7), 665-667, 2002 | 136 | 2002 |
Deniable authentication protocol based on Deffie-Hellman algorithm L Fan, CX Xu, JH Li Electronics letters 38 (14), 705-706, 2002 | 124 | 2002 |
2-hop blockchain: Combining proof-of-work and proof-of-stake securely T Duong, L Fan, J Katz, P Thai, HS Zhou European Symposium on Research in Computer Security, 697-712, 2020 | 107 | 2020 |
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake T Duong, A Chepurnoy, L Fan, HS Zhou Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018 | 106 | 2018 |
Building network attack graph for alert causal correlation S Zhang, J Li, X Chen, L Fan Computers & security 27 (5-6), 188-196, 2008 | 52 | 2008 |
An efficient and robust aggregation algorithm for learning federated CNN Y Lu, L Fan Proceedings of the 2020 3rd International Conference on Signal Processing …, 2020 | 29 | 2020 |
A scalable proof-of-stake blockchain in the open setting (or, how to mimic nakamoto's design via proof-of-stake) L Fan, HS Zhou Cryptology ePrint Archive, 2017 | 28 | 2017 |
Remarks on unknown key-share attack on authenticated multiple-key agreement protocol HS Zhou, L Fan, JH Li Electronics Letters 39 (17), 1248-1249, 2003 | 27 | 2003 |
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power. T Duong, L Fan, T Veale, HS Zhou IACR Cryptol. ePrint Arch. 2016, 716, 2016 | 20 | 2016 |
Flexible advancement in asynchronous bft consensus S Liu, W Xu, C Shan, X Yan, T Xu, B Wang, L Fan, F Deng, Y Yan, ... Proceedings of the 29th Symposium on Operating Systems Principles, 264-280, 2023 | 15 | 2023 |
Cerberus: Privacy-preserving computation in edge computing D Zhang, L Fan IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 12 | 2020 |
A generic paradigm for blockchain design P Thai, L Njilla, T Duong, L Fan, HS Zhou Proceedings of the 15th EAI International Conference on Mobile and …, 2018 | 8 | 2018 |
Bridging the gap of timing assumptions in byzantine consensus Z Chen, L Fan, S Liu, M Vukolić, X Wang, J Zhang Proceedings of the 24th International Middleware Conference, 178-191, 2023 | 2 | 2023 |
Pldb: Protecting LSM-based Key-Value Store using Trusted Execution Environment C Shen, L Fan 2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023 | | 2023 |
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake A Chepurnoy, T Duong, L Fan, HS Zhou Cryptology ePrint Archive, 2017 | | 2017 |