Следене
Lei Fan
Lei Fan
Потвърден имейл адрес: sjtu.edu.cn
Заглавие
Позовавания
Позовавания
Година
An enhancement of timestamp-based password authentication scheme
L Fan, JH Li, HW Zhu
Computers & Security 21 (7), 665-667, 2002
1362002
Deniable authentication protocol based on Deffie-Hellman algorithm
L Fan, CX Xu, JH Li
Electronics letters 38 (14), 705-706, 2002
1242002
2-hop blockchain: Combining proof-of-work and proof-of-stake securely
T Duong, L Fan, J Katz, P Thai, HS Zhou
European Symposium on Research in Computer Security, 697-712, 2020
1072020
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake
T Duong, A Chepurnoy, L Fan, HS Zhou
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018
1062018
Building network attack graph for alert causal correlation
S Zhang, J Li, X Chen, L Fan
Computers & security 27 (5-6), 188-196, 2008
522008
An efficient and robust aggregation algorithm for learning federated CNN
Y Lu, L Fan
Proceedings of the 2020 3rd International Conference on Signal Processing …, 2020
292020
A scalable proof-of-stake blockchain in the open setting (or, how to mimic nakamoto's design via proof-of-stake)
L Fan, HS Zhou
Cryptology ePrint Archive, 2017
282017
Remarks on unknown key-share attack on authenticated multiple-key agreement protocol
HS Zhou, L Fan, JH Li
Electronics Letters 39 (17), 1248-1249, 2003
272003
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
T Duong, L Fan, T Veale, HS Zhou
IACR Cryptol. ePrint Arch. 2016, 716, 2016
202016
Flexible advancement in asynchronous bft consensus
S Liu, W Xu, C Shan, X Yan, T Xu, B Wang, L Fan, F Deng, Y Yan, ...
Proceedings of the 29th Symposium on Operating Systems Principles, 264-280, 2023
152023
Cerberus: Privacy-preserving computation in edge computing
D Zhang, L Fan
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
122020
A generic paradigm for blockchain design
P Thai, L Njilla, T Duong, L Fan, HS Zhou
Proceedings of the 15th EAI International Conference on Mobile and …, 2018
82018
Bridging the gap of timing assumptions in byzantine consensus
Z Chen, L Fan, S Liu, M Vukolić, X Wang, J Zhang
Proceedings of the 24th International Middleware Conference, 178-191, 2023
22023
Pldb: Protecting LSM-based Key-Value Store using Trusted Execution Environment
C Shen, L Fan
2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023
2023
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake
A Chepurnoy, T Duong, L Fan, HS Zhou
Cryptology ePrint Archive, 2017
2017
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–15