Volgen
Quanwei Cai
Quanwei Cai
Geverifieerd e-mailadres voor mail.ustc.edu.cn
Titel
Geciteerd door
Geciteerd door
Jaar
Blockchain-based certificate transparency and revocation transparency
Z Wang, J Lin, Q Cai, Q Wang, D Zha, J Jing
IEEE Transactions on Dependable and Secure Computing 19 (1), 681-697, 2020
1812020
Fedxgboost: Privacy-preserving xgboost for federated learning
NK Le, Y Liu, QM Nguyen, Q Liu, F Liu, Q Cai, S Hirche
arXiv preprint arXiv:2106.10662, 2021
262021
The weakest link of certificate transparency: Exploring the TLS/HTTPS configurations of third-party monitors
B Li, D Chu, J Lin, Q Cai, C Wang, L Meng
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
152019
Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory
C Li, L Guan, J Lin, B Luo, Q Cai, J Jing, J Wang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1196-1213, 2019
142019
Towards efficient re-encryption for secure client-side deduplication in public clouds
L Lei, Q Cai, B Chen, J Lin
Information and Communications Security: 18th International Conference …, 2016
122016
Uppresso: Untraceable and unlinkable privacy-preserving single sign-on services
C Guo, J Lin, Q Cai, W Wang, F Li, Q Wang, J Jing, B Zhao
arXiv preprint arXiv:2110.10396, 2021
112021
TF-BIV: transparent and fine-grained binary integrity verification in the cloud
F Jiang, Q Cai, J Lin, B Luo, L Guan, Z Ma
Proceedings of the 35th Annual Computer Security Applications Conference, 57-69, 2019
82019
Extending registration and authentication processes of FIDO2 external authenticator with qr codes
C Guo, Q Cai, Q Wang, J Lin
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
52020
Enforcing access controls for the cryptographic cloud service invocation based on virtual machine introspection
F Jiang, Q Cai, L Guan, J Lin
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
42018
Secure cryptography infrastructures in the cloud
D Chu, K Zhu, Q Cai, J Lin, F Li, L Guan, L Zhang
2019 IEEE Global Communications Conference (GLOBECOM), 1-7, 2019
32019
A-Tor: Accountable anonymity in tor
Q Cai, J Lutes, J Lin, B Luo
Security and Privacy in Communication Networks: 13th International …, 2018
32018
Building a secure video conference system with customized cryptographic USB keys
P Wu, Q Cai, Q Wang, H Cao
ICC 2021-IEEE International Conference on Communications, 1-6, 2021
22021
Applications and developments of the lattice attack in side channel attacks
Z Ma, B Li, Q Cai, J Yang
International Conference on Applied Cryptography and Network Security, 435-452, 2020
22020
Peapods: OS-independent memory confidentiality for cryptographic engines
C Li, J Lin, Q Cai, B Luo
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
22018
SEDB: building secure database services for sensitive data
Q Cai, J Lin, F Li, Q Wang
Information and Communications Security: 16th International Conference …, 2015
22015
System and method for providing cryptographic operation service in virtualization environment
LIN Jingqiang, K Zhu, L Zhang, B Luo, Q Cai, C Li, J Jing, W Pan
US Patent 10,262,130, 2019
12019
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers
Z Ma, Q Cai, J Lin, B Luo, J Jing
Journal of Computer Security 27 (5), 547-580, 2019
12019
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients
Q Cai, J Lin, F Li, Q Wang, D Zha
International Conference on Security and Privacy in Communication Networks …, 2015
12015
mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries
Y Zhang, Q Cai, H Li, J Lin, W Wang
International Conference on Security and Privacy in Communication Systems …, 2023
2023
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature
Z Ma, S Li, J Lin, Q Cai, S Fan, F Zhang, B Luo
International Conference on Security and Privacy in Communication Systems …, 2022
2022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20