default search action
Dengguo Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j90]Hao Li, Shuyu Cao, Yaqing Chen, Min Zhang, Dengguo Feng:
TULAM: trajectory-user linking via attention mechanism. Sci. China Inf. Sci. 67(1) (2024) - [j89]Dengguo Feng, Yu Qin, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma:
Survey of research on confidential computing. IET Commun. 18(9): 535-556 (2024) - [j88]Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Dengguo Feng, Xuemin Shen:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. IEEE Trans. Dependable Secur. Comput. 21(2): 860-875 (2024) - [j87]Wei Xu, Hui Zhu, Yandong Zheng, Fengwei Wang, Jiafeng Hua, Dengguo Feng, Hui Li:
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE. IEEE Trans. Inf. Forensics Secur. 19: 7335-7348 (2024) - [j86]Axin Wu, Dengguo Feng, Min Zhang, Anjia Yang, Jialin Chi:
Privacy-Preserving Bilateral Multi-Receiver Matching With Revocability for Mobile Social Networks. IEEE Trans. Mob. Comput. 23(12): 11080-11090 (2024) - [c203]Zhaojun Lu, Weizong Yu, Peng Xu, Wei Wang, Jiliang Zhang, Dengguo Feng:
An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE. DAC 2024: 158:1-158:6 - [i59]Hao Li, Zheng Li, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang:
SeqMIA: Sequential-Metric Based Membership Inference Attack. CoRR abs/2407.15098 (2024) - [i58]Xichao Hu, Dengguo Feng, Lin Jiao, Yonglin Hao, Xinxin Gong, Yongqiang Li:
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods. IACR Cryptol. ePrint Arch. 2024: 1008 (2024) - 2023
- [j85]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
New method for combining Matsui's bounding conditions with sequential encoding method. Des. Codes Cryptogr. 91(11): 3603-3642 (2023) - [j84]Dan Zhu, Hui Zhu, Xiangyu Wang, Rongxing Lu, Dengguo Feng:
Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data. IEEE Trans. Cloud Comput. 11(2): 1286-1302 (2023) - [j83]Haining Yang, Dengguo Feng, Jing Qin:
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment. IEEE Trans. Dependable Secur. Comput. 20(5): 3873-3889 (2023) - [j82]Yu Fu, Jingqiang Lin, Dengguo Feng, Wei Wang, Mingyu Wang, Wenjie Wang:
RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure. ACM Trans. Embed. Comput. Syst. 22(6): 97:1-97:22 (2023) - [j81]Dan Zhu, Hui Zhu, Xiangyu Wang, Rongxing Lu, Dengguo Feng:
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images. IEEE Trans. Serv. Comput. 16(2): 913-926 (2023) - [c202]Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption Using Vector Decoding. ASIACRYPT (7) 2023: 157-189 - [c201]Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. CRYPTO (4) 2023: 3-36 - [i57]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang:
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 316 (2023) - [i56]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - [i55]Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption using Vector Decoding. IACR Cryptol. ePrint Arch. 2023: 1298 (2023) - [i54]Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. IACR Cryptol. ePrint Arch. 2023: 1564 (2023) - 2022
- [j80]Dengguo Feng:
Introduction to the special issue dedicated to Cunsheng Ding on the occasion of his 60th birthday. Adv. Math. Commun. 16(4): 667-670 (2022) - [j79]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V. Des. Codes Cryptogr. 90(10): 2449-2479 (2022) - [j78]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Xiaowei Li, Yang Xu:
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. J. Netw. Comput. Appl. 198: 103281 (2022) - [j77]Dengguo Feng, Kang Yang:
Concretely efficient secure multi-party computation protocols: survey and more. Secur. Saf. 1: 2021001 (2022) - [j76]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Trans. Symmetric Cryptol. 2022(2): 322-350 (2022) - [j75]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on Full-round FRIET. IACR Trans. Symmetric Cryptol. 2022(4): 105-119 (2022) - [c200]Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Xuemin Shen, Dengguo Feng:
Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation. GLOBECOM 2022: 3041-3046 - [i53]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang:
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method. IACR Cryptol. ePrint Arch. 2022: 626 (2022) - [i52]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on the Full-round FRIET. IACR Cryptol. ePrint Arch. 2022: 1121 (2022) - 2021
- [j74]Jingyi Feng, Hua Chen, Weiqiong Cao, Limin Fan, Wei Xi, Dengguo Feng:
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure. Sci. China Inf. Sci. 64(5) (2021) - [c199]Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Shaoyu Du:
FAN: A Lightweight Authenticated Cryptographic Algorithm. CT-RSA 2021: 299-325 - [c198]Yutong Ye, Min Zhang, Dengguo Feng:
Collecting Spatial Data Under Local Differential Privacy. MSN 2021: 120-127 - [c197]Zhangtan Li, Liang Cheng, Yang Zhang, Dengguo Feng:
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System. WASA (2) 2021: 123-134 - [i51]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Cryptol. ePrint Arch. 2021: 1435 (2021) - [i50]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V. IACR Cryptol. ePrint Arch. 2021: 1607 (2021) - 2020
- [j73]Lin Jiao, Yonglin Hao, Dengguo Feng:
Stream cipher designs: a review. Sci. China Inf. Sci. 63(3) (2020) - [j72]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li:
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks. IEEE Internet Things J. 7(4): 2791-2805 (2020) - [j71]Dan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li, Dengguo Feng:
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN. Inf. Sci. 514: 244-262 (2020) - [j70]Mimi Ma, Debiao He, Shuqin Fan, Dengguo Feng:
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. J. Inf. Secur. Appl. 50 (2020) - [j69]Mimi Ma, Shuqin Fan, Dengguo Feng:
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. J. Inf. Secur. Appl. 55: 102652 (2020) - [j68]Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng:
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. Secur. Commun. Networks 2020: 8957641:1-8957641:14 (2020) - [j67]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Shiyang He:
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks. IEEE Trans. Veh. Technol. 69(2): 2126-2140 (2020) - [j66]Mimi Ma, Min Luo, Shuqin Fan, Dengguo Feng:
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT. Wirel. Commun. Mob. Comput. 2020: 8850520:1-8850520:11 (2020) - [c196]Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. TrustCom 2020: 30-37 - [c195]Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng:
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. TrustCom 2020: 434-441 - [c194]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [i49]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Interactive Proofs for Quantum Black-Box Computations. IACR Cryptol. ePrint Arch. 2020: 1391 (2020)
2010 – 2019
- 2019
- [j65]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Yinghui Zhang, Xixiang Lv:
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks 87: 49-60 (2019) - [j64]Meihui Chen, Hua Chen, Limin Fan, Shaofeng Zhu, Wei Xi, Dengguo Feng:
A new discrete Fourier transform randomness test. Sci. China Inf. Sci. 62(3): 32107:1-32107:16 (2019) - [c193]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. CCS 2019: 1723-1740 - [c192]Jingbin Liu, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, Weifeng Luo:
Log-Based Control Flow Attestation for Embedded Devices. CSS (1) 2019: 117-132 - [c191]Yutong Ye, Min Zhang, Dengguo Feng, Hao Li, Jialin Chi:
Multiple Privacy Regimes Mechanism for Local Differential Privacy. DASFAA (2) 2019: 247-263 - [c190]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. RAID 2019: 105-120 - [c189]Shaofeng Zhu, Hua Chen, Wei Xi, Meihui Chen, Limin Fan, Dengguo Feng:
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs. TrustCom/BigDataSE 2019: 152-159 - [i48]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang:
On the (Quantum) Random Oracle Methodology: New Separations and More. IACR Cryptol. ePrint Arch. 2019: 1101 (2019) - 2018
- [j63]Wei Feng, Yu Qin, Shijun Zhao, Dengguo Feng:
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Networks 134: 167-182 (2018) - [j62]Jianxiong Shao, Yu Qin, Dengguo Feng:
Formal analysis of HMAC authorisation in the TPM2.0 specification. IET Inf. Secur. 12(2): 133-140 (2018) - [j61]Bin Zhang, Chao Xu, Dengguo Feng:
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking. J. Cryptol. 31(2): 394-433 (2018) - [j60]Wei Feng, Yu Qin, Dengguo Feng:
Using mobile phones to enhance computing platform trust. Telecommun. Syst. 69(2): 187-205 (2018) - [c188]Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng:
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs. CARDIS 2018: 125-139 - [i47]Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng:
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs. IACR Cryptol. ePrint Arch. 2018: 961 (2018) - 2017
- [c187]Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices Based on PUFs. CANS 2017: 325-346 - [c186]Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. Inscrypt 2017: 196-208 - [c185]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - [c184]Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng:
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. ICICS 2017: 3-16 - [c183]Liang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng:
Automatically assessing crashes from heap overflows. ASE 2017: 274-279 - [c182]Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang:
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. SecureComm 2017: 585-605 - [c181]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
How Well Can WordNet Measure Privacy: A Comparative Study? SKG 2017: 45-49 - [c180]Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng:
Towards Efficient Heap Overflow Discovery. USENIX Security Symposium 2017: 989-1006 - [i46]Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices based on PUFs. IACR Cryptol. ePrint Arch. 2017: 991 (2017) - [i45]Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng:
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version). IACR Cryptol. ePrint Arch. 2017: 1106 (2017) - 2016
- [b1]Chuan Kun Wu, Dengguo Feng:
Boolean Functions and Their Applications in Cryptography. Advances in Computer Science and Technology, Springer 2016, ISBN 978-3-662-48863-8, pp. 1-256 - [j59]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [j58]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards optimal leakage exploitation rate in template attacks. Secur. Commun. Networks 9(16): 3116-3126 (2016) - [j57]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Theoretical and practical aspects of multiple samples correlation power analysis. Secur. Commun. Networks 9(18): 5166-5177 (2016) - [c179]Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng:
Attacks and Defence on Android Free Floating Windows. AsiaCCS 2016: 759-770 - [c178]Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng:
Automated Security Proof of Cryptographic Support Commands in TPM 2.0. ICICS 2016: 431-441 - [c177]Jingyi Feng, Hua Chen, Si Gao, Limin Fan, Dengguo Feng:
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. ICISC 2016: 317-332 - [c176]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146 - [c175]Jianxiong Shao, Yu Qin, Dengguo Feng:
Computational Soundness Results for Stateful Applied π Calculus. POST 2016: 254-275 - [c174]Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu:
Multiple Handshakes Security of TLS 1.3 Candidates. IEEE Symposium on Security and Privacy 2016: 486-505 - [c173]Cheng Hong, Yifu Li, Min Zhang, Dengguo Feng:
Fast Multi-keywords Search over Encrypted Cloud Data. WISE (1) 2016: 433-446 - [i44]Jianxiong Shao, Yu Qin, Dengguo Feng:
Computational Soundness Results for Stateful Applied pi Calculus. CoRR abs/1601.00363 (2016) - [i43]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). IACR Cryptol. ePrint Arch. 2016: 494 (2016) - 2015
- [j56]Zhenqing Shi, Bin Zhang, Dengguo Feng:
Practical-time related-key attack on Hummingbird-2. IET Inf. Secur. 9(6): 321-327 (2015) - [j55]XiaoBo Chu, Dengguo Feng:
On the provable security of TPM2.0 cryptography APIs. Int. J. Embed. Syst. 7(3/4): 230-243 (2015) - [j54]Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:
Security analysis of SM2 key exchange protocol in TPM2.0. Secur. Commun. Networks 8(3): 383-395 (2015) - [j53]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Mahalanobis distance similarity measure based distinguisher for template attack. Secur. Commun. Networks 8(5): 769-777 (2015) - [j52]Bingbing Xia, Xianfeng Zhao, Dengguo Feng, Mingsheng Wang:
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter. Trans. Data Hiding Multim. Secur. 10: 1-20 (2015) - [c172]Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. ACSAC 2015: 331-340 - [c171]Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang:
Formal Analysis of Enhanced Authorization in the TPM 2.0. AsiaCCS 2015: 273-284 - [c170]Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. ICICS 2015: 152-168 - [c169]Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen:
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences. ICICS 2015: 478-484 - [c168]Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:
Operating System Security Policy Hardening via Capability Dependency Graphs. ISPEC 2015: 3-17 - [c167]Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng:
A Rapid and Scalable Method for Android Application Repackaging Detection. ISPEC 2015: 349-364 - [c166]Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. ISPEC 2015: 469-484 - [c165]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - [c164]Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng:
Improving Accuracy of Static Integer Overflow Detection in Binary. RAID 2015: 247-269 - [c163]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
Access Control for Privacy Protection for Dynamic and Correlated Databases. SmartCity 2015: 775-779 - [c162]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227 - [c161]Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng:
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone. TrustCom/BigDataSE/ISPA (1) 2015: 41-48 - [i42]Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. IACR Cryptol. ePrint Arch. 2015: 22 (2015) - [i41]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. IACR Cryptol. ePrint Arch. 2015: 654 (2015) - 2014
- [j51]Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6(4): 335-358 (2014) - [j50]HongDa Li, Dengguo Feng:
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP. Sci. China Inf. Sci. 57(1): 1-14 (2014) - [j49]Liang Cheng, Yang Zhang, Zhihui Han, Yi Deng, Xiaoshan Sun, Dengguo Feng:
Evaluating and comparing the quality of access control in different operating systems. Comput. Secur. 47: 26-40 (2014) - [j48]Fanbao Liu, Yi Liu, Tao Xie, Dengguo Feng, Yumeng Feng:
Fast password recovery attack: application to APOP. J. Intell. Manuf. 25(2): 251-261 (2014) - [c160]Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu:
ExBLACR: Extending BLACR System. ACISP 2014: 397-412 - [c159]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. TrustED@CCS 2014: 25-36 - [c158]Zhiquan Lv, Min Zhang, Dengguo Feng:
Multi-user Searchable Encryption with Efficient Access Control for Cloud Storage. CloudCom 2014: 366-373 - [c157]Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng:
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices. ICICS 2014: 31-48 - [c156]Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu:
A Clustering Approach for Privacy-Preserving in Social Networks. ICISC 2014: 193-204 - [c155]Chao Xu, Bin Zhang, Dengguo Feng:
Linear Cryptanalysis of FASER128/256 and TriviA-ck. INDOCRYPT 2014: 237-254 - [c154]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks More Effectively? INTRUST 2014: 168-183 - [c153]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Template Attacks Based on Priori Knowledge. INTRUST 2014: 346-363 - [c152]Weijin Wang, Yu Qin, Dengguo Feng:
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. ISPEC 2014: 144-158 - [c151]Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng:
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication. ISC 2014: 33-53 - [c150]Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng:
Expressive and Secure Searchable Encryption in the Public Key Setting. ISC 2014: 364-376 - [c149]