What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jian Weng
Google Scholar
94
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
AuditPCH: Auditable Payment Channel Hub With Privacy Protection.
Yuxian Li
Jian Weng
Junzuo Lai
Yingjiu Li
Jiahe Wu
Ming Li
Jianfei Sun
Pengfei Wu
Robert H. Deng
2025
journals/tifs
MoCC-BD-FID: Multi-Objective Clustering Combination-Based Backdoor Defense for Federated Intrusion Detection of Industrial Control Systems.
Guo-Qiang Zeng
Jun-Min Shao
Kang-Di Lu
Guang-Gang Geng
Jian Weng
2025
journals/tifs
JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks.
Tiewei Qin
Bingwen Feng
Bingbing Zhou
Jilian Zhang
Zhihua Xia
Jian Weng
Wei Lu
2025
journals/tifs
Efficient and Privacy-Preserving Ride Matching Over Road Networks Against Malicious ORH Server.
Mingtian Zhang
Anjia Yang
Jian Weng
Min-Rong Chen
Huang Zeng
Yi Liu
Xiaoli Liu
Zhihua Xia
2025
journals/tifs
Robust Generative Steganography for Image Hiding Using Concatenated Mappings.
Liyan Chen
Bingwen Feng
Zhihua Xia
Wei Lu
Jian Weng
2025
journals/tifs
Fair and Verifiable Identity-Based Broadcast Proxy Re-Encryption With Designated Sender Feasible for Medical Internet of Things.
Liqing Chen
Shiyu Chen
Hao Zhang
Jian Weng
2025
conf/sp
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound.
Yi Liu
Junzuo Lai
Peng Yang
Qi Wang
Anjia Yang
Siu-Ming Yiu
Jian Weng
2025
journals/tifs
LapGLP: Approximating Infinite-Layer Graph Convolutions With Laplacian for Federated Recommendation.
Zhi Li
Chaozhuo Li
Feiran Huang
Xi Zhang
Jian Weng
Philip S. Yu
2025
conf/uss
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication.
Yang Yang
Guomin Yang
Yingjiu Li
Minming Huang
Zilin Shen
Imtiaz Karim
Ralf Sasse
David A. Basin
Elisa Bertino
Jian Weng
HweeHwa Pang
Robert H. Deng
2025
conf/uss
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification.
Yijia Chang
Hanrui Jiang
Chao Lin
Xinyi Huang
Jian Weng
2024
journals/tches
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
Tianrun Yu
Chi Cheng
Zilong Yang
Yingchen Wang
Yanbin Pan
Jian Weng
2024
journals/compsec
Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search.
Jun-Min Shao
Guo-Qiang Zeng
Kang-Di Lu
Guang-Gang Geng
Jian Weng
2024
journals/istr
Enabling privacy-preserving medication analysis in distributed EHR systems.
Yuanmeng Zhao
Jian Weng
Jia-Nan Liu
Mei Cai
2024
journals/cic
Optimizing c-sum BKW and Faster Quantum Variant for LWE.
Jinzheng Cao
Qingfeng Cheng
Jian Weng
2024
journals/tifs
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking.
Xiangli Xiao
Yushu Zhang
Zhongyun Hua
Zhihua Xia
Jian Weng
2024
journals/tifs
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
Yushu Zhang
Junhao Ji
Wenying Wen
Youwen Zhu
Zhihua Xia
Jian Weng
2024
journals/tifs
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query.
Liqing Chen
Jiayi Li
Jiguo Li
Jian Weng
2024
journals/tifs
Proof of Unlearning: Definitions and Instantiation.
Jia-Si Weng
Shenglong Yao
Yuefeng Du
Junjie Huang
Jian Weng
Cong Wang
2024
journals/joc
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
Qianqian Yang
Ling Song
Nana Zhang
Danping Shi
Libo Wang
Jiahao Zhao
Lei Hu
Jian Weng
2024
conf/provsec
SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation.
Tao Huang
Jian Weng
Jia-Si Weng
Min-Rong Chen
Ming Li
2024
conf/esorics
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices.
Feixiang Zhao
Huaxiong Wang
Jian Weng
2024
conf/ndss
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
Yang Yang
Robert H. Deng
Guomin Yang
Yingjiu Li
HweeHwa Pang
Minming Huang
Rui Shi
Jian Weng
2024
conf/eurocrypt
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
Ling Song
Qianqian Yang
Yincen Chen
Lei Hu
Jian Weng
2024
conf/asiacrypt
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation.
Zhengan Huang
Junzuo Lai
Gongxian Zeng
Jian Weng
2024
conf/asiacrypt
Generic Differential Key Recovery Attacks and Beyond.
Ling Song
Huimin Liu
Qianqian Yang
Yincen Chen
Lei Hu
Jian Weng
2023
journals/compsec
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems.
Jia-Cheng Huang
Guo-Qiang Zeng
Guang-Gang Geng
Jian Weng
Kang-Di Lu
Yu Zhang
2023
journals/tifs
Fuzzy Identity-Based Matchmaking Encryption and Its Application.
Axin Wu
Weiqi Luo
Jian Weng
Anjia Yang
Jinghang Wen
2023
journals/tifs
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing.
Jiasi Weng
Jian Weng
Gui Tang
Anjia Yang
Ming Li
Jia-Nan Liu
2023
journals/tifs
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking.
Hongshuang Hu
Yongdong Wu
Jian Weng
Kaimin Wei
Zhiquan Liu
Feiran Huang
Yinyan Zhang
2023
journals/tifs
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
Xueqiao Liu
Guomin Yang
Willy Susilo
Kai He
Robert H. Deng
Jian Weng
2023
conf/acns
Predicate Private Set Intersection with Linear Complexity.
Yaxi Yang
Jian Weng
Yufeng Yi
Changyu Dong
Leo Yu Zhang
Jianying Zhou
2023
conf/ndss
Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Caiqin Dong
Jian Weng
Jia-Nan Liu
Yue Zhang
Yao Tong
Anjia Yang
Yudan Cheng
Shun Hu
2023
conf/eurocrypt
Asymmetric Group Message Franking: Definitions and Constructions.
Junzuo Lai
Gongxian Zeng
Zhengan Huang
Siu Ming Yiu
Xin Mu
Jian Weng
2023
conf/asiacrypt
Non-interactive Zero-Knowledge Functional Proofs.
Gongxian Zeng
Junzuo Lai
Zhengan Huang
Linru Zhang
Xiangning Wang
Kwok-Yan Lam
Huaxiong Wang
Jian Weng
2023
conf/asiacrypt
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
Yi Liu
Junzuo Lai
Qi Wang
Xianrui Qin
Anjia Yang
Jian Weng
2022
journals/tifs
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
Yanbing Ren
Xinghua Li
Yinbin Miao
Bin Luo
Jian Weng
Kim-Kwang Raymond Choo
Robert H. Deng
2022
journals/tifs
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features.
Shi-Jie Xu
Guang-Gang Geng
Xiao-Bo Jin
Dongjie Liu
Jian Weng
2022
journals/tifs
Improving Generalization by Commonality Learning in Face Forgery Detection.
Peipeng Yu
Jianwei Fei
Zhihua Xia
Zhili Zhou
Jian Weng
2022
conf/asiacrypt
Anonymous Public Key Encryption Under Corruptions.
Zhengan Huang
Junzuo Lai
Shuai Han
Lin Lyu
Jian Weng
2022
conf/asiacrypt
Identity-Based Matchmaking Encryption from Standard Assumptions.
Jie Chen
Yu Li
Jinming Wen
Jian Weng
2022
conf/asiacrypt
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
Ling Song
Nana Zhang
Qianqian Yang
Danping Shi
Jiahao Zhao
Lei Hu
Jian Weng
2022
conf/africacrypt
EHNP Strikes Back: Analyzing SM2 Implementations.
Jinzheng Cao
Qingfeng Cheng
Jian Weng
2021
journals/tifs
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting.
Yang Yang
Zhangshuang Guan
Zhiguo Wan
Jian Weng
HweeHwa Pang
Robert H. Deng
2021
journals/tifs
Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI.
Hongliang He
Xizhao Luo
Jian Weng
Kaimin Wei
2021
conf/ccs
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Jiaming Yuan
Yingjiu Li
Jian Weng
Robert H. Deng
2021
conf/crypto
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Yaobin Shen
Lei Wang
Dawu Gu
Jian Weng
2021
conf/esorics
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE.
Xiaojian Liang
Jian Weng
Anjia Yang
Lisha Yao
Zike Jiang
Zhenghao Wu
2021
conf/icics
Efficient and Fully Secure Lattice-Based IBE with Equality Test.
Zhenghao Wu
Jian Weng
Anjia Yang
Lisha Yao
Xiaojian Liang
Zike Jiang
Jinghang Wen
2021
conf/asiacrypt
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
Junzuo Lai
Rupeng Yang
Zhengan Huang
Jian Weng
2020
journals/tifs
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
Xu An Wang
Kim-Kwang Raymond Choo
Jian Weng
Jianfeng Ma
2020
conf/uss
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Yue Zhang
Jian Weng
Rajib Dey
Yier Jin
Zhiqiang Lin
Xinwen Fu
2020
conf/esorics
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Shengmin Xu
Jia-Ch'ng Loh
Jian Weng
Robert H. Deng
2020
conf/asiacrypt
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
Xiangyu Liu
Shengli Liu
Dawu Gu
Jian Weng
2019
journals/istr
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
Hiroaki Anada
Takanori Yasuda
Junpei Kawamoto
Jian Weng
Kouichi Sakurai
2019
conf/asiacrypt
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Yu Yu
Jiang Zhang
Jian Weng
Chun Guo
Xiangxue Li
2018
journals/compsec
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Zhuo Wei
Yongdong Wu
Yanjiang Yang
Zheng Yan
Qingqi Pei
Yajuan Xie
Jian Weng
2018
journals/tifs
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage.
Minxin Du
Qian Wang
Meiqi He
Jian Weng
2017
journals/tifs
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
Zhangjie Fu
Fengxiao Huang
Kui Ren
Jian Weng
Cong Wang
2017
conf/ccs
Vulnerable Implicit Service: A Revisit.
Lingguang Lei
Yi He
Kun Sun
Jiwu Jing
Yuewu Wang
Qi Li
Jian Weng
2017
conf/cns
Data verification in information-centric networking with efficient revocable certificateless signature.
Qingji Zheng
Qi Li
Aytac Azgin
Jian Weng
2017
conf/pkc
Tightly Secure IBE Under Constant-Size Master Public Key.
Jie Chen
Junqing Gong
Jian Weng
2017
conf/icics
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Wenjie Yang
Jian Weng
Futai Zhang
2016
journals/tifs
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
Ximeng Liu
Robert H. Deng
Kim-Kwang Raymond Choo
Jian Weng
2016
conf/ccs
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Heyi Tang
Yong Cui
Chaowen Guan
Jianping Wu
Jian Weng
Kui Ren
2016
conf/ccs
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Yanjiang Yang
Haibing Lu
Joseph K. Liu
Jian Weng
Youcheng Zhang
Jianying Zhou
2016
conf/ccs
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He
Jian Weng
Jia-Nan Liu
Joseph K. Liu
Wei Liu
Robert H. Deng
2016
conf/acisp
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He
Jian Weng
Man Ho Au
Yijun Mao
Robert H. Deng
2016
conf/pkc
CCA-Secure Keyed-Fully Homomorphic Encryption.
Junzuo Lai
Robert H. Deng
Changshe Ma
Kouichi Sakurai
Jian Weng
2015
conf/crypto
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Yu Yu
Dawu Gu
Xiangxue Li
Jian Weng
2015
conf/tcc
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Yu Yu
Dawu Gu
Xiangxue Li
Jian Weng
2014
conf/ccs
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Xiangxue Li
Yu Yu
Qiang Li
Haifeng Qian
Yuan Zhou
Jian Weng
2014
conf/ccs
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Xiangxue Li
Yu Yu
Qiang Li
Haifeng Qian
Yuan Zhou
Jian Weng
2014
conf/ccs
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Junzuo Lai
Robert H. Deng
Yingjiu Li
Jian Weng
2014
conf/provsec
Fine-Grained Conditional Proxy Re-Encryption and Application.
Yanjiang Yang
Haibing Lu
Jian Weng
Youcheng Zhang
Kouichi Sakurai
2014
conf/esorics
Verifiable Computation over Large Database with Incremental Updates.
Xiaofeng Chen
Jin Li
Jian Weng
Jianfeng Ma
Wenjing Lou
2014
conf/esorics
Authorized Keyword Search on Encrypted Data.
Jie Shi
Junzuo Lai
Yingjiu Li
Robert H. Deng
Jian Weng
2014
conf/esorics
Verifiable Computation on Outsourced Encrypted Data.
Junzuo Lai
Robert H. Deng
HweeHwa Pang
Jian Weng
2014
conf/eurocrypt
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Junzuo Lai
Robert H. Deng
Shengli Liu
Jian Weng
Yunlei Zhao
2013
journals/tifs
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Junzuo Lai
Robert H. Deng
Chaowen Guan
Jian Weng
2013
conf/acns
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Xiangxue Li
Haifeng Qian
Yu Yu
Yuan Zhou
Jian Weng
2013
conf/icics
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Xiangxue Li
Haifeng Qian
Yu Yu
Jian Weng
Yuan Zhou
2013
conf/ctrsa
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Shengli Liu
Jian Weng
Yunlei Zhao
2013
conf/ctrsa
Accountable Authority Identity-Based Encryption with Public Traceability.
Junzuo Lai
Robert H. Deng
Yunlei Zhao
Jian Weng
2013
conf/asiacrypt
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters.
Yu Yu
Xiangxue Li
Jian Weng
2012
conf/icics
A Generic Approach for Providing Revocation Support in Secret Handshake.
Yanjiang Yang
Haibing Lu
Jian Weng
Xuhua Ding
Jianying Zhou
2012
conf/ctrsa
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Goichiro Hanaoka
Yutaka Kawai
Noboru Kunihiro
Takahiro Matsuda
Jian Weng
Rui Zhang
Yunlei Zhao
2011
conf/pkc
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Jian Weng
Yunlei Zhao
Goichiro Hanaoka
2010
conf/africacrypt
Efficient Unidirectional Proxy Re-Encryption.
Sherman S. M. Chow
Jian Weng
Yanjiang Yang
Robert H. Deng
2009
conf/ccs
Conditional proxy re-encryption secure against chosen-ciphertext attack.
Jian Weng
Robert H. Deng
Xuhua Ding
Cheng-Kang Chu
Junzuo Lai
2009
conf/acisp
Conditional Proxy Broadcast Re-Encryption.
Cheng-Kang Chu
Jian Weng
Sherman S. M. Chow
Jianying Zhou
Robert H. Deng
2009
conf/provsec
Self-enforcing Private Inference Control.
Yanjiang Yang
Yingjiu Li
Jian Weng
Jianying Zhou
Feng Bao
2009
conf/acsac
A New Approach for Anonymous Password Authentication.
Yanjiang Yang
Jianying Zhou
Jian Weng
Feng Bao
2008
conf/ctrsa
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Jian Weng
Shengli Liu
Kefei Chen
Dong Zheng
Weidong Qiu
2008
conf/cans
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Robert H. Deng
Jian Weng
Shengli Liu
Kefei Chen
Coauthors
Anjia Yang
(8)
Axin Wu
(1)
Aytac Azgin
(1)
Bin Luo
(1)
Bingbing Zhou
(1)
Bingwen Feng
(2)
Caiqin Dong
(1)
Changshe Ma
(1)
Changyu Dong
(1)
Chao Lin
(1)
Chaowen Guan
(2)
Chaozhuo Li
(1)
Cheng-Kang Chu
(2)
Chi Cheng
(1)
Chun Guo
(1)
Cong Wang
(2)
Danping Shi
(2)
David A. Basin
(1)
Dawu Gu
(4)
Dong Zheng
(1)
Dongjie Liu
(1)
Elisa Bertino
(1)
Feiran Huang
(2)
Feixiang Zhao
(1)
Feng Bao
(2)
Fengxiao Huang
(1)
Futai Zhang
(1)
Geong Sen Poh
(2)
Goichiro Hanaoka
(2)
Gongxian Zeng
(3)
Guang-Gang Geng
(4)
Gui Tang
(1)
Guo-Qiang Zeng
(3)
Guomin Yang
(3)
Haibing Lu
(3)
Haifeng Qian
(4)
Hanrui Jiang
(1)
Hao Zhang
(1)
Heyi Tang
(1)
Hiroaki Anada
(1)
Hongliang He
(1)
Hongshuang Hu
(1)
Huang Zeng
(1)
Huaxiong Wang
(2)
Huimin Liu
(1)
HweeHwa Pang
(4)
Imtiaz Karim
(1)
Jia-Ch'ng Loh
(1)
Jia-Cheng Huang
(1)
Jia-Nan Liu
(4)
Jia-Si Weng
(2)
Jiahao Zhao
(2)
Jiahe Wu
(1)
Jiaming Yuan
(1)
Jian Weng
(94)
Jianfei Sun
(1)
Jianfeng Ma
(2)
Jiang Zhang
(1)
Jianping Wu
(1)
Jianting Ning
(2)
Jianwei Fei
(1)
Jianying Zhou
(6)
Jiasi Weng
(1)
Jiayi Li
(1)
Jie Chen
(2)
Jie Shi
(1)
Jiguo Li
(1)
Jilian Zhang
(1)
Jin Li
(1)
Jinghang Wen
(2)
Jinming Wen
(1)
Jinzheng Cao
(2)
Jiwu Jing
(1)
Joseph K. Liu
(2)
Jun-Min Shao
(2)
Junhao Ji
(1)
Junjie Huang
(1)
Junpei Kawamoto
(1)
Junqing Gong
(1)
Junzuo Lai
(16)
Kai He
(3)
Kaimin Wei
(2)
Kang-Di Lu
(3)
Kefei Chen
(2)
Kim-Kwang Raymond Choo
(3)
Kouichi Sakurai
(3)
Kui Ren
(2)
Kun Sun
(1)
Kwok-Yan Lam
(1)
Lei Hu
(4)
Lei Wang
(1)
Leo Yu Zhang
(1)
Libo Wang
(1)
Lin Lyu
(1)
Ling Song
(4)
Lingguang Lei
(1)
Linru Zhang
(1)
Liqing Chen
(2)
Lisha Yao
(2)
Liyan Chen
(1)
Man Ho Au
(1)
Mei Cai
(1)
Meiqi He
(1)
Min-Rong Chen
(2)
Ming Li
(3)
Mingtian Zhang
(1)
Minming Huang
(2)
Minxin Du
(1)
Nana Zhang
(2)
Noboru Kunihiro
(1)
Peipeng Yu
(1)
Peng Yang
(1)
Pengfei Wu
(1)
Philip S. Yu
(1)
Qi Li
(2)
Qi Wang
(2)
Qian Wang
(1)
Qiang Li
(2)
Qianqian Yang
(4)
Qingfeng Cheng
(2)
Qingji Zheng
(1)
Qingqi Pei
(1)
Rajib Dey
(1)
Ralf Sasse
(1)
Robert H. Deng
(22)
Rui Shi
(1)
Rui Zhang
(1)
Rupeng Yang
(1)
Shengli Liu
(5)
Shenglong Yao
(1)
Shengmin Xu
(1)
Sherman S. M. Chow
(2)
Shi-Jie Xu
(1)
Shiyu Chen
(1)
Shuai Han
(1)
Shun Hu
(1)
Siu Ming Yiu
(1)
Siu-Ming Yiu
(1)
Takahiro Matsuda
(1)
Takanori Yasuda
(1)
Tao Huang
(1)
Tianrun Yu
(1)
Tiewei Qin
(1)
Wei Liu
(1)
Wei Lu
(2)
Weidong Qiu
(1)
Weiqi Luo
(1)
Wenjie Yang
(1)
Wenjing Lou
(1)
Wenying Wen
(1)
Willy Susilo
(1)
Xi Zhang
(1)
Xiangli Xiao
(1)
Xiangning Wang
(1)
Xiangxue Li
(8)
Xiangyu Liu
(1)
Xianrui Qin
(1)
Xiao-Bo Jin
(1)
Xiaofeng Chen
(1)
Xiaojian Liang
(2)
Xiaoli Liu
(1)
Ximeng Liu
(1)
Xin Mu
(1)
Xinghua Li
(1)
Xinwen Fu
(1)
Xinyi Huang
(3)
Xizhao Luo
(1)
Xu An Wang
(1)
Xueqiao Liu
(1)
Xuhua Ding
(2)
Yajuan Xie
(1)
Yanbin Pan
(1)
Yanbing Ren
(1)
Yang Yang
(3)
Yanjiang Yang
(7)
Yao Tong
(1)
Yaobin Shen
(1)
Yaxi Yang
(1)
Yi He
(1)
Yi Liu
(3)
Yier Jin
(1)
Yijia Chang
(1)
Yijun Mao
(1)
Yinbin Miao
(1)
Yincen Chen
(2)
Yingchen Wang
(1)
Yingjiu Li
(7)
Yinyan Zhang
(1)
Yong Cui
(1)
Yongdong Wu
(2)
Youcheng Zhang
(2)
Youwen Zhu
(1)
Yu Li
(1)
Yu Yu
(8)
Yu Zhang
(1)
Yuan Zhou
(4)
Yuanmeng Zhao
(1)
Yudan Cheng
(1)
Yue Zhang
(2)
Yuefeng Du
(1)
Yuewu Wang
(1)
Yufeng Yi
(1)
Yunlei Zhao
(5)
Yushu Zhang
(2)
Yutaka Kawai
(1)
Yuxian Li
(1)
Zhangjie Fu
(1)
Zhangshuang Guan
(1)
Zheng Yan
(1)
Zhengan Huang
(5)
Zhenghao Wu
(2)
Zhi Li
(1)
Zhiguo Wan
(1)
Zhihua Xia
(6)
Zhili Zhou
(1)
Zhiqiang Lin
(1)
Zhiquan Liu
(1)
Zhongyun Hua
(1)
Zhuo Wei
(1)
Zike Jiang
(2)
Zilin Shen
(1)
Zilong Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to