What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xinyi Huang
Google Scholar
85
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users.
Jie Zhang
Futai Zhang
Xinyi Huang
2025
journals/tifs
FedGhost: Data-Free Model Poisoning Enhancement in Federated Learning.
Zhuoran Ma
Xinyi Huang
Zhuzhu Wang
Zhan Qin
Xiangyu Wang
Jianfeng Ma
2025
conf/sp
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning.
Zhen Sun
Tianshuo Cong
Yule Liu
Chenhao Lin
Xinlei He
Rongmao Chen
Xingshuo Han
Xinyi Huang
2025
conf/crypto
Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter.
Yijia Chang
Rongmao Chen
Chao Lin
Songze Li
Xinyi Huang
2025
conf/uss
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification.
Yijia Chang
Hanrui Jiang
Chao Lin
Xinyi Huang
Jian Weng
2025
conf/uss
From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components.
Lijin Wang
Jingjing Wang
Tianshuo Cong
Xinlei He
Zhan Qin
Xinyi Huang
2024
journals/istr
A review and implementation of physical layer channel key generation in the Internet of Things.
Hong Zhao
Enting Guo
Zhuotao Lian
Yong Zhao
Xinyi Huang
Chunhua Su
2024
journals/tifs
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks.
Xiaohu Wang
Chao Lin
Xinyi Huang
Debiao He
2024
journals/tifs
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs.
Lang Pu
Chao Lin
Jingjing Gu
Xinyi Huang
Debiao He
2024
journals/tifs
OLBS: Oblivious Location-Based Services.
Jinguang Han
Willy Susilo
Nan Li
Xinyi Huang
2024
journals/tifs
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection.
Guowei Ling
Fei Tang
Chaochao Cai
Jinyong Shan
Haiyang Xue
Wulu Li
Peng Tang
Xinyi Huang
Weidong Qiu
2024
journals/tifs
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture.
Xiaohan Hao
Chao Lin
Wenhan Dong
Xinyi Huang
Hui Xiong
2024
conf/acisp
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Jialiu Cheng
Yi Wang
Rongmao Chen
Xinyi Huang
2024
conf/pkc
Parameter-Hiding Order-Revealing Encryption Without Pairings.
Cong Peng
Rongmao Chen
Yi Wang
Debiao He
Xinyi Huang
2023
journals/tifs
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
Guowen Xu
Shengmin Xu
Jinhua Ma
Jianting Ning
Xinyi Huang
2023
journals/tifs
Accountable and Fine-Grained Controllable Rewriting in Blockchains.
Shengmin Xu
Xinyi Huang
Jiaming Yuan
Yingjiu Li
Robert H. Deng
2023
journals/tifs
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
Xiaotong Zhou
Debiao He
Jianting Ning
Min Luo
Xinyi Huang
2023
journals/tifs
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
Kai Zhang
Xiwen Wang
Jianting Ning
Junqing Gong
Xinyi Huang
2023
journals/tifs
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
Xiaotong Zhou
Debiao He
Jianting Ning
Min Luo
Xinyi Huang
2023
journals/tifs
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services.
Kai Zhang
Xiwen Wang
Jianting Ning
Xinyi Huang
2023
conf/icics
Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.
Hong Zhao
Enting Guo
Chunhua Su
Xinyi Huang
2023
conf/asiacrypt
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes.
Yongcheng Song
Jiang Zhang
Xinyi Huang
Wei Wu
2023
conf/asiacrypt
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
Yi Wang
Rongmao Chen
Xinyi Huang
Moti Yung
2022
journals/istr
Controllable software licensing system for sub-licensing.
Manli Yuan
Yi Mu
Fatemeh Rezaeibagha
Li Xu
Xinyi Huang
2022
journals/tifs
VILS: A Verifiable Image Licensing System.
Haixia Chen
Xinyi Huang
Jianting Ning
Futai Zhang
Chao Lin
2022
journals/tifs
Redactable Blockchain in Decentralized Setting.
Jinhua Ma
Shengmin Xu
Jianting Ning
Xinyi Huang
Robert H. Deng
2022
journals/tifs
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
Kai Zhang
Zhe Jiang
Jianting Ning
Xinyi Huang
2022
conf/sp
How to Attack and Generate Honeywords.
Ding Wang
Yunkai Zou
Qiying Dong
Yuanming Song
Xinyi Huang
2022
conf/acns
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
Liang Zhao
Ze Chen
Liqun Chen
Xinyi Huang
2022
conf/esorics
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
Jiaojiao Wu
Jianfeng Wang
Xinwei Yong
Xinyi Huang
Xiaofeng Chen
2022
conf/esorics
Efficient Hash-Based Redactable Signature for Smart Grid Applications.
Fei Zhu
Xun Yi
Alsharif Abuadbba
Junwei Luo
Surya Nepal
Xinyi Huang
2021
journals/tifs
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
Chao Lin
Debiao He
Xinyi Huang
Kim-Kwang Raymond Choo
2021
journals/tifs
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
Yusheng Xia
Jinshu Su
Rongmao Chen
Xinyi Huang
2021
journals/tifs
K-Time Modifiable and Epoch-Based Redactable Blockchain.
Shengmin Xu
Jianting Ning
Jinhua Ma
Xinyi Huang
Robert H. Deng
2021
journals/tifs
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
Shengmin Xu
Jianting Ning
Xinyi Huang
Jianying Zhou
Robert H. Deng
2021
conf/ccs
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Jiaming Yuan
Yingjiu Li
Jian Weng
Robert H. Deng
2021
conf/crypto
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
Yi Wang
Rongmao Chen
Guomin Yang
Xinyi Huang
Baosheng Wang
Moti Yung
2021
conf/provsec
Linearly Homomorphic Signatures with Designated Combiner.
Cheng-Jun Lin
Rui Xue
Xinyi Huang
2021
conf/asiacrypt
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE.
Yi Wang
Rongmao Chen
Xinyi Huang
Jianting Ning
Baosheng Wang
Moti Yung
2020
journals/compsec
Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Jianghua Liu
Jingyu Hou
Xinyi Huang
Yang Xiang
Tianqing Zhu
2020
journals/tifs
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
Chao Lin
Debiao He
Xinyi Huang
Muhammad Khurram Khan
Kim-Kwang Raymond Choo
2020
conf/provsec
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Fei Zhu
Xun Yi
Sharif Abuadbba
Ibrahim Khalil
Xu Yang
Surya Nepal
Xinyi Huang
2020
conf/esorics
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Shengmin Xu
Jia-Ch'ng Loh
Jian Weng
Robert H. Deng
2020
conf/asiacrypt
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
Rongmao Chen
Xinyi Huang
Moti Yung
2018
journals/tifs
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
Meixia Miao
Jianfeng Ma
Xinyi Huang
Qian Wang
2018
conf/acisp
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Jian Shen
Dengzhi Liu
Xiaofeng Chen
Xinyi Huang
Jiageng Chen
Mingwu Zhang
2018
conf/esorics
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Jianghua Liu
Jinhua Ma
Wanlei Zhou
Yang Xiang
Xinyi Huang
2018
conf/ndss
A Security Analysis of Honeywords.
Ding Wang
Haibo Cheng
Ping Wang
Jeff Yan
Xinyi Huang
2017
journals/compsec
Editorial: Special issue on security data science and cyber threat management.
Xinyi Huang
Joseph K. Liu
Javier López
2017
journals/tifs
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
Yong Yu
Man Ho Au
Giuseppe Ateniese
Xinyi Huang
Willy Susilo
Yuanshun Dai
Geyong Min
2017
journals/tifs
Zipf's Law in Passwords.
Ding Wang
Haibo Cheng
Ping Wang
Xinyi Huang
Gaopeng Jian
2017
journals/tifs
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
Jian Shen
Jun Shen
Xiaofeng Chen
Xinyi Huang
Willy Susilo
2017
journals/tifs
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
Steven Gordon
Xinyi Huang
Atsuko Miyaji
Chunhua Su
Karin Sumongkayothin
Komwut Wipusitwarakun
2017
conf/ccs
Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Ding Wang
Qianchen Gu
Xinyi Huang
Ping Wang
2017
conf/ccs
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Yuexin Zhang
Yang Xiang
Xinyi Huang
2017
conf/acisp
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Yanjiang Yang
Joseph K. Liu
Zhuo Wei
Xinyi Huang
2017
conf/icics
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Zhiqiang Xu
Debiao He
Xinyi Huang
2016
journals/tifs
Server-Aided Public Key Encryption With Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xinyi Huang
Xiaofen Wang
Yongjun Wang
2016
journals/tifs
Hierarchical and Shared Access Control.
Arcangelo Castiglione
Alfredo De Santis
Barbara Masucci
Francesco Palmieri
Aniello Castiglione
Jin Li
Xinyi Huang
2016
journals/tifs
Cryptographic Hierarchical Access Control for Dynamic Structures.
Arcangelo Castiglione
Alfredo De Santis
Barbara Masucci
Francesco Palmieri
Aniello Castiglione
Xinyi Huang
2016
journals/tifs
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
Kaitai Liang
Xinyi Huang
Fuchun Guo
Joseph K. Liu
2016
journals/tifs
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Rongxing Lu
Jin Li
2016
conf/ccs
Targeted Online Password Guessing: An Underestimated Threat.
Ding Wang
Zijian Zhang
Ping Wang
Jeff Yan
Xinyi Huang
2016
conf/acisp
Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Yang Sun
Qianhong Wu
Jingwen Liu
Jianwei Liu
Xinyi Huang
Bo Qin
Wei Hu
2015
journals/tifs
Time-Bound Anonymous Authentication for Roaming Networks.
Joseph K. Liu
Cheng-Kang Chu
Sherman S. M. Chow
Xinyi Huang
Man Ho Au
Jianying Zhou
2015
journals/tifs
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Debiao He
Sherali Zeadally
Baowen Xu
Xinyi Huang
2015
journals/tifs
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
Xiaofeng Chen
Xinyi Huang
Jin Li
Jianfeng Ma
Wenjing Lou
Duncan S. Wong
2015
conf/ccs
Group-oriented Proofs of Storage.
Yujue Wang
Qianhong Wu
Bo Qin
Xiaofeng Chen
Xinyi Huang
Yunya Zhou
2015
conf/ccs
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Zhe Liu
Hwajeong Seo
Zhi Hu
Xinyi Huang
Johann Großschädl
2014
conf/esorics
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Yuexin Zhang
Yang Xiang
Xinyi Huang
Li Xu
2014
conf/esorics
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Willy Susilo
Jianying Zhou
Yong Yu
2012
conf/ccs
Verifier-local revocation group signatures with time-bound keys.
Cheng-Kang Chu
Joseph K. Liu
Xinyi Huang
Jianying Zhou
2012
conf/provsec
Efficient Escrow-Free Identity-Based Signature.
Yunmei Zhang
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
2012
conf/icics
Forward Secure Attribute-Based Signatures.
Tsz Hon Yuen
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
Jianying Zhou
2011
journals/tifs
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
Jianying Zhou
Robert H. Deng
2010
conf/pkc
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
Yang Xiang
2008
conf/provsec
Server-Aided Verification Signatures: Definitions and New Constructions.
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
2008
conf/wisa
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
2008
conf/cans
Efficient and Short Certificateless Signature.
Raylin Tso
Xun Yi
Xinyi Huang
2007
conf/acisp
Certificateless Signature Revisited.
Xinyi Huang
Yi Mu
Willy Susilo
Duncan S. Wong
Wei Wu
2007
conf/wisa
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Wei Wu
Yi Mu
Willy Susilo
Xinyi Huang
2007
conf/icics
Formal Definition and Construction of Nominative Signature.
Dennis Y. W. Liu
Duncan S. Wong
Xinyi Huang
Guilin Wang
Qiong Huang
Yi Mu
Willy Susilo
2007
conf/cans
A Generic Construction for Universally-Convertible Undeniable Signatures.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
2006
conf/icics
Universal Designated Verifier Signature Without Delegatability.
Xinyi Huang
Willy Susilo
Yi Mu
Wei Wu
2005
conf/cans
On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Xinyi Huang
Willy Susilo
Yi Mu
Futai Zhang
Coauthors
Alfredo De Santis
(2)
Alsharif Abuadbba
(1)
Aniello Castiglione
(2)
Arcangelo Castiglione
(2)
Atsuko Miyaji
(1)
Baosheng Wang
(2)
Baowen Xu
(1)
Barbara Masucci
(2)
Bo Qin
(2)
Chao Lin
(8)
Chaochao Cai
(1)
Cheng-Jun Lin
(1)
Cheng-Kang Chu
(2)
Chenhao Lin
(1)
Chunhua Su
(3)
Cong Peng
(1)
Debiao He
(9)
Dengzhi Liu
(1)
Dennis Y. W. Liu
(1)
Ding Wang
(5)
Duncan S. Wong
(3)
Enting Guo
(2)
Fatemeh Rezaeibagha
(1)
Fei Tang
(1)
Fei Zhu
(2)
Francesco Palmieri
(2)
Fuchun Guo
(2)
Futai Zhang
(3)
Gaopeng Jian
(1)
Geong Sen Poh
(2)
Geyong Min
(1)
Giuseppe Ateniese
(1)
Guilin Wang
(1)
Guomin Yang
(2)
Guowei Ling
(1)
Guowen Xu
(1)
Haibo Cheng
(2)
Haixia Chen
(1)
Haiyang Xue
(1)
Hanrui Jiang
(1)
Hong Zhao
(2)
Hui Xiong
(1)
Hwajeong Seo
(1)
Ibrahim Khalil
(1)
Javier López
(1)
Jeff Yan
(2)
Jia-Ch'ng Loh
(1)
Jiageng Chen
(1)
Jialiu Cheng
(1)
Jiaming Yuan
(2)
Jian Shen
(2)
Jian Weng
(3)
Jianfeng Ma
(3)
Jianfeng Wang
(1)
Jiang Zhang
(1)
Jianghua Liu
(2)
Jianting Ning
(13)
Jianwei Liu
(1)
Jianying Zhou
(6)
Jiaojiao Wu
(1)
Jie Zhang
(1)
Jin Li
(3)
Jingjing Gu
(1)
Jingjing Wang
(1)
Jinguang Han
(1)
Jingwen Liu
(1)
Jingyu Hou
(1)
Jinhua Ma
(4)
Jinshu Su
(1)
Jinyong Shan
(1)
Johann Großschädl
(1)
Joseph K. Liu
(9)
Jun Shen
(1)
Junqing Gong
(1)
Junwei Luo
(1)
Kai Zhang
(3)
Kaitai Liang
(1)
Karin Sumongkayothin
(1)
Kim-Kwang Raymond Choo
(2)
Komwut Wipusitwarakun
(1)
Lang Pu
(1)
Li Xu
(2)
Liang Zhao
(1)
Lijin Wang
(1)
Liqun Chen
(1)
Man Ho Au
(6)
Manli Yuan
(1)
Meixia Miao
(1)
Min Luo
(2)
Mingwu Zhang
(1)
Moti Yung
(4)
Muhammad Khurram Khan
(1)
Nan Li
(1)
Peng Tang
(1)
Ping Wang
(4)
Qian Wang
(1)
Qianchen Gu
(1)
Qianhong Wu
(2)
Qiong Huang
(1)
Qiying Dong
(1)
Raylin Tso
(1)
Robert H. Deng
(7)
Rongmao Chen
(10)
Rongxing Lu
(1)
Rui Xue
(1)
Sharif Abuadbba
(1)
Shengmin Xu
(6)
Sherali Zeadally
(1)
Sherman S. M. Chow
(1)
Songze Li
(1)
Steven Gordon
(1)
Surya Nepal
(2)
Tianqing Zhu
(1)
Tianshuo Cong
(2)
Tsz Hon Yuen
(1)
Wanlei Zhou
(1)
Wei Hu
(1)
Wei Wu
(9)
Weidong Qiu
(1)
Wenhan Dong
(1)
Wenjing Lou
(1)
Willy Susilo
(16)
Wulu Li
(1)
Xiangyu Wang
(1)
Xiaofen Wang
(1)
Xiaofeng Chen
(5)
Xiaohan Hao
(1)
Xiaohu Wang
(1)
Xiaotong Zhou
(2)
Xingshuo Han
(1)
Xinlei He
(2)
Xinwei Yong
(1)
Xinyi Huang
(85)
Xiwen Wang
(2)
Xu Yang
(1)
Xun Yi
(3)
Yang Sun
(1)
Yang Xiang
(5)
Yanjiang Yang
(1)
Yi Mu
(12)
Yi Wang
(5)
Yijia Chang
(2)
Yingjiu Li
(2)
Yong Yu
(2)
Yong Zhao
(1)
Yongcheng Song
(1)
Yongjun Wang
(1)
Yuanming Song
(1)
Yuanshun Dai
(1)
Yuexin Zhang
(2)
Yujue Wang
(1)
Yule Liu
(1)
Yunkai Zou
(1)
Yunmei Zhang
(1)
Yunya Zhou
(1)
Yusheng Xia
(1)
Ze Chen
(1)
Zhan Qin
(2)
Zhe Jiang
(1)
Zhe Liu
(1)
Zhen Sun
(1)
Zhi Hu
(1)
Zhiqiang Xu
(1)
Zhuo Wei
(1)
Zhuoran Ma
(1)
Zhuotao Lian
(1)
Zhuzhu Wang
(1)
Zijian Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to