Wang, Qiongxiao
49  results:
Search for persons X
?
2

Enhanced Ticket Transparency (eTT) Framework for Single Sig..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Liu, Guangqi ; Lin, Jingqiang ; Chu, Dawei... - p. 730-739 , 2023
 
?
3

The Broken Verifying: Inspections at Verification Tools for..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Liu, Guangqi ; Wang, Qiongxiao ; Ma, Cunqing... - p. 804-813 , 2023
 
?
4

Semi-CT: Certificates Transparent to Identity Owners but Op..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
Sun, Aozhuo ; Li, Bingyu ; Wang, Qiongxiao... - p. 1207-1213 , 2023
 
?
5

ImCT: A Feasible Scheme for Deploying Implicit Certificates..:

, In: 2023 32nd International Conference on Computer Communications and Networks (ICCCN),
Wan, Huiqing ; Wang, Qiongxiao ; Teng, Yajun... - p. 1-10 , 2023
 
?
6

Replicated Additive Secret Sharing with the Optimized Numbe..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
Guo, Juanjuan ; Shuai, Mengjie ; Wang, Qiongxiao.. - p. 371-389 , 2023
 
?
7

ESCORT: Efficient Status Check and Revocation Transparency ..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
Wan, Huiqing ; Wang, Qiongxiao ; Ma, Cunqing... - p. 1340-1343 , 2023
 
?
9

MoLE: Mitigation of Side-channel Attacks against SGX via Dy..:

, In: Annual Computer Security Applications Conference,
Lang, Fan ; Wang, Wei ; Meng, Lingjia... - p. 978-988 , 2022
 
?
10

ABLE: Zero-effort Two-factor Authentication Exploiting BLE ..:

, In: 2022 IEEE Wireless Communications and Networking Conference (WCNC),
He, Yaxi ; Wang, Wei ; Teng, Yajun... - p. 992-997 , 2022
 
?
11

The Invisible Side of Certificate Transparency: Exploring t..:

Li, Bingyu ; Lin, Jingqiang ; Li, Fengjun...
IEEE/ACM Transactions on Networking.  30 (2022)  2 - p. 749-765 , 2022
 
?
12

LiTIV: A Lightweight Traceable Data Integrity Verification ..:

, In: 2022 International Conference on Computer Communications and Networks (ICCCN),
Xu, Xin ; Wang, Wei ; Lin, Jingqiang... - p. 1-10 , 2022
 
?
13

You Cannot Fully Trust Your Device: An Empirical Study of C..:

, In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Song, Li ; Wang, Qiongxiao ; Jia, Shijie... - p. 266-273 , 2022
 
?
14

UP-SSO: Enhancing the User Privacy of SSO by Integrating PP..:

, In: 2021 International Conference on Advanced Computing and Endogenous Security,
Guo, Chengqian ; Lang, Fan ; Wang, Qiongxiao. - p. 01-05 , 2022
 
?
15

Blockchain-Based Certificate Transparency and Revocation Tr..:

Wang, Ze ; Lin, Jingqiang ; Cai, Quanwei...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  1 - p. 681-697 , 2022
 
1-15