default search action
BibTeX records: Luning Xia
@article{DBLP:journals/tdsc/JiaZXJL22, author = {Shijie Jia and Qionglu Zhang and Luning Xia and Jiwu Jing and Peng Liu}, title = {{MDEFTL:} Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3494--3507}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3100897}, doi = {10.1109/TDSC.2021.3100897}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiaZXJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoCJX19, author = {Biao Gao and Bo Chen and Shijie Jia and Luning Xia}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {eHIFS: An Efficient History Independent File System}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {573--585}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329839}, doi = {10.1145/3321705.3329839}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GaoCJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/WangJCXL19, author = {Peiying Wang and Shijie Jia and Bo Chen and Luning Xia and Peng Liu}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {327--338}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300041}, doi = {10.1145/3292006.3300041}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/WangJCXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuanLMLXJ18, author = {Le Guan and Jingqiang Lin and Ziqiang Ma and Bo Luo and Luning Xia and Jiwu Jing}, title = {Copker: {A} Cryptographic Engine Against Cold-Boot Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {742--754}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2631548}, doi = {10.1109/TDSC.2016.2631548}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuanLMLXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiXLWLS18, author = {Yafei Ji and Luning Xia and Jingqiang Lin and Qiongxiao Wang and Lingguang Lei and Li Song}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Chord: Thwarting Relay Attacks Among Near Field Communications}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {329--348}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_18}, doi = {10.1007/978-3-030-14234-6\_18}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/JiXLWLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuanJCZLLLXX17, author = {Le Guan and Shijie Jia and Bo Chen and Fengwei Zhang and Bo Luo and Jingqiang Lin and Peng Liu and Xinyu Xing and Luning Xia}, title = {Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {339--349}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134647}, doi = {10.1145/3134600.3134647}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuanJCZLLLXX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaXCL17, author = {Shijie Jia and Luning Xia and Bo Chen and Peng Liu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DEFTL:} Implementing Plausibly Deniable Encryption in Flash Translation Layer}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2217--2229}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134011}, doi = {10.1145/3133956.3134011}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiaXCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenJXL16, author = {Bo Chen and Shijie Jia and Luning Xia and Peng Liu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {496--507}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991101}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenJXL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaXC016, author = {Shijie Jia and Luning Xia and Bo Chen and Peng Liu}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {{NFPS:} Adding Undetectable Secure Deletion to Flash Translation Layer}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {305--315}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897882}, doi = {10.1145/2897845.2897882}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiaXC016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangXJJ16, author = {Guozhu Zhang and Luning Xia and Shijie Jia and Yafei Ji}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Physical-Layer Identification of {HF} {RFID} Cards Based on {RF} Fingerprinting}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {284--299}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_20}, doi = {10.1007/978-3-319-49151-6\_20}, timestamp = {Wed, 21 Aug 2024 07:35:24 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangXJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXJJ16, author = {Guozhu Zhang and Luning Xia and Shijie Jia and Yafei Ji}, title = {Identification of Cloned {HF} {RFID} Proximity Cards Based on {RF} Fingerprinting}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {292--300}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0076}, doi = {10.1109/TRUSTCOM.2016.0076}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLWWX15, author = {Wei Wang and Jingqiang Lin and Zhan Wang and Ze Wang and Luning Xia}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {332--351}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_17}, doi = {10.1007/978-3-319-24177-7\_17}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WangLWWX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiXLZZJ15, author = {Yafei Ji and Luning Xia and Jingqiang Lin and Jian Zhou and Guozhu Zhang and Shijie Jia}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Chameleon: {A} Lightweight Method for Thwarting Relay Attacks in Near Field Communication}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {346--355}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_29}, doi = {10.1007/978-3-319-29814-6\_29}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/JiXLZZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JiaXWLZJ15, author = {Shijie Jia and Luning Xia and Zhan Wang and Jingqiang Lin and Guozhu Zhang and Yafei Ji}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Extracting Robust Keys from {NAND} Flash Physical Unclonable Functions}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {437--454}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_24}, doi = {10.1007/978-3-319-23318-5\_24}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JiaXWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaXLJLY12, author = {Yuan Ma and Luning Xia and Jingqiang Lin and Jiwu Jing and Zongbin Liu and Xingjie Yu}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Hardware Performance Optimization and Evaluation of {SM3} Hash Algorithm on {FPGA}}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {105--118}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_10}, doi = {10.1007/978-3-642-34129-8\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaXLJLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXLJM12, author = {Lingchen Zhang and Luning Xia and Zongbin Liu and Jiwu Jing and Yuan Ma}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Evaluating the Optimized Implementations of {SNOW3G} and {ZUC} on {FPGA}}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {436--442}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.150}, doi = {10.1109/TRUSTCOM.2012.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXLJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PanJXLY11, author = {Wuqiong Pan and Jiwu Jing and Luning Xia and Zongbin Liu and Meng Yu}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {An Efficient {RSA} Implementation without Precomputation}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {251--268}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_19}, doi = {10.1007/978-3-642-34704-7\_19}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PanJXLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiuXJL11, author = {Zongbin Liu and Luning Xia and Jiwu Jing and Peng Liu}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {105--113}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetc/WangXJ09, author = {Jing Wang and Luning Xia and Jiwu Jing}, title = {An Ultra-kernel Model for Dedicated Security Systems}, booktitle = {2009 International Conference on Education Technology and Computer, {ICETC} 2009, Singapore, 17-20 April 2009}, pages = {122--127}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICETC.2009.18}, doi = {10.1109/ICETC.2009.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icetc/WangXJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/XiaJ06, author = {Luning Xia and Jiwu Jing}, title = {An Administrative Model for Role-Based Access Control Using Hierarchical Namespace}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala Lumpur, Malaysia, July 6-9, 2006}, pages = {30}, publisher = {AISeL}, year = {2006}, url = {http://aisel.aisnet.org/pacis2006/30}, timestamp = {Thu, 01 Mar 2012 19:27:42 +0100}, biburl = {https://dblp.org/rec/conf/pacis/XiaJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.