BibTeX records: Luning Xia

download as .bib file

@article{DBLP:journals/tdsc/JiaZXJL22,
  author       = {Shijie Jia and
                  Qionglu Zhang and
                  Luning Xia and
                  Jiwu Jing and
                  Peng Liu},
  title        = {{MDEFTL:} Incorporating Multi-Snapshot Plausible Deniability into
                  Flash Translation Layer},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3494--3507},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3100897},
  doi          = {10.1109/TDSC.2021.3100897},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiaZXJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoCJX19,
  author       = {Biao Gao and
                  Bo Chen and
                  Shijie Jia and
                  Luning Xia},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {eHIFS: An Efficient History Independent File System},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {573--585},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329839},
  doi          = {10.1145/3321705.3329839},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoCJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WangJCXL19,
  author       = {Peiying Wang and
                  Shijie Jia and
                  Bo Chen and
                  Luning Xia and
                  Peng Liu},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy
                  to Flash Translation Layer},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {327--338},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300041},
  doi          = {10.1145/3292006.3300041},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/WangJCXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuanLMLXJ18,
  author       = {Le Guan and
                  Jingqiang Lin and
                  Ziqiang Ma and
                  Bo Luo and
                  Luning Xia and
                  Jiwu Jing},
  title        = {Copker: {A} Cryptographic Engine Against Cold-Boot Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {742--754},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2631548},
  doi          = {10.1109/TDSC.2016.2631548},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuanLMLXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JiXLWLS18,
  author       = {Yafei Ji and
                  Luning Xia and
                  Jingqiang Lin and
                  Qiongxiao Wang and
                  Lingguang Lei and
                  Li Song},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Chord: Thwarting Relay Attacks Among Near Field Communications},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_18},
  doi          = {10.1007/978-3-030-14234-6\_18},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/JiXLWLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuanJCZLLLXX17,
  author       = {Le Guan and
                  Shijie Jia and
                  Bo Chen and
                  Fengwei Zhang and
                  Bo Luo and
                  Jingqiang Lin and
                  Peng Liu and
                  Xinyu Xing and
                  Luning Xia},
  title        = {Supporting Transparent Snapshot for Bare-metal Malware Analysis on
                  Mobile Devices},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {339--349},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134647},
  doi          = {10.1145/3134600.3134647},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuanJCZLLLXX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiaXCL17,
  author       = {Shijie Jia and
                  Luning Xia and
                  Bo Chen and
                  Peng Liu},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{DEFTL:} Implementing Plausibly Deniable Encryption in Flash Translation
                  Layer},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2217--2229},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134011},
  doi          = {10.1145/3133956.3134011},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiaXCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenJXL16,
  author       = {Bo Chen and
                  Shijie Jia and
                  Luning Xia and
                  Peng Liu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Sanitizing data is not enough!: towards sanitizing structural artifacts
                  in flash media},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {496--507},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991101},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenJXL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiaXC016,
  author       = {Shijie Jia and
                  Luning Xia and
                  Bo Chen and
                  Peng Liu},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {{NFPS:} Adding Undetectable Secure Deletion to Flash Translation Layer},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {305--315},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897882},
  doi          = {10.1145/2897845.2897882},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiaXC016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangXJJ16,
  author       = {Guozhu Zhang and
                  Luning Xia and
                  Shijie Jia and
                  Yafei Ji},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Physical-Layer Identification of {HF} {RFID} Cards Based on {RF} Fingerprinting},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {284--299},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_20},
  doi          = {10.1007/978-3-319-49151-6\_20},
  timestamp    = {Wed, 21 Aug 2024 07:35:24 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangXJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXJJ16,
  author       = {Guozhu Zhang and
                  Luning Xia and
                  Shijie Jia and
                  Yafei Ji},
  title        = {Identification of Cloned {HF} {RFID} Proximity Cards Based on {RF}
                  Fingerprinting},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0076},
  doi          = {10.1109/TRUSTCOM.2016.0076},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLWWX15,
  author       = {Wei Wang and
                  Jingqiang Lin and
                  Zhan Wang and
                  Ze Wang and
                  Luning Xia},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {vBox: Proactively Establishing Secure Channels Between Wireless Devices
                  Without Prior Knowledge},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {332--351},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_17},
  doi          = {10.1007/978-3-319-24177-7\_17},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLWWX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/JiXLZZJ15,
  author       = {Yafei Ji and
                  Luning Xia and
                  Jingqiang Lin and
                  Jian Zhou and
                  Guozhu Zhang and
                  Shijie Jia},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Chameleon: {A} Lightweight Method for Thwarting Relay Attacks in Near
                  Field Communication},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {346--355},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_29},
  doi          = {10.1007/978-3-319-29814-6\_29},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/JiXLZZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JiaXWLZJ15,
  author       = {Shijie Jia and
                  Luning Xia and
                  Zhan Wang and
                  Jingqiang Lin and
                  Guozhu Zhang and
                  Yafei Ji},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Extracting Robust Keys from {NAND} Flash Physical Unclonable Functions},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {437--454},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_24},
  doi          = {10.1007/978-3-319-23318-5\_24},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JiaXWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaXLJLY12,
  author       = {Yuan Ma and
                  Luning Xia and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Zongbin Liu and
                  Xingjie Yu},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Hardware Performance Optimization and Evaluation of {SM3} Hash Algorithm
                  on {FPGA}},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_10},
  doi          = {10.1007/978-3-642-34129-8\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaXLJLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXLJM12,
  author       = {Lingchen Zhang and
                  Luning Xia and
                  Zongbin Liu and
                  Jiwu Jing and
                  Yuan Ma},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Evaluating the Optimized Implementations of {SNOW3G} and {ZUC} on
                  {FPGA}},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {436--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.150},
  doi          = {10.1109/TRUSTCOM.2012.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXLJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PanJXLY11,
  author       = {Wuqiong Pan and
                  Jiwu Jing and
                  Luning Xia and
                  Zongbin Liu and
                  Meng Yu},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {An Efficient {RSA} Implementation without Precomputation},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {251--268},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_19},
  doi          = {10.1007/978-3-642-34704-7\_19},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/PanJXLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiuXJL11,
  author       = {Zongbin Liu and
                  Luning Xia and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {105--113},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetc/WangXJ09,
  author       = {Jing Wang and
                  Luning Xia and
                  Jiwu Jing},
  title        = {An Ultra-kernel Model for Dedicated Security Systems},
  booktitle    = {2009 International Conference on Education Technology and Computer,
                  {ICETC} 2009, Singapore, 17-20 April 2009},
  pages        = {122--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICETC.2009.18},
  doi          = {10.1109/ICETC.2009.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icetc/WangXJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/XiaJ06,
  author       = {Luning Xia and
                  Jiwu Jing},
  title        = {An Administrative Model for Role-Based Access Control Using Hierarchical
                  Namespace},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala
                  Lumpur, Malaysia, July 6-9, 2006},
  pages        = {30},
  publisher    = {AISeL},
  year         = {2006},
  url          = {http://aisel.aisnet.org/pacis2006/30},
  timestamp    = {Thu, 01 Mar 2012 19:27:42 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/XiaJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}