Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Handong Cui"'
Publikováno v:
Information Security and Privacy ISBN: 9783031223006
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::91ba23f65b3550643021b458128d19c4
https://doi.org/10.1007/978-3-031-22301-3_14
https://doi.org/10.1007/978-3-031-22301-3_14
Publikováno v:
CCS
Two-party ECDSA signatures have received much attention due to their widespread deployment in cryptocurrencies. Depending on whether or not the message is required, we could divide two-party signing into two different phases, namely, offline and onli
Publikováno v:
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Publikováno v:
Information Security and Cryptology ISBN: 9783030718510
Inscrypt
Inscrypt
There are two popular location-based service (LBS) applications: searching k-nearest neighbor Points of Interests (kNN POIs) and finding Nearby Friends (NF) via a social network server (SNS). Nevertheless, both applications are based on users’ curr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b95cb8c39d14db50ba11e570dd01e4ad
https://doi.org/10.1007/978-3-030-71852-7_19
https://doi.org/10.1007/978-3-030-71852-7_19
Autor:
Handong Cui, Tsz Hon Yuen
Publikováno v:
Information Security and Privacy ISBN: 9783030905668
ACISP
ACISP
Guillou-Quisquater (GQ) signature is an efficient RSA-based digital signature scheme amongst the most famous Fiat-Shamir follow-ons owing to its good simplicity. However, there exist two bottlenecks for GQ hindering its application in industry or aca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac0371d084047f935f27d366f12b6f50
https://doi.org/10.1007/978-3-030-90567-5_34
https://doi.org/10.1007/978-3-030-90567-5_34
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Public Key Cryptography (1)
Threshold ECDSA signatures provide a higher level of security to a crypto wallet since it requires more than t parties out of n parties to sign a transaction. The state-of-the-art bandwidth efficient threshold ECDSA used the additive homomorphic Cast
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::27c31a0b21a8d358e9888cf32fb780e2
https://doi.org/10.1007/978-3-030-75245-3_18
https://doi.org/10.1007/978-3-030-75245-3_18
Autor:
Handong Cui, Tsz Hon Yuen
Publikováno v:
TrustCom
In most applications using digital signatures, public keys are used to verify the signatures. The public keys are authenticated by a trusted certificate authority. However, this chain of trust is fragile in the real world. Systems like blockchain and
Publikováno v:
2019 IEEE 5th International Conference on Computer and Communications (ICCC).
Docker container technology is an emerging virtualization technology which has a very high efficiency in the phases of development and deployment. Although Docker container technology shows better convenience than traditional virtualization technolog
Publikováno v:
DSC
Webshell is a type of web backdoor which can be used by hackers to control web servers remotely. It is true that webshell becomes increasingly hard to detect because of the use of more and more hiding technologies, such decoding and encrypting. Howev