Search

Your search keyword '"Li, Yingjiu"' showing total 529 results

Search Constraints

Start Over You searched for: Author "Li, Yingjiu" Remove constraint Author: "Li, Yingjiu"
529 results on '"Li, Yingjiu"'

Search Results

1. SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner

2. Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

4. Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting

5. HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks

6. A Practical Forward-Secure DualRing

7. AGChain: A Blockchain-based Gateway for Trustworthy App Delegation from Mobile App Markets

8. DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model

10. When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks

11. M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption

12. What's (Not) Validating Network Paths: A Survey

13. SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications

14. Policy-Based Remote User Authentication From Multi-Biometrics.

15. SecComp: Towards Practically Defending Against Component Hijacking in Android Applications

21. SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network

22. Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience

24. Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy

25. Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion

26. Privacy-Preserving Remote User Authentication with k-Times Untraceability

27. DSH: Deniable Secret Handshake Framework

29. Attribute-Based Encryption with Granular Revocation

30. Attribute-Based Encryption with Expressive and Authorized Keyword Search

31. Employing Smartwatch for Enhanced Password Authentication

33. ShadowKey: A Practical Leakage Resilient Password System

34. CoverPad: A Leakage Resilient Password System on Touch-Screen Mobile Devices

35. Leakage Resilient Password Systems: Attacks, Principles, and Usability

41. Introduction

43. Server-Aided Revocable Attribute-Based Encryption

44. A Feasible No-Root Approach on Android

45. Efficient Tag Path Authentication Protocol with Less Tag Memory

46. Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures

47. Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme

49. Server-Aided Revocable Identity-Based Encryption

50. Detecting Camouflaged Applications on Mobile Application Markets

Catalog

Books, media, physical & digital resources