Certificate transparency in the wild: Exploring the reliability of monitors B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 61 | 2019 |
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions T Zhang, B Li, Y Zhu, T Han, Q Wu Computer Communications 205, 136-146, 2023 | 18 | 2023 |
The weakest link of certificate transparency: Exploring the TLS/HTTPS configurations of third-party monitors B Li, D Chu, J Lin, Q Cai, C Wang, L Meng 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 15 | 2019 |
Method and system for checking revocation status of digital certificates in a virtualization environment LIN Jingqiang, B Li, Z Wang, J Jing, C Li, L Xia, Q Wang US Patent 10,135,623, 2018 | 12 | 2018 |
Method and system for protecting root CA certificate in a virtualization environment LIN Jingqiang, J Jing, G Le, B Li, J Wang, W Pan, Y Wang US Patent 9,819,496, 2017 | 12 | 2017 |
Locally-centralized certificate validation and its application in desktop virtualization systems B Li, J Lin, Q Wang, Z Wang, J Jing IEEE Transactions on Information Forensics and Security 16, 1380-1395, 2020 | 10 | 2020 |
High-performance symmetric cryptography server with GPU acceleration W Cheng, F Zheng, W Pan, J Lin, H Li, B Li International Conference on Information and Communications Security, 529-540, 2017 | 7 | 2017 |
Polict: Flexible policy in certificate transparency enabling lightweight self-monitor A Sun, B Li, H Wan, Q Wang International Conference on Applied Cryptography and Network Security, 358-377, 2021 | 6 | 2021 |
Exploring the security of certificate transparency in the wild B Li, F Li, Z Ma, Q Wu International Conference on Applied Cryptography and Network Security, 453-470, 2020 | 5 | 2020 |
Elaphurus: ensemble defense against fraudulent certificates in TLS B Li, W Wang, L Meng, J Lin, X Liu, C Wang International Conference on Information Security and Cryptology, 246-259, 2019 | 5 | 2019 |
PoS: Constructing practical and efficient public key cryptosystems based on symmetric cryptography with SGX H Li, J Lin, B Li, W Cheng Information and Communications Security: 20th International Conference …, 2018 | 4 | 2018 |
The invisible side of certificate transparency: exploring the reliability of monitors in the wild B Li, J Lin, F Li, Q Wang, W Wang, Q Li, G Cheng, J Jing, C Wang IEEE/ACM Transactions on Networking 30 (2), 749-765, 2021 | 3 | 2021 |
Analyzing the browser security warnings on https errors C Wang, J Lin, B Li, Q Li, Q Wang, X Zhang ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 3 | 2019 |
Building your private cloud storage on public cloud service using embedded GPUs W Cheng, F Zheng, W Pan, J Lin, H Li, B Li International Conference on Security and Privacy in Communication Systems …, 2018 | 2 | 2018 |
Covert communication via blockchain: Hiding patterns and communication patterns T Zhang, Q Wu, Q Wang, T Han, B Li, Y Zhu Computer Standards & Interfaces 90, 103851, 2024 | 1 | 2024 |
Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers A Sun, B Li, Q Wang, H Wan, J Lin, W Wang 2023 IEEE Symposium on Computers and Communications (ISCC), 1207-1213, 2023 | 1 | 2023 |
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature Y Zhu, B Li, Y Yang, Z Ding, H Zheng, G He, S Hou Sensors 22 (16), 6004, 2022 | 1 | 2022 |
Applications and developments of the lattice attack in side channel attacks Z Ma, B Li, Q Cai, J Yang International Conference on Applied Cryptography and Network Security, 435-452, 2020 | 1 | 2020 |
R2E: A Decentralized Scheme for Rewarding Tor Relays with Cryptocurrencies X Dai, Q Wu, B Li, B Qin, J Fan, F Deng, M Zhai IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection X Li, L Li, X Li, B Cai, B Li 2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023 | | 2023 |