1. Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications;Tsinghua Science and Technology;2025-02
2. PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. Trusted Computing Data Transaction Scheme based on Blockchain;2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC);2023-10-11
4. Integration of the TPM in the AACKA Protocol;2023 26th Euromicro Conference on Digital System Design (DSD);2023-09-06
5. Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware;Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services;2023-06-18