Publications

(2023). Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper. The Fifth ACM International Workshop on Blockchain-enabled Networked Sensor Systems (BlockSys'23).

Cite DOI

(2023). Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection. The 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2023).

Cite DOI

(2023). BGP Blockchain for Metaverse - A Distributed Consensus System for BGP. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom 2023).

Cite DOI

(2023). Privacy-Preserving Object Detection with Veracruz. 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops).

Cite DOI

(2023). Private Delegated Computations Using Strong Isolation. IEEE Transactions on Emerging Topics in Computing.

Cite DOI

(2023). DHTee: Decentralized Infrastructure for Heterogeneous TEEs. 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2023).

Cite DOI

(2023). Connecting Smart Devices to Smart Contracts with W3bstream. 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2023).

Cite DOI

(2022). Insights on Impact of Distributed Ledgers on Provider Networks. 2022 International Conference on Blockchain (ICBC 2022).

Cite DOI

(2022). Searchable Symmetric Encryption System and Method of Processing Inverted Index. United States Patent 11405192.

Patent

(2022). Method for Faster Secure Multiparty Inner Product Computation with SPDZ. United States Patent 11323444.

Patent

(2021). User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. United States Patent Application 20210390533A1.

Patent Application

(2021). New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner. 2021 International Conference on Blockchain (ICBC 2021).

Cite DOI Best Paper Award

(2021). Method and System for Fuzzy Keyword Search over Encrypted Data. United States Patent 11023477.

Patent

(2021). System and Method for Privacy-Preserving Data Retrieval for Connected Power Tools. United States Patent 10897354.

Patent

(2020). Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020).

Cite DOI

(2020). EMS: An Extensible and Modular Staking Architecture for Proof-of-Stake Systems. The Second International Conference on Blockchain Computing and Applications (BCCA 2020).

Cite DOI

(2020). Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. The 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2020).

Cite DOI

(2020). DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter. The 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2020).

Cite DOI

(2020). DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things. The 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2020).

Cite DOI

(2020). MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance. 2020 International Conference on Blockchain (ICBC 2020).

Cite DOI

(2020). Decentralized IoT Data Authorization with Pebble Tracker. IEEE 6th World Forum on Internet of Things (WF-IoT 2020).

Cite DOI

(2020). Method and System for Range Search on Encrypted Data. United States Patent 10664610.

Patent

(2020). EcoBoost: Efficient Bootstrapping for Confidential Transactions. IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2020).

Cite DOI

(2020). Supporting Blockchain based Cryptocurrency Mobile Payment with Smart Devices. IEEE Consumer Electronics Magazine, 9(2).

Cite DOI Best Paper Award

(2020). DIoTA: Decentralized Ledger Based Framework for Data Authenticity Protection in IoT Systems. IEEE Network, 34(1).

PDF Cite DOI

(2019). KCRS: A Blockchain-Based Key Compromise Resilient Signature System. The First International Conference on Blockchain and Trustworthy Systems (BlockSys 2019).

Cite DOI Best Paper Award

(2019). Method and System for Shared Key and Message Authentication over an Insecure Shared Communication Medium. United States Patent 10397195.

Patent

(2019). Secure Simultaneous Bit Extraction from Koblitz Curves. Designs, Codes and Cryptography, 87(1).

Cite DOI

(2018). Password-less Authentication System, Method and Device. United States Patent 10136315.

Patent

(2018). Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. The 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2018).

Cite DOI

(2018). Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. IEEE Transactions on Dependable and Secure Computing, 15(6).

Cite DOI

(2018). Scalable Practical Byzantine Fault Tolerance with Short-Lived Signature Schemes. The 28th Annual International Conference on Computer Science and Software Engineering (CASCON 2018).

Cite DOI

(2018). Method and System for Secure Key Generation over an Insecure Shared Communication Medium. United States Patent 10104048.

Patent

(2018). Lightweight Verification for Searchable Encryption. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018).

Cite DOI

(2018). Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. 2018 International Conference on Blockchain (ICBC 2018).

Cite DOI

(2018). Method and System for Verifiable Searchable Symmetric Encryption. United States Patent 9977918.

Patent

(2017). RSPP: A Reliable, Searchable and Privacy-Preserving e-Healthcare System for Cloud-Assisted Body Area Networks. IEEE International Conference on Computer Communications (INFOCOM 2017).

Cite DOI Best-in-Session-Presentation Award

(2017). Secure Simultaneous Bit Extraction from Koblitz Curves. Designs, Codes and Cryptography, 83(3).

Cite DOI

(2016). Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. ACM Transactions on Embedded Computing Systems, 15(1).

Cite DOI

(2015). Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms. The 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015).

Cite DOI

(2015). Lightweight Stream Cipher Cryptosystems. United States Patent 8953784.

Patent

(2015). WG-8: A Lightweight Stream Cipher for Resource-Constrained Devices. EAI Endorsed Transactions on Security and Safety, 2(1).

Cite DOI

(2014). On Selection of Optimal Parameters for the WG Stream Cipher Family. Cryptography and Communications, 6(2).

Cite DOI

(2014). Loxin -- A Solution to Password-less Universal Login. The 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data (BigSecurity 2014).

Cite DOI

(2014). Side-Channel Attacks on RFID Systems -- State of the Art. Chapter 9 in Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies.

Cite

(2014). Low-Complexity Attacks on Selected Lightweight Stream Ciphers. Chapter 6 in Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies.

Cite

(2014). Lightweight Cryptography for Passive RFID Systems: A Research Survey. Chapter 5 in Radio-Frequency Identification (RFID): Emerging Technologies, Applications and Improvement Strategies.

Cite

(2014). An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks. Applied Mechanics and Materials, 490-491.

Cite DOI

(2013). Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags. International Journal of RFID Security and Cryptography, 2(1-4).

PDF Cite DOI

(2013). Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations. Cryptography and Communications, 5(4).

Cite DOI

(2013). Securing NFC with Elliptic Curve Cryptography -- Challenges and Solutions. The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia).

Cite DOI

(2013). Securing ZigBee Smart Energy Profile 1.x with OpenECC Library. The First ACM Workshop on Smart Energy Grid Security (SEGS 2013).

Cite DOI

(2013). Efficient Hardware Implementation of the Stream Cipher WG-16 with Composite Field Arithmetic. The 2013 ACM Workshop on Trustworthy Embedded Devices (TrustED 2013).

Cite DOI

(2013). Design Space Exploration of the Lightweight Stream Cipher WG-8 for FPGAs and ASICs. The 8th Workshop on Embedded Systems Security (WESS 2013).

Cite DOI

(2013). Security Challenges in Smart-Grid Metering and Control Systems (Invited Paper). Technology Innovation Management Review.

PDF Cite DOI

(2013). On Selection of Optimal Parameters for the WG Stream Cipher Family. The 13th Canadian Workshop on Information Theory (CWIT 2013).

Cite DOI

(2013). WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. The 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2013).

DOI

(2012). Warbler: A Lightweight Pseudorandom Number Generator For EPC C1 Gen2 Tags. The 2012 Workshop on RFID and IoT Security (RFIDsec'12 Asia).

Cite DOI

(2012). LKPM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks. The 4th International Conference on Ad Hoc Networks (AdHocNets 2012).

Cite DOI

(2011). A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems. The 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011).

Cite DOI

(2011). Remedying the Hummingbird Cryptographic Algorithm. The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011).

Cite DOI

(2011). Contents Protection System and Method. China Patent CN1832400B.

Patent

(2011). On the Security of Hummingbird-2 Against Side Channel Cube Attacks. The 4th Western European Workshop on Research in Cryptology (WEWoRC 2011).

Cite DOI

(2011). A Survey of Key Revocation Schemes in Mobile Ad Hoc Networks. Chapter in Handbook on Security and Networks.

Cite DOI

(2010). Authorization Key, Consultation and Update Method Based on Common Key Credentials between Interface of Electronic Equipment. China Patent CN1832397B.

Patent

(2010). Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks. The 2nd International Conference on Ad Hoc Networks (AdHocNets 2010).

Cite DOI

(2010). FPGA Implementations of the Hummingbird Cryptographic Algorithm. The 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010).

Cite DOI

(2010). Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010.

Cite DOI

(2010). Pseudo-random Number Generation Method. China Patent CN100583754C.

Patent

(2009). Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontrollers. The 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009).

Cite DOI

(2009). Stream Cipher Generator, Random Digit Generation Method, Encrypting System and Encryption Method. China Patent CN100459493C.

Patent

(2008). Key Revocation based on Dirichlet Multinomial Model for Mobile Ad Hoc Networks. The 33rd IEEE Conference on Local Computer Networks (LCN 2008).

Cite DOI

(2008). Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. The Second International Conference on Pairing-Based Cryptography (Pairing 2008).

Cite DOI

(2008). Elliptic Curve Cipher System and Implementing Method. China Patent CN100414492C.

Patent

(2008). Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates. The 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008).

Cite DOI

(2007). Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. The 14th Annual Workshop on Selected Areas in Cryptography (SAC 2007).

Cite DOI

(2007). Efficient Explicit Formulae for Genus 3 Hyperelliptic Curve Cryptosystems over Binary Fields. IET Information Security, 1(2).

Cite DOI

(2006). Improvement of Inversion-Free Group Operations for Genus 3 Hyperelliptic Curve Cryptosystems. Chapter 7 in New Trends in Cryptographic Systems.

Cite

(2006). Efficient Doubling on Genus 3 Curves over Binary Fields. The Cryptographer’s Track at the RSA Conference (CT-RSA 2006).

Cite DOI

(2005). Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. International Conference on Information Technology: Coding and Computing (ITCC 2005).

Cite DOI

(2005). Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. The IEEE 19th International Conference on Advanced Information Networking and Applications (AINA 2005).

Cite DOI