发表论文
[1] Zhaohui Chen, Yuan Ma, 荆继武. Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst[J]. 2023, [2] Li, Bingyu, Lin, Jingqiang, Li, Fengjun, Wang, Qiongxiao, Wang, Wei, Li, Qi, Cheng, Guangshen, Jing, Jiwu, Wang, Congli. The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2022, 30(2): 749-765, http://dx.doi.org/10.1109/TNET.2021.3123507.[3] Wang, Ze, Lin, Jingqiang, Cai, Quanwei, Wang, Qiongxiao, Zha, Daren, Jing, Jiwu. Blockchain-Based Certificate Transparency and Revocation Transparency. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2022, 19(1): 681-697, [4] Mingyue Wang, Shen Yan, Wei, Wang, 荆继武. Secure zero-effort two-factor authentication based on time-frequency audio analysis. Int. J. Inf. Comput. Securnull. 2022, [5] 李彦初, 雷灵光, 王跃武, 荆继武, 周荃. TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS )[J]. 2022, [6] Jia, Shijie, Zhang, Qionglu, Xia, Luning, Jing, Jiwu, Liu, Peng. MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2022, 19(5): 3494-3507, http://dx.doi.org/10.1109/TDSC.2021.3100897.[7] Chen, Tianyu, Ma, Yuan, Lin, Jingqiang, Cao, Yuan, Lv, Na, Jing, Jiwu. A Lightweight Full Entropy TRNG With On-Chip Entropy Assurance. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2021, 40(12): 2431-2444, [8] Li, Bingyu, Lin, Jingqiang, Wang, Qiongxiao, Wang, Ze, Jing, Jiwu. Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 1380-1395, https://www.webofscience.com/wos/woscc/full-record/WOS:000597145200004.[9] 陈朝晖, 马原, 荆继武. 格密码关键运算模块的硬件实现优化与评估. 北京大学学报:自然科学版[J]. 2021, 57(4): 595-604, http://lib.cqvip.com/Qikan/Article/Detail?id=7105290946.[10] Li, Congwu, Le Guan, Lin, Jingqiang, Luo, Bo, Cai, Quanwei, Jing, Jiwu, Wang, Jing. Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(3): 1196-1213, http://dx.doi.org/10.1109/TDSC.2019.2897666.[11] 荆继武, 李畅. 密码技术的现状与白盒化发展趋势. 中国信息安全[J]. 2021, [12] Chen, Zhaohui, Ma, Yuan, Chen, Tianyu, Lin, Jingqiang, Jing, Jiwu. High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs. INTEGRATION-THE VLSI JOURNAL[J]. 2021, 78: 25-35, http://dx.doi.org/10.1016/j.vlsi.2020.12.005.[13] Guo, Chengqian, Lin, Jingqiang, Cai, Quanwei, Li, Fengjun, Wang, Qiongxiao, Jing, Jiwu, Zhao, Bin, Wang, Wei. UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services. 2021, [14] Chang, Huan, Lei, Lingguang, Sun, Kun, Wang, Yuewu, Jing, Jiwu, He, Yi, Wang, Pingjian. Vulnerable Service Invocation and Countermeasures. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(4): 1733-1750, http://dx.doi.org/10.1109/TDSC.2019.2936848.[15] 荆继武, 龙春, 李畅. 网络安全技术的新趋势探讨. 数据与计算发展前沿[J]. 2021, [16] 陈朝晖, Emre Karabulut, Aydin Aysu, 马原, 荆继武. An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature. International Conference on Computer Design (ICCD)null. 2021, [17] Jing Jiwu. SecureESFS: Sharing Android External Storage Files in A Securer Way. TrustCom 2020. 2020, [18] 王杰, 孙琨, 雷灵光, 王跃武. Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments. CCS[J]. 2020, [19] Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin. Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". SECURITY AND COMMUNICATION NETWORKS[J]. 2020, https://doaj.org/article/66e58d9f871d48a09cc6f487a905e55f.[20] 刘攀, 陈天宇, 马原, 吴鑫莹, 吕娜, 荆继武. 软件随机数发生器安全性的研究综述. 密码学报[J]. 2020, 7(6): 735-749, http://lib.cqvip.com/Qikan/Article/Detail?id=7103776913.[21] 刘攀, 陈天宇, 吕娜, 马原, 荆继武. 一种带有熵监控功能的软件随机数发生器. 中国科学院大学学报[J]. 2020, 37(6): 835-847, http://lib.cqvip.com/Qikan/Article/Detail?id=7103252820.[22] Jing Jiwu. Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds. ESORICS. 2020, [23] Jing Jiwu. Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials. ASP-DAC 2020. 2020, [24] Zhu, Shuangyi, Ma, Yuan, Li, Xusheng, Yang, Jing, Lin, Jingqiang, Jing, Jiwu. On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 1696-1708, http://dx.doi.org/10.1109/TIFS.2019.2947871.[25] Jing Jiwu. Evaluating the Cache Side Channel Attacks Against ECDSA. Inscrypt 2019. 2020, [26] 王杰, 王跃武, 雷灵光. TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors. Sensys[J]. 2020, [27] Li Bingyu, Lin Jingqiang, Li Fengjun, Wang Qiongxiao, Li Qi, Jing Jiwu, Wang Congli, ACM. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19)null. 2019, 2505-2520, http://dx.doi.org/10.1145/3319535.3345653.[28] 马原, 陈天宇, 吴鑫莹, 杨静, 林璟锵, 荆继武. 随机数发生器的设计与检测. 信息安全研究[J]. 2019, 5(1): 39-49, http://lib.cqvip.com/Qikan/Article/Detail?id=7001084595.[29] 林璟锵, 荆继武. 密码应用安全的技术体系探讨. 信息安全研究[J]. 2019, 5(1): 14-22, http://lib.cqvip.com/Qikan/Article/Detail?id=7001084592.[30] Chu, Dawei, Wang, Yuewu, Lei, Lingguang, Li, Yanchu, Jing, Jiwu, Sun, Kun, Sako, K, Schneider, S, Ryan, PYA. OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. COMPUTER SECURITY - ESORICS 2019, PT IInull. 2019, 11736: 412-438, [31] Ma, Yuan, Chen, Tianyu, Lin, Jingqiang, Yang, Jing, Jing, Jiwu. Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2019, 14(11): 2887-2900, https://www.webofscience.com/wos/woscc/full-record/WOS:000473424200007.[32] Ma, Ziqiang, Cai, Quanwei, Lin, Jingqiang, Luo, Bo, Jing, Jiwu. Towards the optimal performance of integrating WARM and DELAY against remote cache timing side channels on block ciphers. JOURNAL OF COMPUTER SECURITY[J]. 2019, 27(5): 547-580, [33] Jing Jiwu. Blockchain-based Certificate Transparency and Revocation Transparency. The 5th Workshop on Bitcoin and Blockchain Research. 2018, [34] Lin Xin, Lei Lingguang, Wang Yuewu, Jing Jiwu, Sun Kun, Zhou Quan, ACM. A Measurement Study on Linux Container Security: Attacks and Countermeasures. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)null. 2018, 418-429, http://dx.doi.org/10.1145/3274694.3274720.[35] Guan, Le, Lin, Jingqiang, Ma, Ziqiang, Luo, Bo, Xia, Luning, Jing, Jiwu. Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2018, 15(5): 742-754, https://www.webofscience.com/wos/woscc/full-record/WOS:000443711200002.[36] Pan, Wuqiong, Zheng, Fangyu, Zhao, Yuan, Zhu, WenTao, Jing, Jiwu. An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY[J]. 2017, 12(1): 111-122, https://www.webofscience.com/wos/woscc/full-record/WOS:000388122000008.[37] Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing. Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2017, 151-168, https://doaj.org/article/85cd8e17255c4bc8a759caac6cd39559.[38] 陈天宇, 马原, 荆继武, 朱双怡. 振荡采样型真随机数发生器的健壮性研究. 信息安全学报[J]. 2017, 2(3): 13-22, http://lib.cqvip.com/Qikan/Article/Detail?id=672914185.[39] Lei Lingguang, He Yi, Sun Kun, Jing Jiwu, Wang Yuewu, Li Qi, Weng Jian, ACM. Vulnerable Implicit Service: A Revisit. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2017, 1051-1063, http://dx.doi.org/10.1145/3133956.3133975.[40] Dong, Jiankuo, Zheng, Fangyu, Pan, Wuqiong, Lin, Jingqiang, Jing, Jiwu, Zhao, Yuan. Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. SECURITY AND COMMUNICATION NETWORKS[J]. 2017, https://doaj.org/article/4d0ffd25887f45ad846f83adc0deb4bf.[41] 马存庆, 刘宗斌, 荆继武. 11EE+SE是移动安全的终极解决方案吗?. 中国信息安全[J]. 2017, 67-69, http://lib.cqvip.com/Qikan/Article/Detail?id=672823756.[42] Ma, Yuan, Lin, Jingqiang, Jing, Jiwu, Handschuh, H. On the Entropy of Oscillator-Based True Random Number Generators. TOPICS IN CRYPTOLOGY - CT-RSA 2017null. 2017, 10159: 165-180, [43] Zhu Shuangyi, Ma Yuan, Lin Jingqiang, Zhuang Jia, Jing Jiwu, Cheon JH, Takagi T. More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT Inull. 2016, 10031: 307-329, [44] 庄家, 马原, 朱双怡, 林璟锵, 荆继武. Q_Value检测: 一种新的随机数统计检测方法. 密码学报[J]. 2016, 3(2): 192-201, [45] Jing Jiwu. HPAZ: A high-throughput pipeline architecture of ZUC in hardware. DATE 2016. 2016, [46] Lin, Jingqiang, Luo, Bo, Guan, Le, Jing, Jiwu. Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. IEEE SECURITY & PRIVACY[J]. 2016, 14(6): 63-70, https://www.webofscience.com/wos/woscc/full-record/WOS:000391503000009.[47] 荆继武. 密钥安全及其在虚拟化技术下的新发展[J].. 密码学报. 2016, [48] 荆继武. 支持策略隐藏的加密云存储访问控制机制[J]. 软件学报. 2016, [49] Zhang Qinglong, Liu Zongbin, Ma Cunqing, Jing Jiwu, Lopez J, Mitchell CJ. Bit Error Probability Evaluation of RO PUFs. INFORMATION SECURITY, ISC 2015null. 2015, 9290: 421-436, [50] Sun, He, Sun, Kun, Wang, Yuewu, Jing, Jiwu. Reliable and Trustworthy Memory Acquisition on Smartphones. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2015, 10(12): 2547-2561, https://www.webofscience.com/wos/woscc/full-record/WOS:000370000800006.[51] Zheng Fangyu, Pan Wuqiong, Lin Jingqiang, Jing Jiwu, Zhao Yuan, Rhee KH, Yi JH. Exploiting the Potential of GPUs for Modular Multiplication in ECC. INFORMATION SECURITY APPLICATIONS, WISA 2014null. 2015, 8909: 295-306, [52] Jing Jiwu. DeepDroid:Dynamically Enforcing Enterprise Policy on Android Devices. NDSS. 2015, [53] Guan Le, Lin Jingqiang, Luo Bo, Jing Jiwu, Wang Jing, IEEE. Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015null. 2015, 3-19, [54] Guan Le, Li Fengjun, Jing Jiwu, Wang Jing, Ma Ziqiang, Tian J, Jing J, Srivatsa M. virtio-ct: A Secure Cryptographic Token Service in Hypervisors. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT IInull. 2015, 153: 285-300, [55] 林璟锵, 荆继武, 张琼露, 王展. PKI技术的近年研究综述. 密码学报[J]. 2015, 2(6): 487-496, [56] Sun He, Sun Kun, Wang Yuewu, Jing Jiwu, Wang Haining, IEEE. TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKSnull. 2015, 367-378, http://dx.doi.org/10.1109/DSN.2015.11.[57] 朱文涛. RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility. IET Information Security. 2015, [58] Zhang Qinglong, Liu Zongbin, Ma Cunqing, Jing Jiwu, Tanaka K, Suga Y. Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015)null. 2015, 9241: 347-356, [59] Yuewu Wang. TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens. ACM Conference on Computer and Communications Security (CCS). 2015, [60] Lin, Jingqiang, Zhu, WenTao, Wang, Qiongxiao, Zhang, Nan, Jing, Jiwu, Gao, Neng. RIKE plus : using revocable identities to support key escrow in public key infrastructures with flexibility. IET INFORMATION SECURITY[J]. 2015, 9(2): 136-147, https://www.webofscience.com/wos/woscc/full-record/WOS:000350214400006.[61] Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei. Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. INFORMATION SECURITY AND PRIVACY, ACISP 2014null. 2014, 8544: 354-369, [62] Jing Jiwu. Copker: Computing with Private Keys without RAM. 21st ISOC Network and Distributed System Security Symposium (NDSS). 2014, [63] Jing Jiwu. Exploiting the Floating-Point Computing Power of GPUs for RSA. 17th Information Security Conference (ISC). 2014, [64] Ma Yuan, Lin Jingqiang, Chen Tianyu, Xu Changwei, Liu Zongbin, Jing Jiwu, Batina L, Robshaw M. Entropy Evaluation for Oscillator-Based True Random Number Generators. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014null. 2014, 8731: 544-561, [65] Ji Xiang, Jiwu Jing, Qinglong Zhang, Zongbin Liu, Miao Li. A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. INFORMATION SECURITY AND PRIVACY, ACISP 2014null. 2014, 8544: 370-385, [66] Sun He, Sun Kun, Wang Yuewu, Jing Jiwu, Jajodia Sushil, Kutylowski M, Vaidya J. TrustDump: Reliable Memory Acquisition on Smartphones. COMPUTER SECURITY - ESORICS 2014, PT Inull. 2014, 8712: 202-218, [67] Zhang Lingchen, Shetty Sachin, Liu Peng, Jing Jiwu, Kutylowski M, Vaidya J. RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. COMPUTER SECURITY - ESORICS 2014, PT IInull. 2014, 8713: 475-493, [68] Seo, Jae Woo, Yum, Dae Hyun, Lee, Pil Joong. Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. THEORETICAL COMPUTER SCIENCE[J]. 2013, 491: 83-93, http://dx.doi.org/10.1016/j.tcs.2012.11.026.[69] Jing Jiwu. Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels. ICICS2013. 2013, [70] Jing Jiwu. A Scalable Anonymity Scheme Based on DHT Distributed Inquiry. TrustCom 2012. 2012, [71] Lin Jingqiang, Luo Bo, Jing Jiwu, Zhang Xiaokun, IEEE. GRADE: Graceful Degradation in Byzantine Quorum Systems. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012)null. 2012, 171-180, [72] Jing Jiwu. RIKE: Using Revocable Identities to Support Key Escrow in PKIs. 10th International Conference on Applied Cryptography and Network Security (ACNS). 2012, [73] Lin, Jingqiang, Jing, Jiwu, Liu, Peng. Evaluating Intrusion-Tolerant Certification Authority Systems. QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL[J]. 2012, 28(8): 825-841, https://www.webofscience.com/wos/woscc/full-record/WOS:000311607300004.[74] 荆继武. 密码认证与信任保障. 信息安全与通信保密[J]. 2012, 18-19, http://lib.cqvip.com/Qikan/Article/Detail?id=40685787.[75] 刘宗斌, 荆继武, 夏鲁宁. BLAKE算法的硬件实现研究. 计算机学报[J]. 2012, 35(4): 703-711, http://lib.cqvip.com/Qikan/Article/Detail?id=41765717.[76] Jing Jiwu. Towards Fine-Grained Access Control on Browser Extensions. ISPEC2012. 2012, [77] Jing Jiwu. Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality. 3rd Conference on Decision and Game Theory for Security (GameSec). 2012, [78] Jing Jiwu. Privacy Preserving Social Network Publication on Bipartite Graphs. Wistp2012. 2012, [79] 王文韬, 林璟锵, 荆继武, 罗勃. TSS-BQS系统的GracefulDegradation机制. 计算机学报[J]. 2012, 35(9): 1793-1803, http://lib.cqvip.com/Qikan/Article/Detail?id=43376000.[80] Jing Jiwu. Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. ICICS. 2012, [81] Wang Zhan, Sun Kun, Jajodia Sushil, Jing Jiwu, IEEE. Disk Storage Isolation and Verification in Cloud. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)null. 2012, 771-776, [82] Jing Jiwu. An efficient RSA Implementation without Precomputation. Inscrypt2011. 2011, [83] 荆继武. Enabling Anonymous Undeniable Accounting in Cloud Storage. 2011, [84] Jing Jiwu. Cloud Shredder-Removing the Laptop On-Road Data Disclosure Threat in the Cloud Computing Era. FCST2011. 2011, [85] Lv, Chunli, Jia, Xiaoqi, Lin, Jingqiang, Jing, Jiwu, Tian, Lijun, Sun, Mingli, Park, JJ, Lopez, J, Yeo, SS, Shon, T, Taniar, D. Efficient Secret Sharing Schemes. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONSnull. 2011, 186: 114-+, [86] 刘宗斌, 马原, 荆继武, 夏鲁宁. SM3哈希算法的硬件实现与研究. 信息网络安全[J]. 2011, 191-193, http://lib.cqvip.com/Qikan/Article/Detail?id=39271379.[87] Jing Jiwu. Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. ICICS2011. 2011, [88] Liu, Mei, Fu, Ge, Jing, Jiwu, Wang, G, Tate, SR, Chen, JJ, Sakurai, K. eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11null. 2011, 745-750, [89] Lv Chunli, Jia Xiaoqi, Lin Jingqiang, Jing Jiwu, Tian Lijun, Bao F, Weng J. An Efficient Group-Based Secret Sharing Scheme. INFORMATION SECURITY PRACTICE AND EXPERIENCEnull. 2011, 6672: 288-301, [90] 荆继武. 基于Fluid的大规模带宽限制蠕虫仿真模型软件学报版. 软件学报. 2011, [91] Liu, Limin, Han, Jin, Gao, Debin, Jing, Jiwu, Zha, Daren, Wang, G, Tate, SR, Chen, JJ, Sakurai, K. Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. TRUSTCOM20112011INTERNATIONALJOINTCONFERENCEOFIEEETRUSTCOM11IEEEICESS11FCST11null. 2011, 37-44, [92] Liu, Zongbin, Xia, Luning, Jing, Jiwu, Liu, Peng, IEEE. A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHYnull. 2011, 105-113, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000342217900015.[93] Jing Jiwu. An Optimized Architecture to Speed Up the Montgomery Modular. he 2011 International Conference on Computers, Communications,Control and Automation. 2011, [94] 荆继武. Secure Storage Systems with Access Structures. NSWCTC 2011. 2011, [95] 康乐, 荆继武, 王跃武. 社会化网络服务中的信任扩张与控制. 计算机研究与发展[J]. 2010, 1611-1621, http://lib.cqvip.com/Qikan/Article/Detail?id=35181887.[96] 荆继武, 王晶, 林璟锵, 谢永泉, 顾青. 基于门限签名方案的BQS系统的服务器协议. 软件学报[J]. 2010, 2631-2641, http://lib.cqvip.com/Qikan/Article/Detail?id=35457574.[97] Zha Daren, Jing Jiwu, Kang Le, Kwak J, Deng RH, Won Y, Wang G. Mitigating the Malicious Trust Expansion in Social Network Service. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGSnull. 2010, 6047: 264-275, [98] 荆继武. Precise web page segmentation based on semantic block headers detection. IDC 2010. 2010, [99] Jia Xiaoqi, Xiong Xi, Jing Jiwu, Liu Peng, Kwak J, Deng RH, Won Y, Wang G. Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGSnull. 2010, 6047: 153-+, [100] Lin, Jingqiang, Liu, Peng, Jing, Jiwu, Wang, Qiongxiao, Jajodia, S, Zhou, JY. Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SECURITY AND PRIVACY IN COMMUNICATION NETWORKSnull. 2010, 50: 307-+, [101] Wang Pingjian, Lin Jingqiang, Jing Jiwu, Xie Yongquan, Yu F, Peng X, Liu H, Shu J, Ng R. Mediated Hierarchical Identity-Based Combined Public Key Schemes. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010)null. 2010, 614-618, http://dx.doi.org/10.1109/IITSI.2010.20.[102] 吴晶晶, 荆继武, 林璟锵. 构建真实信任关系下的CA体系. 小型微型计算机系统[J]. 2010, 243-248, http://lib.cqvip.com/Qikan/Article/Detail?id=33109423.[103] Zha, Daren, Jing, Jiwu, Liu, Peng, Lin, Jingqiang, Jia, Xiaoqi, Taniar, D, Gervasi, O, Murgante, B, Pardede, E, Apduhan, BO. Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGSnull. 2010, 6019: 468-+, [104] Liu Zongbin, Jing Jiwu, Liu Peng, Kwak J, Deng RH, Won Y, Wang G. Rate-Based Watermark Traceback: A New Approach. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGSnull. 2010, 6047: 172-+, [105] 荆继武. 一种基于云存储技术的网络视频监控系统存储方案. IEEE计算机智能与工业应用国际会议. 2010, [106] 荆继武. A secure storage System combining secret sharing scheme in Byzantine quatum system. CIT 2010. 2010, [107] 张帆, 顾青, 荆继武, 林璟锵, 査达仁. PKI系统的应用互操作评估. 中国科学院研究生院学报[J]. 2010, 27(6): 824-830, http://lib.cqvip.com/Qikan/Article/Detail?id=36104150.[108] 荆继武. Finding Topics in News Web Pages by Parameter-free Clustering. ICEBI 2010. 2010, [109] Jhi, YoonChan, Liu, Peng, Li, Lunquan, Gu, Qijun, Jing, Jiwu, Kesidis, George. PWC: a proactive worm containment solution for enterprise networks. SECURITY AND COMMUNICATION NETWORKS[J]. 2010, 3(4): 334-354, https://www.webofscience.com/wos/woscc/full-record/WOS:000281654600004.[110] 荆继武. Deplpoyment of Delegated Certification Path Validation in Cloud For Mobile Business. ICEBI 2010. 2010, [111] 荆继武. Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. NSS 2010. 2010, [112] 吴晶晶, 荆继武, 聂晓峰, 王平建. 一种快速中文分词词典机制. 中国科学院研究生院学报[J]. 2009, 703-711, http://lib.cqvip.com/Qikan/Article/Detail?id=31752412.[113] 王跃武, 陈红, 荆继武, 聂晓峰. 仿真技术在信息安全研究中的应用. 信息网络安全[J]. 2009, 44-46, http://lib.cqvip.com/Qikan/Article/Detail?id=31860170.[114] 张爱华, 荆继武, 向继. 中文文本分类中的文本表示因素比较. 中国科学院研究生院学报[J]. 2009, 26(3): 400-407, http://lib.cqvip.com/Qikan/Article/Detail?id=30614094.[115] 高能, 夏鲁宁, 荆继武, 文晓阳. 高效的验证码识别技术与验证码分类思想. 计算机工程[J]. 2009, 35(8): 186-188,191, http://lib.cqvip.com/Qikan/Article/Detail?id=30109062.[116] 荆继武. 真实应用环境下的PKI信任模式. 中国科学院研究生院学报. 2009, [117] 向继, 高能, 荆继武. 一种基于门限签名的可靠蠕虫特征产生系统. 计算机学报[J]. 2009, 930-939, http://lib.cqvip.com/Qikan/Article/Detail?id=30348247.[118] Wang Jing, Xia Luning, Jing Jiwu, Gong Q, Jiang Y, Grecos C. Analysis for Location-based Key Pre-distribution in Wireless Sensor Networks. ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGSnull. 2009, 297-+, http://dx.doi.org/10.1109/ICIC.2009.186.[119] 王晶, 夏鲁宁, 荆继武, 顾青. 一种可容忍代码错误的专用计算机系统模型. 中国科学院研究生院学报[J]. 2009, 26(6): 826-834, http://lib.cqvip.com/Qikan/Article/Detail?id=32234097.[120] 夏鲁宁, 荆继武. SA-DBSCAN:一种自适应基于密度聚类算法. 中国科学院研究生院学报[J]. 2009, 26(4): 530-538, http://lib.cqvip.com/Qikan/Article/Detail?id=30942879.[121] 王晶, 夏鲁宁, 荆继武. 一种基于密度最大值的聚类算法. 中国科学院研究生院学报[J]. 2009, 26(4): 539-548, http://lib.cqvip.com/Qikan/Article/Detail?id=30942880.[122] 徐晨亮, 荆继武. 网络蠕虫仿真研究. 计算机仿真[J]. 2009, 142-145, http://lib.cqvip.com/Qikan/Article/Detail?id=31083980.[123] Jing Jiwu. A model of efficient intrusion recovery solution based on log-structured file system. 中国科学院研究生院学报. 2008, [124] Jing Jiwu. A decentralized certification authority based on real world trust relationships. Proceedings - International Conference on Computer Science and Software Engineering. 2008, [125] Jing Jiwu. Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. Proceedings - International Conference on Computer Science and Software Engineering. 2008, [126] Lin Jingqiang, Jing Jiwu, Liu Peng, Huai J, Baldoni R, Yen IL. A framework for intrusion tolerant certification authority system evaluation. SRDS 2007: 26TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGSnull. 2007, 231-+, [127] Jhi YoonChan, Liu Peng, Li Lunquan, Gu Qijun, Jing Jiwu, Kesidis George, IEEE. PWC: A proactive worm containment solution for enterprise networks. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPSnull. 2007, 433-+, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000259291500050.[128] Liu, P, Jing, JW, Luenam, P, Wang, Y, Li, LQ, Ingsriswang, S. The design and implementation of a self-healing database system. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS[J]. 2004, 23(3): 247-269, http://www.corc.org.cn/handle/1471x/2376904.