发表论文
[1] IEEE Trans. Dependable Secur. Comput. 21(1). 2024, 第 5 作者[2] Des. Codes Cryptogr. 2023, 第 5 作者[3] Zhaohui Chen, Yuan Ma, 荆继武. Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst[J]. 2023, 第 3 作者[4] ICPP 2023. 2023, 第 7 作者[5] ACNS Workshops 2023. 2023, 第 3 作者[6] Li, Bingyu, Lin, Jingqiang, Li, Fengjun, Wang, Qiongxiao, Wang, Wei, Li, Qi, Cheng, Guangshen, Jing, Jiwu, Wang, Congli. The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2022, 第 8 作者30(2): 749-765, http://dx.doi.org/10.1109/TNET.2021.3123507.[7] Wang, Ze, Lin, Jingqiang, Cai, Quanwei, Wang, Qiongxiao, Zha, Daren, Jing, Jiwu. Blockchain-Based Certificate Transparency and Revocation Transparency. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2022, 第 6 作者19(1): 681-697, http://dx.doi.org/10.1109/TDSC.2020.2983022.[8] Mingyue Wang, Shen Yan, Wei, Wang, 荆继武. Secure zero-effort two-factor authentication based on time-frequency audio analysis. Int. J. Inf. Comput. Secur. 2022, 第 4 作者[9] 李彦初, 雷灵光, 王跃武, 荆继武, 周荃. TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS )[J]. 2022, 第 4 作者[10] Jia, Shijie, Zhang, Qionglu, Xia, Luning, Jing, Jiwu, Liu, Peng. MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING(CCF-A)[J]. 2022, 第 4 作者19(5): 3494-3507, http://dx.doi.org/10.1109/TDSC.2021.3100897.[11] Chen, Tianyu, Ma, Yuan, Lin, Jingqiang, Cao, Yuan, Lv, Na, Jing, Jiwu. A Lightweight Full Entropy TRNG With On-Chip Entropy Assurance. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2021, 第 6 作者40(12): 2431-2444, [12] Li, Bingyu, Lin, Jingqiang, Wang, Qiongxiao, Wang, Ze, Jing, Jiwu. Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 第 5 作者16: 1380-1395, https://www.webofscience.com/wos/woscc/full-record/WOS:000597145200004.[13] 陈朝晖, 马原, 荆继武. 格密码关键运算模块的硬件实现优化与评估. 北京大学学报:自然科学版[J]. 2021, 第 3 作者57(4): 595-604, http://lib.cqvip.com/Qikan/Article/Detail?id=7105290946.[14] Li, Congwu, Le Guan, Lin, Jingqiang, Luo, Bo, Cai, Quanwei, Jing, Jiwu, Wang, Jing. Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 第 6 作者18(3): 1196-1213, http://dx.doi.org/10.1109/TDSC.2019.2897666.[15] Chen, Zhaohui, Ma, Yuan, Chen, Tianyu, Lin, Jingqiang, Jing, Jiwu. High-performance area-efficient polynomial ring processor for CRYSTALS-Kyber on FPGAs. INTEGRATION-THE VLSI JOURNAL[J]. 2021, 第 5 作者78: 25-35, http://dx.doi.org/10.1016/j.vlsi.2020.12.005.[16] 荆继武, 李畅. 密码技术的现状与白盒化发展趋势. 中国信息安全[J]. 2021, 第 1 作者[17] Guo, Chengqian, Lin, Jingqiang, Cai, Quanwei, Li, Fengjun, Wang, Qiongxiao, Jing, Jiwu, Zhao, Bin, Wang, Wei. UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services. 2021, 第 6 作者[18] Chang, Huan, Lei, Lingguang, Sun, Kun, Wang, Yuewu, Jing, Jiwu, He, Yi, Wang, Pingjian. Vulnerable Service Invocation and Countermeasures. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 第 5 作者18(4): 1733-1750, http://dx.doi.org/10.1109/TDSC.2019.2936848.[19] 荆继武, 龙春, 李畅. 网络安全技术的新趋势探讨. 数据与计算发展前沿[J]. 2021, 第 1 作者[20] 陈朝晖, Emre Karabulut, Aydin Aysu, 马原, 荆继武. An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature. International Conference on Computer Design (ICCD). 2021, 第 5 作者[21] Shan Liang, Yuewu Wang, Lei, Lingguang, Jiwu Jing, Quan Zhou. SecureESFS: Sharing Android External Storage Files in A Securer Way. TrustCom 2020[J]. 2020, 第 4 作者[22] 王杰, 孙琨, 雷灵光, 王跃武. Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments. CCS[J]. 2020, [23] Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin. Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". SECURITY AND COMMUNICATION NETWORKS[J]. 2020, 第 6 作者https://doaj.org/article/66e58d9f871d48a09cc6f487a905e55f.[24] 刘攀, 陈天宇, 吕娜, 马原, 荆继武. 一种带有熵监控功能的软件随机数发生器. 中国科学院大学学报[J]. 2020, 第 5 作者37(6): 835-847, http://journal.ucas.ac.cn/CN/10.7523/j.issn.2095-6134.2020.06.016.[25] 刘攀, 陈天宇, 马原, 吴鑫莹, 吕娜, 荆继武. 软件随机数发生器安全性的研究综述. 密码学报[J]. 2020, 第 6 作者7(6): 735-749, http://lib.cqvip.com/Qikan/Article/Detail?id=7103776913.[26] You Weijing, Bo Chen, Limin Liu, jing jiwu. Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds. ESORICS. 2020, 第 4 作者[27] 陈朝晖, 马原, 陈天宇, 林璟锵, 荆继武. Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials. ASP-DAC 2020. 2020, 第 5 作者[28] Zhu, Shuangyi, Ma, Yuan, Li, Xusheng, Yang, Jing, Lin, Jingqiang, Jing, Jiwu. On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 第 6 作者15: 1696-1708, http://dx.doi.org/10.1109/TIFS.2019.2947871.[29] Jing Jiwu. Evaluating the Cache Side Channel Attacks Against ECDSA. Inscrypt 2019. 2020, 第 1 作者[30] 王杰, 王跃武, 雷灵光. TrustICT: An Efficient Trusted Interaction Interface between Isolated Execution Domains on ARM Multi-core Processors. Sensys[J]. 2020, [31] Li Bingyu, Lin Jingqiang, Li Fengjun, Wang Qiongxiao, Li Qi, Jing Jiwu, Wang Congli, ACM. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19). 2019, 第 6 作者2505-2520, http://dx.doi.org/10.1145/3319535.3345653.[32] 马原, 陈天宇, 吴鑫莹, 杨静, 林璟锵, 荆继武. 随机数发生器的设计与检测. 信息安全研究[J]. 2019, 第 6 作者5(1): 39-49, http://lib.cqvip.com/Qikan/Article/Detail?id=7001084595.[33] 林璟锵, 荆继武. 密码应用安全的技术体系探讨. 信息安全研究[J]. 2019, 第 2 作者5(1): 14-22, http://lib.cqvip.com/Qikan/Article/Detail?id=7001084592.[34] Chu, Dawei, Wang, Yuewu, Lei, Lingguang, Li, Yanchu, Jing, Jiwu, Sun, Kun, Sako, K, Schneider, S, Ryan, PYA. OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. COMPUTER SECURITY - ESORICS 2019, PT II[J]. 2019, 第 5 作者11736: 412-438, [35] Ma, Yuan, Chen, Tianyu, Lin, Jingqiang, Yang, Jing, Jing, Jiwu. Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2019, 第 5 作者14(11): 2887-2900, https://www.webofscience.com/wos/woscc/full-record/WOS:000473424200007.[36] Ma, Ziqiang, Cai, Quanwei, Lin, Jingqiang, Luo, Bo, Jing, Jiwu. Towards the optimal performance of integrating WARM and DELAY against remote cache timing side channels on block ciphers. JOURNAL OF COMPUTER SECURITY[J]. 2019, 第 5 作者27(5): 547-580, [37] Jing Jiwu. Blockchain-based Certificate Transparency and Revocation Transparency. The 5th Workshop on Bitcoin and Blockchain Research. 2018, 第 1 作者[38] Lin Xin, Lei, Lingguang, Wang Yuewu, Jing Jiwu, Sun Kun, Zhou Quan, ACM. A Measurement Study on Linux Container Security: Attacks and Countermeasures. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)[J]. 2018, 第 4 作者418-429, http://dx.doi.org/10.1145/3274694.3274720.[39] Guan, Le, Lin, Jingqiang, Ma, Ziqiang, Luo, Bo, Xia, Luning, Jing, Jiwu. Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2018, 第 6 作者15(5): 742-754, https://www.webofscience.com/wos/woscc/full-record/WOS:000443711200002.[40] 马存庆, 刘宗斌, 荆继武. 11EE+SE是移动安全的终极解决方案吗?. 中国信息安全[J]. 2017, 第 3 作者67-69, http://lib.cqvip.com/Qikan/Article/Detail?id=672823756.[41] Ma, Yuan, Lin, Jingqiang, Jing, Jiwu, Handschuh, H. On the Entropy of Oscillator-Based True Random Number Generators. TOPICS IN CRYPTOLOGY - CT-RSA 2017. 2017, 第 3 作者10159: 165-180, [42] Pan, Wuqiong, Zheng, Fangyu, Zhao, Yuan, Zhu, WenTao, Jing, Jiwu. An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY[J]. 2017, 第 5 作者12(1): 111-122, https://www.webofscience.com/wos/woscc/full-record/WOS:000388122000008.[43] Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing. Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY[J]. 2017, 第 5 作者151-168, https://doaj.org/article/85cd8e17255c4bc8a759caac6cd39559.[44] 陈天宇, 马原, 荆继武, 朱双怡. 振荡采样型真随机数发生器的健壮性研究. 信息安全学报[J]. 2017, 第 3 作者2(3): 13-22, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20170302&flag=1.[45] Lei Lingguang, He Yi, Sun Kun, Jing Jiwu, Wang Yuewu, Li Qi, Weng Jian, ACM. Vulnerable Implicit Service: A Revisit. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY. 2017, 第 4 作者1051-1063, http://dx.doi.org/10.1145/3133956.3133975.[46] Dong, Jiankuo, Zheng, Fangyu, Pan, Wuqiong, Lin, Jingqiang, Jing, Jiwu, Zhao, Yuan. Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. SECURITY AND COMMUNICATION NETWORKS[J]. 2017, 第 5 作者https://doaj.org/article/4d0ffd25887f45ad846f83adc0deb4bf.[47] Zhu Shuangyi, Ma Yuan, Lin Jingqiang, Zhuang Jia, Jing Jiwu, Cheon JH, Takagi T. More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I. 2016, 第 5 作者10031: 307-329, [48] 庄家, 马原, 朱双怡, 林璟锵, 荆继武. Q_Value检测: 一种新的随机数统计检测方法. 密码学报[J]. 2016, 第 5 作者3(2): 192-201, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=5697808&detailType=1.[49] Jing Jiwu. HPAZ: A high-throughput pipeline architecture of ZUC in hardware. DATE 2016. 2016, 第 1 作者[50] Lin, Jingqiang, Luo, Bo, Guan, Le, Jing, Jiwu. Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. IEEE SECURITY & PRIVACY[J]. 2016, 第 4 作者14(6): 63-70, https://www.webofscience.com/wos/woscc/full-record/WOS:000391503000009.[51] 荆继武. 密钥安全及其在虚拟化技术下的新发展[J].. 密码学报. 2016, 第 1 作者[52] 荆继武. 支持策略隐藏的加密云存储访问控制机制[J]. 软件学报. 2016, 第 1 作者[53] Zhang Qinglong, Liu Zongbin, Ma Cunqing, Jing Jiwu, Lopez J, Mitchell CJ. Bit Error Probability Evaluation of RO PUFs. INFORMATION SECURITY, ISC 2015. 2015, 第 4 作者9290: 421-436, [54] Sun, He, Sun, Kun, Wang, Yuewu, Jing, Jiwu. Reliable and Trustworthy Memory Acquisition on Smartphones. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2015, 第 4 作者10(12): 2547-2561, https://www.webofscience.com/wos/woscc/full-record/WOS:000370000800006.[55] Zheng Fangyu, Pan Wuqiong, Lin Jingqiang, Jing Jiwu, Zhao Yuan, Rhee KH, Yi JH. Exploiting the Potential of GPUs for Modular Multiplication in ECC. INFORMATION SECURITY APPLICATIONS, WISA 2014. 2015, 第 4 作者8909: 295-306, [56] Jing Jiwu. DeepDroid:Dynamically Enforcing Enterprise Policy on Android Devices. NDSS. 2015, 第 1 作者[57] Guan Le, Lin Jingqiang, Luo Bo, Jing Jiwu, Wang Jing, IEEE. Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015. 2015, 第 4 作者3-19, [58] Guan Le, Li Fengjun, Jing Jiwu, Wang Jing, Ma Ziqiang, Tian J, Jing J, Srivatsa M. virtio-ct: A Secure Cryptographic Token Service in Hypervisors. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II. 2015, 第 3 作者153: 285-300, [59] 林璟锵, 荆继武, 张琼露, 王展. PKI技术的近年研究综述. 密码学报[J]. 2015, 第 2 作者2(6): 487-496, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=5601807&detailType=1.[60] Sun He, Sun Kun, Wang Yuewu, Jing Jiwu, Wang Haining, IEEE. TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS. 2015, 第 4 作者367-378, http://dx.doi.org/10.1109/DSN.2015.11.[61] 朱文涛. RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility. IET Information Security. 2015, [62] Zhang Qinglong, Liu Zongbin, Ma Cunqing, Jing Jiwu, Tanaka K, Suga Y. Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015). 2015, 第 4 作者9241: 347-356, [63] Yuewu Wang. TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens. ACM Conference on Computer and Communications Security (CCS). 2015, [64] Lin, Jingqiang, Zhu, WenTao, Wang, Qiongxiao, Zhang, Nan, Jing, Jiwu, Gao, Neng. RIKE plus : using revocable identities to support key escrow in public key infrastructures with flexibility. IET INFORMATION SECURITY[J]. 2015, 第 5 作者9(2): 136-147, https://www.webofscience.com/wos/woscc/full-record/WOS:000350214400006.[65] Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei. Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. INFORMATION SECURITY AND PRIVACY, ACISP 2014. 2014, 第 3 作者8544: 354-369, [66] Jing Jiwu. Copker: Computing with Private Keys without RAM. 21st ISOC Network and Distributed System Security Symposium (NDSS). 2014, 第 1 作者[67] Jing Jiwu. Exploiting the Floating-Point Computing Power of GPUs for RSA. 17th Information Security Conference (ISC). 2014, 第 1 作者[68] Ma Yuan, Lin Jingqiang, Chen Tianyu, Xu Changwei, Liu Zongbin, Jing Jiwu, Batina L, Robshaw M. Entropy Evaluation for Oscillator-Based True Random Number Generators. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014. 2014, 第 6 作者8731: 544-561, [69] Ji Xiang, Jiwu Jing, Qinglong Zhang, Zongbin Liu, Miao Li. A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. INFORMATION SECURITY AND PRIVACY, ACISP 2014. 2014, 第 2 作者8544: 370-385, [70] Sun He, Sun Kun, Wang Yuewu, Jing Jiwu, Jajodia Sushil, Kutylowski M, Vaidya J. TrustDump: Reliable Memory Acquisition on Smartphones. COMPUTER SECURITY - ESORICS 2014, PT I. 2014, 第 4 作者8712: 202-218, [71] Zhang Lingchen, Shetty Sachin, Liu Peng, Jing Jiwu, Kutylowski M, Vaidya J. RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. COMPUTER SECURITY - ESORICS 2014, PT II. 2014, 第 4 作者8713: 475-493, [72] Seo, Jae Woo, Yum, Dae Hyun, Lee, Pil Joong. Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. THEORETICAL COMPUTER SCIENCE[J]. 2013, 491: 83-93, http://dx.doi.org/10.1016/j.tcs.2012.11.026.[73] Jing Jiwu. Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels. ICICS2013. 2013, 第 1 作者 通讯作者 [74] Jing Jiwu. A Scalable Anonymity Scheme Based on DHT Distributed Inquiry. TrustCom 2012. 2012, 第 1 作者[75] Lin Jingqiang, Luo Bo, Jing Jiwu, Zhang Xiaokun, IEEE. GRADE: Graceful Degradation in Byzantine Quorum Systems. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012). 2012, 第 3 作者171-180, [76] Jing Jiwu. RIKE: Using Revocable Identities to Support Key Escrow in PKIs. 10th International Conference on Applied Cryptography and Network Security (ACNS). 2012, 第 1 作者[77] Lin, Jingqiang, Jing, Jiwu, Liu, Peng. Evaluating Intrusion-Tolerant Certification Authority Systems. QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL[J]. 2012, 第 2 作者28(8): 825-841, https://www.webofscience.com/wos/woscc/full-record/WOS:000311607300004.[78] 荆继武. 密码认证与信任保障. 信息安全与通信保密[J]. 2012, 第 1 作者18-19, http://lib.cqvip.com/Qikan/Article/Detail?id=40685787.[79] 刘宗斌, 荆继武, 夏鲁宁. BLAKE算法的硬件实现研究. 计算机学报[J]. 2012, 第 2 作者35(4): 703-711, http://lib.cqvip.com/Qikan/Article/Detail?id=41765717.[80] Jing Jiwu. Towards Fine-Grained Access Control on Browser Extensions. ISPEC2012. 2012, 第 1 作者[81] Jing Jiwu. Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality. 3rd Conference on Decision and Game Theory for Security (GameSec). 2012, 第 1 作者[82] Jing Jiwu. Privacy Preserving Social Network Publication on Bipartite Graphs. Wistp2012. 2012, 第 1 作者[83] 王文韬, 林璟锵, 荆继武, 罗勃. TSS-BQS系统的GracefulDegradation机制. 计算机学报[J]. 2012, 第 3 作者35(9): 1793-1803, http://lib.cqvip.com/Qikan/Article/Detail?id=43376000.[84] Jing Jiwu. Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. ICICS. 2012, 第 1 作者[85] Wang Zhan, Sun Kun, Jajodia Sushil, Jing Jiwu, IEEE. Disk Storage Isolation and Verification in Cloud. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2012, 第 4 作者771-776, [86] Liu, Mei, Fu, Ge, Jing, Jiwu, Wang, G, Tate, SR, Chen, JJ, Sakurai, K. eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11. 2011, 第 3 作者745-750, [87] Lv Chunli, Jia Xiaoqi, Lin Jingqiang, Jing Jiwu, Tian Lijun, Bao F, Weng J. An Efficient Group-Based Secret Sharing Scheme. INFORMATION SECURITY PRACTICE AND EXPERIENCE. 2011, 第 4 作者6672: 288-301, [88] 荆继武. 基于Fluid的大规模带宽限制蠕虫仿真模型软件学报版. 软件学报. 2011, 第 1 作者[89] Liu, Limin, Han, Jin, Gao, Debin, Jing, Jiwu, Zha, Daren, Wang, G, Tate, SR, Chen, JJ, Sakurai, K. Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. TRUSTCOM20112011INTERNATIONALJOINTCONFERENCEOFIEEETRUSTCOM11IEEEICESS11FCST11. 2011, 第 4 作者37-44, [90] Liu, Zongbin, Xia, Luning, Jing, Jiwu, Liu, Peng, IEEE. A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY. 2011, 第 3 作者105-113, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000342217900015.[91] Jing Jiwu. An Optimized Architecture to Speed Up the Montgomery Modular. he 2011 International Conference on Computers, Communications,Control and Automation. 2011, 第 1 作者[92] 荆继武. Secure Storage Systems with Access Structures. NSWCTC 2011. 2011, 第 1 作者[93] Jing Jiwu. An efficient RSA Implementation without Precomputation. Inscrypt2011. 2011, 第 1 作者[94] 荆继武. Enabling Anonymous Undeniable Accounting in Cloud Storage. 2011, 第 1 作者[95] Jing Jiwu. Cloud Shredder-Removing the Laptop On-Road Data Disclosure Threat in the Cloud Computing Era. FCST2011. 2011, 第 1 作者[96] Lv, Chunli, Jia, Xiaoqi, Lin, Jingqiang, Jing, Jiwu, Tian, Lijun, Sun, Mingli, Park, JJ, Lopez, J, Yeo, SS, Shon, T, Taniar, D. Efficient Secret Sharing Schemes. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS. 2011, 第 4 作者186: 114-+, [97] 刘宗斌, 马原, 荆继武, 夏鲁宁. SM3哈希算法的硬件实现与研究. 信息网络安全[J]. 2011, 第 3 作者191-193, http://lib.cqvip.com/Qikan/Article/Detail?id=39271379.[98] Jing Jiwu. Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. ICICS2011. 2011, 第 1 作者[99] 荆继武, 王晶, 林璟锵, 谢永泉, 顾青. 基于门限签名方案的BQS系统的服务器协议. 软件学报[J]. 2010, 第 1 作者2631-2641, http://lib.cqvip.com/Qikan/Article/Detail?id=35457574.[100] 康乐, 荆继武, 王跃武. 社会化网络服务中的信任扩张与控制. 计算机研究与发展[J]. 2010, 第 2 作者1611-1621, http://lib.cqvip.com/Qikan/Article/Detail?id=35181887.[101] Zha Daren, Jing Jiwu, Kang Le, Kwak J, Deng RH, Won Y, Wang G. Mitigating the Malicious Trust Expansion in Social Network Service. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS. 2010, 第 2 作者6047: 264-275, [102] 荆继武. Precise web page segmentation based on semantic block headers detection. IDC 2010. 2010, 第 1 作者[103] Jia Xiaoqi, Xiong Xi, Jing Jiwu, Liu Peng, Kwak J, Deng RH, Won Y, Wang G. Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS. 2010, 第 3 作者6047: 153-+, [104] Lin, Jingqiang, Liu, Peng, Jing, Jiwu, Wang, Qiongxiao, Jajodia, S, Zhou, JY. Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS. 2010, 第 3 作者50: 307-+, [105] Wang Pingjian, Lin Jingqiang, Jing Jiwu, Xie Yongquan, Yu F, Peng X, Liu H, Shu J, Ng R. Mediated Hierarchical Identity-Based Combined Public Key Schemes. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010). 2010, 第 3 作者614-618, http://dx.doi.org/10.1109/IITSI.2010.20.[106] 吴晶晶, 荆继武, 林璟锵. 构建真实信任关系下的CA体系. 小型微型计算机系统[J]. 2010, 第 2 作者31(2): 243-248, http://xwxt.sict.ac.cn/CN/Y2010/V31/I2/243.[107] Zha, Daren, Jing, Jiwu, Liu, Peng, Lin, Jingqiang, Jia, Xiaoqi, Taniar, D, Gervasi, O, Murgante, B, Pardede, E, Apduhan, BO. Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS. 2010, 第 2 作者6019: 468-+, [108] Liu Zongbin, Jing Jiwu, Liu Peng, Kwak J, Deng RH, Won Y, Wang G. Rate-Based Watermark Traceback: A New Approach. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS. 2010, 第 2 作者6047: 172-+, [109] 荆继武. 一种基于云存储技术的网络视频监控系统存储方案. IEEE计算机智能与工业应用国际会议. 2010, 第 1 作者[110] 荆继武. A secure storage System combining secret sharing scheme in Byzantine quatum system. CIT 2010. 2010, 第 1 作者[111] 张帆, 顾青, 荆继武, 林璟锵, 査达仁. PKI系统的应用互操作评估. 中国科学院研究生院学报[J]. 2010, 第 3 作者27(6): 824-830, http://lib.cqvip.com/Qikan/Article/Detail?id=36104150.[112] 荆继武. Finding Topics in News Web Pages by Parameter-free Clustering. ICEBI 2010. 2010, 第 1 作者[113] Jhi, YoonChan, Liu, Peng, Li, Lunquan, Gu, Qijun, Jing, Jiwu, Kesidis, George. PWC: a proactive worm containment solution for enterprise networks. SECURITY AND COMMUNICATION NETWORKS[J]. 2010, 第 5 作者3(4): 334-354, https://www.webofscience.com/wos/woscc/full-record/WOS:000281654600004.[114] 荆继武. Deplpoyment of Delegated Certification Path Validation in Cloud For Mobile Business. ICEBI 2010. 2010, 第 1 作者[115] 荆继武. Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. NSS 2010. 2010, 第 1 作者[116] 吴晶晶, 荆继武, 聂晓峰, 王平建. 一种快速中文分词词典机制. 中国科学院研究生院学报[J]. 2009, 第 2 作者703-711, http://lib.cqvip.com/Qikan/Article/Detail?id=31752412.[117] 王跃武, 陈红, 荆继武, 聂晓峰. 仿真技术在信息安全研究中的应用. 信息网络安全[J]. 2009, 第 3 作者44-46, http://lib.cqvip.com/Qikan/Article/Detail?id=31860170.[118] 高能, 夏鲁宁, 荆继武, 文晓阳. 高效的验证码识别技术与验证码分类思想. 计算机工程[J]. 2009, 第 3 作者35(8): 186-188,191, http://lib.cqvip.com/Qikan/Article/Detail?id=30109062.[119] 张爱华, 荆继武, 向继. 中文文本分类中的文本表示因素比较. 中国科学院研究生院学报[J]. 2009, 第 2 作者26(3): 400-407, http://lib.cqvip.com/Qikan/Article/Detail?id=30614094.[120] 荆继武. 真实应用环境下的PKI信任模式. 中国科学院研究生院学报. 2009, 第 1 作者[121] 向继, 高能, 荆继武. 一种基于门限签名的可靠蠕虫特征产生系统. 计算机学报[J]. 2009, 第 3 作者930-939, http://lib.cqvip.com/Qikan/Article/Detail?id=30348247.[122] Wang Jing, Xia Luning, Jing Jiwu, Gong Q, Jiang Y, Grecos C. Analysis for Location-based Key Pre-distribution in Wireless Sensor Networks. ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS. 2009, 第 3 作者297-+, http://dx.doi.org/10.1109/ICIC.2009.186.[123] 王晶, 夏鲁宁, 荆继武, 顾青. 一种可容忍代码错误的专用计算机系统模型. 中国科学院研究生院学报[J]. 2009, 第 3 作者26(6): 826-834, http://lib.cqvip.com/Qikan/Article/Detail?id=32234097.[124] 夏鲁宁, 荆继武. SA-DBSCAN:一种自适应基于密度聚类算法. 中国科学院研究生院学报[J]. 2009, 第 2 作者26(4): 530-538, http://lib.cqvip.com/Qikan/Article/Detail?id=30942879.[125] 王晶, 夏鲁宁, 荆继武. 一种基于密度最大值的聚类算法. 中国科学院研究生院学报[J]. 2009, 第 3 作者26(4): 539-548, http://lib.cqvip.com/Qikan/Article/Detail?id=30942880.[126] 徐晨亮, 荆继武. 网络蠕虫仿真研究. 计算机仿真[J]. 2009, 第 2 作者142-145, http://lib.cqvip.com/Qikan/Article/Detail?id=31083980.[127] Jing Jiwu. A model of efficient intrusion recovery solution based on log-structured file system. 中国科学院研究生院学报. 2008, 第 1 作者[128] Jing Jiwu. A decentralized certification authority based on real world trust relationships. Proceedings - International Conference on Computer Science and Software Engineering. 2008, 第 1 作者[129] Jing Jiwu. Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. Proceedings - International Conference on Computer Science and Software Engineering. 2008, 第 1 作者[130] Lin Jingqiang, Jing Jiwu, Liu Peng, Huai J, Baldoni R, Yen IL. A framework for intrusion tolerant certification authority system evaluation. SRDS 2007: 26TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS. 2007, 第 2 作者231-+, [131] Jhi YoonChan, Liu Peng, Li Lunquan, Gu Qijun, Jing Jiwu, Kesidis George, IEEE. PWC: A proactive worm containment solution for enterprise networks. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS. 2007, 第 5 作者433-+, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000259291500050.[132] Liu, P, Jing, JW, Luenam, P, Wang, Y, Li, LQ, Ingsriswang, S. The design and implementation of a self-healing database system. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS[J]. 2004, 23(3): 247-269, http://www.corc.org.cn/handle/1471x/2376904.