What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sihan Qing
Google Scholar
16
publications in security and cryptology related venues
Year
Venue
Title
2016
conf/icics
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System.
Wei Fan
Zhujun Zhang
Tingting Wang
Bo Hu
Sihan Qing
Degang Sun
2015
conf/icics
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System.
Chuiyi Xie
Ying Huo
Sihan Qing
Shoushan Luo
Lingli Hu
2014
conf/acisp
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Xingmin Cui
Da Yu
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
Sihan Qing
2013
conf/icics
A Covert Channel Using Event Channel State on Xen Hypervisor.
Qingni Shen
Mian Wan
Zhuangzhuang Zhang
Zhi Zhang
Sihan Qing
Zhonghai Wu
2012
conf/icics
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Hao Xiong
Cong Zhang
Tsz Hon Yuen
Echo P. Zhang
Siu-Ming Yiu
Sihan Qing
2011
conf/icics
A Variant of Boyen-Waters Anonymous IBE Scheme.
Song Luo
Qingni Shen
Yongming Jin
Yu Chen
Zhong Chen
Sihan Qing
2007
conf/ccs
A dynamic information flow model of secure systems.
Jianjun Shen
Sihan Qing
2005
journals/compsec
A survey and trends on Internet worms.
Sihan Qing
Weiping Wen
2001
conf/icics
Square Attack on Reduced Camellia Cipher.
Yeping He
Sihan Qing
2001
conf/icics
Threshold Undeniable RSA Signature Scheme.
Guilin Wang
Sihan Qing
Mingsheng Wang
Zhanfei Zhou
2001
conf/icics
Applying NCP Logic to the Analysis of SSL 3.0.
Zhimin Song
Sihan Qing
2000
conf/sec
A Simple Algorithm for Computing Several Sequences Synthesis.
Mingsheng Wang
Sihan Qing
Dengguo Feng
2000
conf/sec
Power Analysis of RC6 and Serpent.
Wenling Wu
Dengguo Feng
Sihan Qing
2000
conf/sec
Analysis and Design of E-voting Protocol.
Shaoquan Jiang
Dengguo Feng
Sihan Qing
2000
conf/sec
The Defense Framework for Large-scale Computer Network System.
Jianchun Jiang
Weifeng Chen
Sihan Qing
Dengguo Feng
1999
conf/icics
Cryptanalysis of some AES Candidate Algorithms.
Wenling Wu
Bao Li
Dengguo Feng
Sihan Qing
Coauthors
Bao Li
(1)
Bo Hu
(1)
Chuiyi Xie
(1)
Cong Zhang
(1)
Da Yu
(1)
Degang Sun
(1)
Dengguo Feng
(5)
Echo P. Zhang
(1)
Guilin Wang
(1)
Hao Xiong
(1)
Jianchun Jiang
(1)
Jianjun Shen
(1)
Lingli Hu
(1)
Lucas Chi Kwong Hui
(1)
Mian Wan
(1)
Mingsheng Wang
(2)
Patrick P. F. Chan
(1)
Qingni Shen
(2)
Shaoquan Jiang
(1)
Shoushan Luo
(1)
Sihan Qing
(16)
Siu-Ming Yiu
(2)
Song Luo
(1)
Tingting Wang
(1)
Tsz Hon Yuen
(1)
Wei Fan
(1)
Weifeng Chen
(1)
WeiPing Wen
(1)
Wenling Wu
(2)
Xingmin Cui
(1)
Yeping He
(1)
Ying Huo
(1)
Yongming Jin
(1)
Yu Chen
(1)
Zhanfei Zhou
(1)
Zhi Zhang
(1)
Zhimin Song
(1)
Zhong Chen
(1)
Zhonghai Wu
(1)
Zhuangzhuang Zhang
(1)
Zhujun Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to