Haibin Zhang
TitoloCitata daAnno
Online ciphers from tweakable blockciphers
P Rogaway, H Zhang
Topics in Cryptology–CT-RSA 2011, 237-249, 2011
442011
BChain: Byzantine replication with high throughput and embedded reconfiguration
S Duan, H Meling, S Peisert, H Zhang
Principles of Distributed Systems, 91-106, 2014
332014
BEAT: Asynchronous BFT made practical
S Duan, MK Reiter, H Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
212018
Unique Ring Signatures: A Practical Construction
M Franklin, H Zhang
Financial Cryptography 2013, 162-170, 2013
212013
The security of ciphertext stealing
P Rogaway, M Wooding, H Zhang
FSE 2012, 180-195, 2012
212012
Unique group signatures
M Franklin, H Zhang
European Symposium on Research in Computer Security, 643-660, 2012
192012
Systems and methods for searching shared encrypted files on third-party storage systems
S Schneider, W Bogorad, H Zhang, S Sundaram
US Patent 9,342,705, 2016
142016
Practical dual-receiver encryption
SSM Chow, M Franklin, H Zhang
Cryptographers’ Track at the RSA Conference, 85-105, 2014
132014
A Framework for Unique Ring Signatures
MK Franklin, H Zhang
IACR Cryptology ePrint Archive 2012, 577, 2012
132012
Systems and methods for maintaining encrypted search indexes on third-party storage systems
H Zhang, S Schneider, W Bogorad, S Sundaram
US Patent 9,679,160, 2017
112017
ByzID: Byzantine fault tolerance from intrusion detection
S Duan, K Levitt, H Meling, S Peisert, H Zhang
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 253-264, 2014
82014
P2S: a fault-tolerant publish/subscribe infrastructure
T Chang, S Duan, H Meling, S Peisert, H Zhang
Proceedings of the 8th ACM International Conference on Distributed Eventá…, 2014
82014
Length-doubling ciphers and tweakable ciphers
H Zhang
International Conference on Applied Cryptography and Network Security, 100-116, 2012
62012
On the origins and variations of blockchain technologies
AT Sherman, F Javani, H Zhang, E Golaszewski
IEEE Security & Privacy 17 (1), 72-77, 2019
52019
On the Universally Composable Security of OpenStack
K Hogan, H Maleki, R Rahaeimehr, R Canetti, M van Dijk, J Hennessey, ...
UMBC Faculty Collection, 2018
52018
Systems and methods for securing data at third-party storage services
H Zhang, S Schneider, W Bogorad, S Sundaram
US Patent 9,258,122, 2016
52016
Bit Security of the CDH Problems over Finite Fields
M Wang, T Zhan, H Zhang
Selected Areas in Cryptography - SAC 2015, 441-461, 2014
52014
Secure causal atomic broadcast, revisited
S Duan, MK Reiter, H Zhang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2017
42017
Real hidden identity-based signatures
SSM Chow, H Zhang, T Zhang
International Conference on Financial Cryptography and Data Security, 21-38, 2017
42017
Systems and methods for maintaining encrypted search indexes on third-party storage systems
H Zhang, S Schneider, W Bogorad, S Sundaram
US Patent 10,140,370, 2018
32018
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20