Follow
Bingyu Li
Bingyu Li
School of Cyber Science and Technology, Beihang University
Verified email at buaa.edu.cn
Title
Cited by
Cited by
Year
Certificate transparency in the wild: Exploring the reliability of monitors
B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
562019
The weakest link of certificate transparency: Exploring the TLS/HTTPS configurations of third-party monitors
B Li, D Chu, J Lin, Q Cai, C Wang, L Meng
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
152019
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions
T Zhang, B Li, Y Zhu, T Han, Q Wu
Computer Communications, 2023
142023
Method and system for protecting root CA certificate in a virtualization environment
LIN Jingqiang, J Jing, G Le, B Li, J Wang, W Pan, Y Wang
US Patent 9,819,496, 2017
122017
Locally-centralized certificate validation and its application in desktop virtualization systems
B Li, J Lin, Q Wang, Z Wang, J Jing
IEEE Transactions on Information Forensics and Security 16, 1380-1395, 2020
102020
Polict: Flexible policy in certificate transparency enabling lightweight self-monitor
A Sun, B Li, H Wan, Q Wang
International Conference on Applied Cryptography and Network Security, 358-377, 2021
62021
High-performance symmetric cryptography server with GPU acceleration
W Cheng, F Zheng, W Pan, J Lin, H Li, B Li
International Conference on Information and Communications Security, 529-540, 2017
62017
Exploring the security of certificate transparency in the wild
B Li, F Li, Z Ma, Q Wu
International Conference on Applied Cryptography and Network Security, 453-470, 2020
52020
Elaphurus: ensemble defense against fraudulent certificates in TLS
B Li, W Wang, L Meng, J Lin, X Liu, C Wang
International Conference on Information Security and Cryptology, 246-259, 2019
52019
PoS: Constructing practical and efficient public key cryptosystems based on symmetric cryptography with SGX
H Li, J Lin, B Li, W Cheng
Information and Communications Security: 20th International Conference …, 2018
52018
The invisible side of certificate transparency: Exploring the reliability of monitors in the wild
B Li, J Lin, F Li, Q Wang, W Wang, Q Li, G Cheng, J Jing, C Wang
IEEE/ACM Transactions on Networking 30 (2), 749-765, 2021
32021
Analyzing the browser security warnings on https errors
C Wang, J Lin, B Li, Q Li, Q Wang, X Zhang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
32019
Building your private cloud storage on public cloud service using embedded GPUs
W Cheng, F Zheng, W Pan, J Lin, H Li, B Li
International Conference on Security and Privacy in Communication Systems …, 2018
22018
Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers
A Sun, B Li, Q Wang, H Wan, J Lin, W Wang
2023 IEEE Symposium on Computers and Communications (ISCC), 1207-1213, 2023
12023
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature
Y Zhu, B Li, Y Yang, Z Ding, H Zheng, G He, S Hou
Sensors 22 (16), 6004, 2022
12022
Applications and developments of the lattice attack in side channel attacks
Z Ma, B Li, Q Cai, J Yang
International Conference on Applied Cryptography and Network Security, 435-452, 2020
12020
Method and system for checking revocation status of digital certificates in a virtualization environment
LIN Jingqiang, B Li, Z Wang, J Jing, C Li, L Xia, Q Wang
US Patent 10,135,623, 2018
12018
Covert communication via blockchain: Hiding patterns and communication patterns
T Zhang, Q Wu, Q Wang, T Han, B Li, Y Zhu
Computer Standards & Interfaces 90, 103851, 2024
2024
IKE: Threshold Key Escrow Service with Intermediary Encryption
Y Yang, B Li, S Xiong, B Qin, Y Zhu, H Zheng, Q Wu
International Conference on Algorithms and Architectures for Parallel …, 2023
2023
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
Y Zhu, B Li, Z Ding, Y Yang, Q Wu, H Zheng
High-Confidence Computing 3 (3), 100131, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20