Qiang Yan
Qiang Yan
Geverifieerd e-mailadres voor smu.edu.sg - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
On limitations of designing leakage-resilient password systems: Attacks, principles and usability
Q Yan, J Han, Y Li, RH Deng
Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012
71*2012
Privacy leakage analysis in online social networks
Y Li, Y Li, Q Yan, RH Deng
Computers & Security 49, 239-254, 2015
662015
Designing leakage-resilient password entry on touchscreen mobile devices
Q Yan, J Han, Y Li, J Zhou, RH Deng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
622013
Understanding OSN-based facial disclosure against face authentication systems
Y Li, K Xu, Q Yan, Y Li, RH Deng
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
572014
Comparing mobile privacy protection through cross-platform applications
J Han, Q Yan, D Gao, J Zhou, RH Deng
Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013
522013
Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication
Y Li, Y Li, Q Yan, H Kong, RH Deng
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
322015
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
International Conference on Applied Cryptography and Network Security, 272-289, 2013
322013
Towards semantically secure outsourcing of association rule mining on categorical data
J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan
Information Sciences 267, 267-286, 2014
242014
Insights into malware detection and prevention on mobile phones
Q Yan, Y Li, T Li, R Deng
International Conference on Security Technology, 242-249, 2009
242009
A software-based root-of-trust primitive on multicore platforms
Q Yan, J Han, Y Li, RH Deng, T Li
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
222011
Leakage-resilient password entry: challenges, design, and evaluation
Q Yan, J Han, Y Li, J Zhou, RH Deng
Computers & Security 48, 196-211, 2015
212015
Empirical study of face authentication systems under OSNFD attacks
Y Li, Y Li, K Xu, Q Yan, RH Deng
IEEE Transactions on Dependable and Secure Computing 15 (2), 231-245, 2016
162016
On the potential of limitation-oriented malware detection and prevention techniques on mobile phones
Q Yan, RH Deng, Y Li, T Li
International journal of security and its applications 4 (1), 21, 2010
152010
Anti-tracking in rfid discovery service for dynamic supply chain systems
Q Yan, Y Li, RH Deng
International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (1/2 …, 2012
82012
Pseudonym-based RFID discovery service to mitigate unauthorized tracking in supply chain management
Q Yan, RH Deng, Z Yan, Y Li, T Li
2010 Second International Symposium on Data, Privacy, and E-Commerce, 21-26, 2010
82010
Android or iOS for better privacy protection?(2014)
J Han, Q Yan, D Gao, J Zhou, HR DENG
International Conference on Secure Knowledge Mangagement in Big-data era …, 2014
7*2014
On detection of erratic arguments
J Han, Q Yan, RH Deng, D Gao
International Conference on Security and Privacy in Communication Systems …, 2011
42011
A comprehensive study for rfid malwares on mobile devices
Q Yan, Y Li, T Li, RH DENG
5th Workshop on RFID Security, 2009
32009
Think twice before you share: Analyzing privacy leakage under privacy control in online social networks
Y Li, Y Li, Q Yan, RH Deng
International Conference on Network and System Security, 671-677, 2013
12013
Malware protection on RFID-enabled supply chain management systems in the EPCglobal network
Q Yan, Y Li, RH Deng
Advanced security and privacy for RFID technologies, 153-175, 2013
12013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20