
Hongda Li
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j10]Peifang Ni, Hongda Li, Dongxue Pan:
Analysis of bitcoin backbone protocol in the non-flat model. Sci. China Inf. Sci. 63(3) (2020) - [c34]Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge:
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels. AsiaCCS 2020: 33-46 - [i11]Hongda Li, Peifang Ni, Dongxue Pan:
Some Low Round Zero Knowledge Protocols. IACR Cryptol. ePrint Arch. 2020: 347 (2020)
2010 – 2019
- 2019
- [j9]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [c33]Dongxue Pan, Bei Liang
, Hongda Li, Peifang Ni:
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. ACISP 2019: 609-619 - [c32]Menghao Zhang, Jiasong Bai, Guanyu Li, Zili Meng, Hongda Li, Hongxin Hu, Mingwei Xu:
When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs. ICNP 2019: 1-6 - [c31]Dongxue Pan, Bei Liang
, Hongda Li, Peifang Ni:
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications. INDOCRYPT 2019: 297-317 - [c30]Dongxue Pan, Bei Liang
, Hongda Li, Peifang Ni:
Hierarchical Functional Signcryption: Notion and Construction. ProvSec 2019: 167-185 - [i10]Hongda Li, Dongxue Pan, Peifang Ni:
Efficient Zero-Knowledge for NP from Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2019: 91 (2019) - [i9]Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan:
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting. IACR Cryptol. ePrint Arch. 2019: 456 (2019) - 2018
- [c29]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c28]Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu, Richard R. Brooks
:
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing. SDN-NFV@CODASPY 2018: 55-58 - [c27]Peifang Ni, Hongda Li, Dongxue Pan:
Micropaying to a Distributed Payee with Instant Confirmation. ICICS 2018: 793-804 - [c26]Younghee Park, Hongxin Hu, Xiaohong Yuan, Hongda Li:
Enhancing Security Education Through Designing SDN Security Labs in CloudLab. SIGCSE 2018: 185-190 - [i8]Mhafuzul Islam, Mashrur Chowdhury, Hongda Li, Hongxin Hu:
Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards. CoRR abs/1810.03967 (2018) - [i7]Dongxue Pan, Hongda Li, Peifang Ni:
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation. IACR Cryptol. ePrint Arch. 2018: 1055 (2018) - 2017
- [j8]Fei Tang, Rui Zhang, Hongda Li:
Attribute-based non-interactive key exchange. Sci. China Inf. Sci. 60(1): 19101:1-19101:3 (2017) - [c25]Nuyun Zhang, Hongda Li, Hongxin Hu, Younghee Park:
Towards Effective Virtualization of Intrusion Detection Systems. SDN-NFV@CODASPY 2017: 47-50 - [c24]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c23]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - [i6]Mhafuzul Islam, Mashrur Chowdhury, Hongda Li, Hongxin Hu:
Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention. CoRR abs/1711.10651 (2017) - [i5]Hongda Li, Dongxue Pan, Peifang Ni:
Augmented Black-Box Simulation and Zero Knowledge Argument for NP. IACR Cryptol. ePrint Arch. 2017: 1243 (2017) - 2016
- [c22]Jason W. Anderson, Hongxin Hu, Udit Agarwal, Craig Lowery, Hongda Li, Amy W. Apon:
Performance considerations of network functions virtualization using containers. ICNC 2016: 1-7 - 2015
- [j7]Fei Tang, Hongda Li, Jinyong Chang:
Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 762-766 (2015) - [j6]Fei Tang, Hongda Li, Jinyong Chang:
Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 898-905 (2015) - [j5]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Secure Mobile Agent from Leakage-Resilient Proxy Signatures. Mob. Inf. Syst. 2015: 901418:1-901418:12 (2015) - [c21]Tingting Zhang, Hongda Li, Guifang Huang:
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. ACISP 2015: 251-269 - [c20]Bei Liang, Hongda Li, Jinyong Chang:
Verifiable Random Functions from (Leveled) Multilinear Maps. CANS 2015: 129-143 - [c19]Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang:
One-Round Witness Indistinguishability from Indistinguishability Obfuscation. ISPEC 2015: 559-574 - [c18]Bei Liang, Hongda Li, Jinyong Chang:
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015: 21-41 - [c17]Tingting Zhang, Hongda Li:
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model. IWSEC 2015: 153-172 - [c16]Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi, Younghee Park:
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls. NFV-SDN 2015: 107-114 - [c15]Bei Liang, Hongda Li, Jinyong Chang:
Constrained Verifiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015: 43-60 - [c14]Guifang Huang, Hongda Li:
On Zero Knowledge Argument with PQT Soundness. WISA 2015: 326-335 - 2014
- [c13]Fei Tang, Hongda Li:
Ring Signatures of Constant Size Without Random Oracles. Inscrypt 2014: 93-108 - [c12]Bei Liang, Rui Zhang, Hongda Li:
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. Inscrypt 2014: 193-206 - [c11]Li Wang, Hongda Li, Fei Tang:
Functional Signatures from Indistinguishability Obfuscation. INTRUST 2014: 213-227 - [c10]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. ISPEC 2014: 418-432 - [c9]Fei Tang, Hongda Li, Bei Liang:
Attribute-Based Signatures for Circuits from Multilinear Maps. ISC 2014: 54-71 - [c8]Fei Tang, Hongda Li:
Joint Signature and Encryption in the Presence of Continual Leakage. WISA 2014: 269-280 - [i4]Hongda Li, Qihua Niu, Guifang Huang:
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP. IACR Cryptol. ePrint Arch. 2014: 634 (2014) - 2013
- [c7]Fei Tang, Changlu Lin, Hongda Li:
ID-Based Signcryption with Restrictive Unsigncryption. INCoS 2013: 485-489 - [c6]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Proxy Signatures. INCoS 2013: 495-502 - [c5]Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. NSS 2013: 365-380 - [i3]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. IACR Cryptol. ePrint Arch. 2013: 785 (2013) - 2012
- [j4]Hongda Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-optimal zero-knowledge proofs of knowledge for NP. Sci. China Inf. Sci. 55(11): 2473-2484 (2012) - [j3]Haixia Xu, Hongda Li, Bao Li:
Universally composable zero-knowledge sets. Int. J. Grid Util. Comput. 3(1): 25-31 (2012) - [c4]Yang Liu, Hongda Li, Qihua Niu:
A Leakage-Resilient Zero Knowledge Proof for Lattice Problem. CSS 2012: 265-278 - [c3]Hongda Li, Yang Liu, Qihua Niu:
A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP. IDCS 2012: 202-216 - 2010
- [j2]Hongda Li, Haixia Xu, Bao Li, Dengguo Feng:
On constant-round zero-knowledge proofs of knowledge for NP-relations. Sci. China Inf. Sci. 53(4): 788-799 (2010)
2000 – 2009
- 2008
- [j1]Hongda Li, Bao Li:
Existence of 3-round zero-knowledge proof systems for NP. Sci. China Ser. F Inf. Sci. 51(3): 273-282 (2008) - [i2]Hongda Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP. IACR Cryptol. ePrint Arch. 2008: 524 (2008) - 2006
- [c2]Xiang Zhang, Hongda Li, Yuzhong Qu:
Finding Important Vocabulary Within Ontology. ASWC 2006: 106-112 - 2005
- [c1]Hongda Li, Bao Li:
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. CISC 2005: 210-220 - [i1]Bao Li, Hongda Li, Guangwu Xu, Haixia Xu:
Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptol. ePrint Arch. 2005: 279 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-11 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint