SET
Home
Publications
Posts
Projects
Teaching
Resources
Lei Xu
Latest
How Hard is Bribery in Elections with Randomly Selected Voters
Decentralized Application Infrastructures as Smart Contract Codes
New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner
Privacy Preserving Event based Transaction System in a Decentralized Environment
HUVS: Heterogeneous UV Swarm for Homeland Security Tasks
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research
Computational Complexity Characterization of Protecting Elections from Bribery
Hardness and Algorithms for Electoral Manipulation Under Media Influence
Reshaping the Landscape of the Future: Software-Defined Manufacturing
An Event Driven Framework for Smart Contract Execution
A Game Theoretical Analysis of Non-Linear Blockchain System
A Secure and Flexible FPGA-Based Blockchain System for the IIoT
EDSC: An Event-Driven Smart Contract Platform
Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement
FPGA based Blockchain System for Industrial IoT
DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter
Computational complexity characterization of protecting elections from bribery
Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices
New Bounds on Augmenting Steps of Block-Structured Integer Programs
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems
PrivateEx: Privacy Preserving Exchange of Crypto-assets on Blockchain
Private and Atomic Exchange of Assets over Zero Knowledge Based Payment Ledger
Election with bribe-effect uncertainty: A dichotomy result
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm
SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection
Tyranny of the Majority: On the (Im) possibility of Correctness of Smart Contracts
Cross Chain Bribery Contracts: Majority vs Mighty Minority
DAcc: Decentralized Ledger based Access Control for Enterprise Applications
FPGALedger: FPGA based Decentralized Ledger for Enterprise Applications
Binding the Physical and Cyber Worlds: A Blockchain Approach for Cargo Supply Chain Security Enhancement
The Game among Bribers in a Smart Contract System
Protecting Election from Bribery: New Approach and Computational Complexity Characterization
Protecting Early Stage Proof-of-Work Based Public Blockchain
Blockchain-based Identity Management with Mobile Device
Proving Conditional Termination for Smart Contracts
On the Graver Basis of Block-structured Integer Programming
eGov-DAO: A Better Government using Blockchain based Decentralized Autonomous Organization
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment
CoC: A Unified Distributed :edger based Supply Chain Management System
Efficient Public Blockchain Client for Lightweight Users
EPBC: Efficient Public Blockchain Client for lightweight users
Smart Contract Execution-the (+-)-biased Ballot Problem
Scalable Blockchain based Smart Contract Execution
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications
On Security Analysis of Proof-of-elapsed-time (PoET)
FASTEN: An FPGA-based Secure System for Big Data Processing
CoC: Secure Supply Chain Management System based on Public Ledger
ZeroTrade: Privacy Respecting Assets Trading System Based on Public Ledger
DL-BAC: Distributed Ledger based Access Control for Web Applications
Enabling the Sharing economy: Privacy Respecting Contract based on Public Blockchain
Unraveling Blockchain based Crypto-currency System Supporting Oblivious Transactions: a Formalized Approach
Evaluating Coherence-exploiting Hardware Trojan
MapReduce for Elliptic Curve Discrete Logarithm Problem
Security Theories and Practices for Big Data
Nanoscale Cryptography: Opportunities and Challenges
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation
Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud
Secure Session on Mobile: An Exploration on Combining Biometric, TrustZone, and User Behavior
Fault Resilient Physical Neural Networks on a Single Chip
Privacy Preserving Large Scale DNA Read-mapping in MapReduce Framework using FPGAs
Removing the Root of Trust: Secure Oblivious Key Establishment for FPGAs
PFC: Privacy Preserving FPGA cloud - a Case Study of MapReduce
Seasoning Effect based Side Channel Attacks to AES Implementation with Phase Change Memory
Mobile User Identity Sensing using the Motion Sensor
NES++: Number System for Encryption based Privacy Preserving Speaker Verification
Hub: Heterogeneous Bucketization for Database Outsourcing
CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
ECDLP on GPU
Accelerating Inverse of GF(2n) with Precomputation
Refinement of Miller’s Algorithm Over Edwards Curves
Cite
×