Seguir
Weidong Shi
Título
Citado por
Citado por
Año
Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities
Y Chang, E Iakovou, W Shi
International Journal of Production Research 58 (7), 2082-2099, 2020
5782020
On security analysis of proof-of-elapsed-time (poet)
L Chen, L Xu, N Shah, Z Gao, Y Lu, W Shi
Stabilization, Safety, and Security of Distributed Systems: 19th …, 2017
4382017
Continuous mobile authentication using touchscreen gestures
T Feng, Z Liu, KA Kwon, W Shi, B Carbunar, Y Jiang, N Nguyen
2012 IEEE conference on technologies for homeland security (HST), 451-456, 2012
4262012
Senguard: Passive user identification on smartphones using multiple sensors
W Shi, J Yang, Y Jiang, F Yang, Y Xiong
2011 IEEE 7th international conference on wireless and mobile computing …, 2011
2862011
Tips: Context-aware implicit user identification using touch screen in uncontrolled environments
T Feng, J Yang, Z Yan, EM Tapia, W Shi
Proceedings of the 15th workshop on mobile computing systems and …, 2014
1762014
High efficiency counter mode security architecture via prediction and precomputation
W Shi, HS Lee, M Ghosh, C Lu, A Boldyreva
32nd International Symposium on Computer Architecture (ISCA'05), 14-24, 2005
1632005
Method and apparatus for user recognition employing motion passwords
Y Yu, BO Carbunar, Z Li, W Shi
US Patent App. 12/142,967, 2009
1562009
CoC: A unified distributed ledger based supply chain management system
Z Gao, L Xu, L Chen, X Zhao, Y Lu, W Shi
Journal of Computer Science and Technology 33, 237-248, 2018
1212018
Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems
W Shi, HHS Lee, M Ghosh, C Lu
Proceedings. 13th International Conference on Parallel Architecture and …, 2004
1192004
A comparison study of Intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
1162018
Continuous mobile authentication using a novel graphic touch gesture feature
X Zhao, T Feng, W Shi
2013 IEEE sixth international conference on biometrics: theory, applications …, 2013
1112013
Query privacy in wireless sensor networks
B Carbunar, Y Yu, W Shi, M Pearce, V Vasudevan
ACM Transactions on Sensor Networks (TOSN) 6 (2), 1-34, 2010
1092010
Enabling the sharing economy: Privacy respecting contract based on public blockchain
L Xu, N Shah, L Chen, N Diallo, Z Gao, Y Lu, W Shi
Proceedings of the ACM workshop on blockchain, cryptocurrencies and …, 2017
1042017
Method and apparatus for providing passive user identification
W Shi, J Yang, F Yang, Y Xiong
US Patent App. 12/979,698, 2012
1042012
Continuous mobile authentication using virtual key typing biometrics
T Feng, X Zhao, B Carbunar, W Shi
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
1032013
eGov-DAO: A better government using blockchain based decentralized autonomous organization
N Diallo, W Shi, L Xu, Z Gao, L Chen, Y Lu, N Shah, L Carranco, TC Le, ...
2018 International Conference on eDemocracy & eGovernment (ICEDEG), 166-171, 2018
922018
Mobile user authentication using statistical touch dynamics images
X Zhao, T Feng, W Shi, IA Kakadiaris
IEEE Transactions on Information Forensics and Security 9 (11), 1780-1789, 2014
792014
Using human body gestures as inputs for gaming via depth analysis
Y Wang, T Yu, L Shi, Z Li
2008 IEEE International Conference on Multimedia and Expo, 993-996, 2008
722008
An integrated framework for dependable and revivable architectures using multicore processors
W Shi, HHS Lee, L Falk, M Ghosh
ACM SIGARCH Computer Architecture News 34 (2), 102-113, 2006
712006
Blockchain-based identity management with mobile device
Z Gao, L Xu, G Turner, B Patel, N Diallo, L Chen, W Shi
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for …, 2018
702018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20