Mr. HU Qiao (胡橋)
Research Output
- 2022
- Published
Revisiting Error-Correction in Precommitment Distance-Bounding Protocols
Zhang, J., Yang, A., Hu, Q., Hancke, G. P. & Liu, Z., Oct 2022, In: IEEE Transactions on Industrial Informatics. 18, 10, p. 7097-7106Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 1 - Published
Half-duplex mode-based secure key generation method for resource-constrained IoT devices
Hu, Q., Zhang, J., Hancke, G. P., Hu, Y., Li, W., Jiang, H. & Qin, Z., 15 Jan 2022, In: IEEE Internet of Things Journal. 9, 2, p. 1326-1338Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 2 - 2021
- Published
Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns
Yang, A., Boshoff, D., Hu, Q., Hancke, G. P., Luo, X., Weng, J., Mayes, K., & 1 others , 15 Jul 2021, In: IEEE Internet of Things Journal. 8, 14, p. 11607-11620Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 13 - Published
Preventing Overshadowing Attacks in Self-Jamming Audio Channels
Hu, Q., Liu, Y., Yang, A. & Hancke, G. P., Jan 2021, In: IEEE Transactions on Dependable and Secure Computing. 18, 1, p. 45-57 13 p.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 5 - 2020
- Published
A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement
Hu, Q., Du, B., Markantonakis, K. & Hancke, G. P., Jan 2020, In: IEEE Transactions on Industrial Informatics. 16, 1, p. 691-702 8741092.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 18 - 2019
- Published
Correlation-based search against friendly jamming data exchange schemes
ZHANG, J., HU, Q. & HANCKE, G. P., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC) - Proceedings. IEEE, 8937560. (IEEE Conference on Dependable and Secure Computing, DSC - Proceedings).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
- 2018
- Published
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
Hu, Q., Zhang, J., Mitrokotsa, A. & Hancke, G., Sept 2018, In: Computers and Security. 78, p. 281-300Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 15 - Published
HB+DB: Distance bounding meets human based authentication
Pagnin, E., Yang, A., Hu, Q., Hancke, G. & Mitrokotsa, A., Mar 2018, In: Future Generation Computer Systems. 80, p. 627-639Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 11 - 2017
- Published
Self-jamming audio channels: Investigating the feasibility of perceiving overshadowing attacks
Hu, Q. & Hancke, G., 20 Jul 2017, Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Revised Selected Papers. Hancke, G. P. & Markantonakis, K. (eds.). Springer, Cham, Vol. 10155 LNCS. p. 188-203 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10155 LNCS).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 3 - Published
Power analysis attack on jamming assisted key agreement
Hu, Q. & Hancke, G., 26 Jun 2017, International Workshop on Computer Science and Engineering (WCSE 2017). International Workshop on Computer Science and Engineering (WCSE)Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
- Published
A Session Hijacking Attack on Physical Layer Key Generation Agreement
HU, Q. & HANCKE, G. P., May 2017, 2017 IEEE International Conference on Industrial Technology (ICIT). IEEE, p. 1418-1423 (IEEE International Conference on Industrial Technology (ICIT)).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 9 - 2016
- Published
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization
Hu, Q., Dinca, L. M., Yang, A. & Hancke, G., 4 Aug 2016, In: Computer Networks. 105, p. 224-236Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 9 - 2015
- Published
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Hu, Q., Dinca, L. M. & Hancke, G., Aug 2015, Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Proceedings. Akram, R. N. & Jajodia, S. (eds.). Springer Verlag, p. 219-234 (Lecture Notes in Computer Science; vol. 9311).Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Scopus citations: 4