scispace - formally typeset
Z

Zhiwei Li

Researcher at University of North Carolina at Charlotte

Publications -  14
Citations -  577

Zhiwei Li is an academic researcher from University of North Carolina at Charlotte. The author has contributed to research in topics: Cryptographic protocol & Overhead (computing). The author has an hindex of 6, co-authored 14 publications receiving 551 citations. Previous affiliations of Zhiwei Li include University of California, Berkeley.

Papers
More filters
Proceedings ArticleDOI

Secure and efficient access to outsourced data

TL;DR: This paper proposes to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved, and investigates the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.
ReportDOI

The emperor's new password manager: security analysis of web-based password managers

TL;DR: A security analysis of five popular web-based password managers suggests that it remains to be a challenge for the password managers to be secure, and advocates a defense-in-depth approach to ensure security of password managers.

Clickjacking revisited: a perceptual view of UI security

TL;DR: It is observed that UI security attacks such as click-jacking are fundamentally attacks on human perception, and it is found that most defenses either have an unacceptable usability cost or do not provide a comprehensive defense.
Proceedings ArticleDOI

Secure software attestation for military telesurgical robot systems

TL;DR: A secure communication protocol among the verifier, telesurgical robot, and secure token of the remote medical personnel is designed and a software attestation mechanism that can distinguish between these two kinds of delay is proposed.
Journal ArticleDOI

Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding*

TL;DR: Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization.