Æȷοì
Weidong Shi
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities
Y Chang, E Iakovou, W Shi
International Journal of Production Research 58 (7), 2082-2099, 2020
5662020
On security analysis of proof-of-elapsed-time (poet)
L Chen, L Xu, N Shah, Z Gao, Y Lu, W Shi
Stabilization, Safety, and Security of Distributed Systems: 19th ¡¦, 2017
4332017
Continuous mobile authentication using touchscreen gestures
T Feng, Z Liu, KA Kwon, W Shi, B Carbunar, Y Jiang, N Nguyen
2012 IEEE conference on technologies for homeland security (HST), 451-456, 2012
4252012
Senguard: Passive user identification on smartphones using multiple sensors
W Shi, J Yang, Y Jiang, F Yang, Y Xiong
2011 IEEE 7th international conference on wireless and mobile computing ¡¦, 2011
2862011
Tips: Context-aware implicit user identification using touch screen in uncontrolled environments
T Feng, J Yang, Z Yan, EM Tapia, W Shi
Proceedings of the 15th workshop on mobile computing systems and ¡¦, 2014
1762014
High efficiency counter mode security architecture via prediction and precomputation
W Shi, HS Lee, M Ghosh, C Lu, A Boldyreva
32nd International Symposium on Computer Architecture (ISCA'05), 14-24, 2005
1632005
Method and apparatus for user recognition employing motion passwords
Y Yu, BO Carbunar, Z Li, W Shi
US Patent App. 12/142,967, 2009
1562009
CoC: A unified distributed ledger based supply chain management system
Z Gao, L Xu, L Chen, X Zhao, Y Lu, W Shi
Journal of Computer Science and Technology 33, 237-248, 2018
1192018
Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems
W Shi, HHS Lee, M Ghosh, C Lu
Proceedings. 13th International Conference on Parallel Architecture and ¡¦, 2004
1192004
A comparison study of Intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural ¡¦, 2018
1162018
Continuous mobile authentication using a novel graphic touch gesture feature
X Zhao, T Feng, W Shi
2013 IEEE sixth international conference on biometrics: theory, applications ¡¦, 2013
1112013
Query privacy in wireless sensor networks
B Carbunar, Y Yu, W Shi, M Pearce, V Vasudevan
ACM Transactions on Sensor Networks (TOSN) 6 (2), 1-34, 2010
1092010
Method and apparatus for providing passive user identification
W Shi, J Yang, F Yang, Y Xiong
US Patent App. 12/979,698, 2012
1042012
Enabling the sharing economy: Privacy respecting contract based on public blockchain
L Xu, N Shah, L Chen, N Diallo, Z Gao, Y Lu, W Shi
Proceedings of the ACM workshop on blockchain, cryptocurrencies and ¡¦, 2017
1032017
Continuous mobile authentication using virtual key typing biometrics
T Feng, X Zhao, B Carbunar, W Shi
2013 12th IEEE International Conference on Trust, Security and Privacy in ¡¦, 2013
1032013
eGov-DAO: A better government using blockchain based decentralized autonomous organization
N Diallo, W Shi, L Xu, Z Gao, L Chen, Y Lu, N Shah, L Carranco, TC Le, ...
2018 International Conference on eDemocracy & eGovernment (ICEDEG), 166-171, 2018
912018
Mobile user authentication using statistical touch dynamics images
X Zhao, T Feng, W Shi, IA Kakadiaris
IEEE Transactions on Information Forensics and Security 9 (11), 1780-1789, 2014
792014
Using human body gestures as inputs for gaming via depth analysis
Y Wang, T Yu, L Shi, Z Li
2008 IEEE International Conference on Multimedia and Expo, 993-996, 2008
722008
An integrated framework for dependable and revivable architectures using multicore processors
W Shi, HHS Lee, L Falk, M Ghosh
ACM SIGARCH Computer Architecture News 34 (2), 102-113, 2006
712006
Blockchain-based identity management with mobile device
Z Gao, L Xu, G Turner, B Patel, N Diallo, L Chen, W Shi
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for ¡¦, 2018
692018
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20