2009 | ||
---|---|---|
51 | Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009 ACM 2009 | |
50 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113 | |
49 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A Framework for Understanding Botnets. ARES 2009: 917-922 | |
48 | Shouhuai Xu, Moti Yung: Expecting the Unexpected: Towards Robust Credential Infrastructure. Financial Cryptography 2009: 201-221 | |
47 | Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 | |
46 | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-free mediated group signatures. Journal of Computer Security 17(4): 489-514 (2009) | |
2008 | ||
45 | Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008 | |
44 | Shouhuai Xu, Xiaohu Li, T. Paul Parker: Exploiting social networks for threshold signing: attack-resilience vs. availability. ASIACCS 2008: 325-336 | |
43 | Shouhuai Xu: Collaborative Attack vs. Collaborative Defense. CollaborateCom 2008: 217-228 | |
42 | Daryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174 | |
41 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 | |
40 | Aggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76 | |
39 | Shouhuai Xu, Srdjan Capkun: Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM Trans. Inf. Syst. Secur. 12(1): (2008) | |
2007 | ||
38 | Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007 | |
37 | Xiaohu Li, T. Paul Parker, Shouhuai Xu: Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427 | |
36 | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu: How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246 | |
35 | Shouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160 | |
34 | Keith Harrison, Shouhuai Xu: Protecting Cryptographic Keys from Memory Disclosure Attacks. DSN 2007: 137-143 | |
33 | Shouhuai Xu, Moti Yung: K-Anonymous Multi-party Secret Handshakes. Financial Cryptography 2007: 72-87 | |
32 | Xiaohu Li, T. Paul Parker, Shouhuai Xu: A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290 | |
31 | Patrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu: Privacy-Preserving Data Mining through Knowledge Model Sharing. PinKDD 2007: 97-115 | |
30 | Shouhuai Xu: On the security of group communication schemes. Journal of Computer Security 15(1): 129-169 (2007) | |
2006 | ||
29 | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
28 | T. Paul Parker, Shouhuai Xu: Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162 | |
27 | Jim Dowd, Shouhuai Xu, Weining Zhang: Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ETRICS 2006: 145-159 | |
26 | Gene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 | |
25 | Erhan J. Kartaltepe, Shouhuai Xu: Towards Blocking Outgoing Malicious Impostor Emails. WOWMOM 2006: 657-661 | |
24 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) | |
23 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006) | |
2005 | ||
22 | Shouhuai Xu, Weining Zhang: Knowledge as a Service and Knowledge Breaching. IEEE SCC 2005: 87-94 | |
21 | Gene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 | |
20 | Shouhuai Xu: On the security of group communication schemes based on symmetric key cryptosystems. SASN 2005: 22-31 | |
2004 | ||
19 | Shouhuai Xu, Moti Yung: k-anonymous secret handshakes with reusable credentials. ACM Conference on Computer and Communications Security 2004: 158-167 | |
18 | Shouhuai Xu, Moti Yung: Accountable Ring Signatures: A Smart Card Approach. CARDIS 2004: 271-286 | |
17 | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 | |
16 | Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34 | |
15 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 | |
2003 | ||
14 | Gene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 | |
13 | Shouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372 | |
12 | Amitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, Shouhuai Xu: Constructing Disjoint Paths for Secure Communication. DISC 2003: 181-195 | |
11 | Shouhuai Xu, Moti Yung: Retrofitting Fairness on the Original RSA-Based E-cash. Financial Cryptography 2003: 51-68 | |
10 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- | |
9 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 | |
8 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144 | |
2002 | ||
7 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82 | |
6 | Shouhuai Xu, Moti Yung: The Dark Side of Threshold Cryptography. Financial Cryptography 2002: 198-219 | |
5 | Shouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200 | |
2000 | ||
4 | Shouhuai Xu, Moti Yung, Gendu Zhang: Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18 | |
1999 | ||
3 | Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu: Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31 | |
1998 | ||
2 | Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Security of Three-Party Cryptographic Protocols. Operating Systems Review 32(3): 7-20 (1998) | |
1997 | ||
1 | Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. Operating Systems Review 31.(4): 12-23 (1997) |