![]() | 2009 | |
---|---|---|
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009 ACM 2009 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu: A Framework for Understanding Botnets. ARES 2009: 917-922 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung: Expecting the Unexpected: Towards Robust Credential Infrastructure. Financial Cryptography 2009: 201-221 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-free mediated group signatures. Journal of Computer Security 17(4): 489-514 (2009) |
2008 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Xiaohu Li, T. Paul Parker: Exploiting social networks for threshold signing: attack-resilience vs. availability. ASIACCS 2008: 325-336 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu: Collaborative Attack vs. Collaborative Defense. CollaborateCom 2008: 217-228 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Daryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Aggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Srdjan Capkun: Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
2007 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaohu Li, T. Paul Parker, Shouhuai Xu: Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu: How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Keith Harrison, Shouhuai Xu: Protecting Cryptographic Keys from Memory Disclosure Attacks. DSN 2007: 137-143 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung: K-Anonymous Multi-party Secret Handshakes. Financial Cryptography 2007: 72-87 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaohu Li, T. Paul Parker, Shouhuai Xu: A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Patrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu: Privacy-Preserving Data Mining through Knowledge Model Sharing. PinKDD 2007: 97-115 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu: On the security of group communication schemes. Journal of Computer Security 15(1): 129-169 (2007) |
2006 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | T. Paul Parker, Shouhuai Xu: Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Jim Dowd, Shouhuai Xu, Weining Zhang: Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ETRICS 2006: 145-159 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Erhan J. Kartaltepe, Shouhuai Xu: Towards Blocking Outgoing Malicious Impostor Emails. WOWMOM 2006: 657-661 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006) |
2005 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Weining Zhang: Knowledge as a Service and Knowledge Breaching. IEEE SCC 2005: 87-94 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu: On the security of group communication schemes based on symmetric key cryptosystems. SASN 2005: 22-31 |
2004 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung: k-anonymous secret handshakes with reusable credentials. ACM Conference on Computer and Communications Security 2004: 158-167 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung: Accountable Ring Signatures: A Smart Card Approach. CARDIS 2004: 271-286 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 |
2003 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Amitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, Shouhuai Xu: Constructing Disjoint Paths for Secure Communication. DISC 2003: 181-195 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung: Retrofitting Fairness on the Original RSA-Based E-cash. Financial Cryptography 2003: 51-68 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144 |
2002 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung: The Dark Side of Threshold Cryptography. Financial Cryptography 2002: 198-219 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200 |
2000 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung, Gendu Zhang: Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18 |
1999 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu: Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31 |
1998 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Security of Three-Party Cryptographic Protocols. Operating Systems Review 32(3): 7-20 (1998) |
1997 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. Operating Systems Review 31.(4): 12-23 (1997) |