Shouhuai Xu Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
51no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009 ACM 2009
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJustin Leonard, Shouhuai Xu, Ravi S. Sandhu: A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJustin Leonard, Shouhuai Xu, Ravi S. Sandhu: A Framework for Understanding Botnets. ARES 2009: 917-922
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung: Expecting the Unexpected: Towards Robust Credential Infrastructure. Financial Cryptography 2009: 201-221
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-free mediated group signatures. Journal of Computer Security 17(4): 489-514 (2009)
2008
45no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Xiaohu Li, T. Paul Parker: Exploiting social networks for threshold signing: attack-resilience vs. availability. ASIACCS 2008: 325-336
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu: Collaborative Attack vs. Collaborative Defense. CollaborateCom 2008: 217-228
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Srdjan Capkun: Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM Trans. Inf. Syst. Secur. 12(1): (2008)
2007
38no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaohu Li, T. Paul Parker, Shouhuai Xu: Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLErhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu: How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeith Harrison, Shouhuai Xu: Protecting Cryptographic Keys from Memory Disclosure Attacks. DSN 2007: 137-143
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung: K-Anonymous Multi-party Secret Handshakes. Financial Cryptography 2007: 72-87
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaohu Li, T. Paul Parker, Shouhuai Xu: A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPatrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu: Privacy-Preserving Data Mining through Knowledge Model Sharing. PinKDD 2007: 97-115
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu: On the security of group communication schemes. Journal of Computer Security 15(1): 129-169 (2007)
2006
29no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAri Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLT. Paul Parker, Shouhuai Xu: Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJim Dowd, Shouhuai Xu, Weining Zhang: Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ETRICS 2006: 145-159
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLErhan J. Kartaltepe, Shouhuai Xu: Towards Blocking Outgoing Malicious Impostor Emails. WOWMOM 2006: 657-661
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006)
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006)
2005
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Weining Zhang: Knowledge as a Service and Knowledge Breaching. IEEE SCC 2005: 87-94
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu: On the security of group communication schemes based on symmetric key cryptosystems. SASN 2005: 22-31
2004
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung: k-anonymous secret handshakes with reusable credentials. ACM Conference on Computer and Communications Security 2004: 158-167
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung: Accountable Ring Signatures: A Smart Card Approach. CARDIS 2004: 271-286
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51
2003
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, Shouhuai Xu: Constructing Disjoint Paths for Secure Communication. DISC 2003: 181-195
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung: Retrofitting Fairness on the Original RSA-Based E-cash. Financial Cryptography 2003: 51-68
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749-
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144
2002
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung: The Dark Side of Threshold Cryptography. Financial Cryptography 2002: 198-219
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200
2000
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung, Gendu Zhang: Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18
1999
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu: Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31
1998
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Gendu Zhang, Hong Zhu: On the Security of Three-Party Cryptographic Protocols. Operating Systems Review 32(3): 7-20 (1998)
1997
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShouhuai Xu, Gendu Zhang, Hong Zhu: On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. Operating Systems Review 31.(4): 12-23 (1997)

Coauthor Index

1Budak Arpinar [41]
2N. Asokan [51]
3Vijayalakshmi Atluri (Vijay Atluri) [38]
4Amitabha Bagchi [12]
5Elisa Bertino [41] [47]
6Srdjan Capkun [39]
7Amitabh Chaudhary [12]
8Xuhua Ding [17] [46]
9Yevgeniy Dodis [7] [8]
10Jim Dowd [27]
11Michael T. Goodrich [12]
12Weili Han [47]
13Keith Harrison [34]
14Sushil Jajodia [9] [10] [15] [23] [24]
15Ari Juels [29]
16Erhan J. Kartaltepe [25] [36]
17Jonathan Katz [7] [8]
18Aggelos Kiayias [40]
19Justin Leonard [49] [50]
20Xiaohu Li [32] [37] [44]
21Yingjiu Li [42]
22William Robert Nelson Jr. [16]
23Qun Ni [47]
24Peng Ning [38]
25Cristina Nita-Rotaru [45] [51]
26T. Paul Parker [28] [32] [36] [37] [44]
27Ravi S. Sandhu [5] [13] [16] [35] [41] [47] [49] [50]
28Jean-Pierre Seifert [45] [51]
29Sanjeev Setia [9] [10] [15] [23] [24]
30Patrick Sharkey [31]
31Roshan K. Thomas [41]
32Hongwei Tian [31]
33Gene Tsudik [14] [17] [21] [26] [29] [46]
34Daryl Walleck [42]
35Moti Yung (Mordechai M. Yung) [3] [4] [6] [7] [8] [11] [18] [19] [29] [33] [38] [40] [48]
36Gendu Zhang [1] [2] [3] [4]
37Weining Zhang [22] [27] [31]
38Hong Zhu [1] [2] [3]
39Sencun Zhu [9] [10] [15] [23] [24]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)