|
Search the dblp DataBase
Danfeng Yao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf]
- Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
Accredited DomainKeys: A Service Architecture for Improved Email Validation. [Citation Graph (0, 0)][DBLP] CEAS, 2005, pp:- [Conf]
- Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
Notarized Federated Identity Management for Web Services. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:133-147 [Conf]
- Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
Point-Based Trust: Define How Much Privacy Is Worth. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:190-209 [Conf]
- Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia
Decentralized authorization and data security in web content delivery. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:1654-1661 [Conf]
- Roberto Tamassia, Danfeng Yao, William H. Winsborough
Role-based cascaded delegation. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:146-155 [Conf]
- Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
Visualization of Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP] VizSEC, 2005, pp:8- [Conf]
- Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
Privacy-Preserving Schema Matching Using Mutual Information. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:93-94 [Conf]
OMOS: A Framework for Secure Communication in Mashup Applications. [Citation Graph (, )][DBLP]
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP]
The union-split algorithm and cluster-based anonymization of social networks. [Citation Graph (, )][DBLP]
Towards publishing recommendation data with predictive anonymization. [Citation Graph (, )][DBLP]
Improving Email Trustworthiness through Social-Group Key Authentication. [Citation Graph (, )][DBLP]
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. [Citation Graph (, )][DBLP]
Privacy-aware identity management for client-side mashup applications. [Citation Graph (, )][DBLP]
User-Assisted Host-Based Detection of Outbound Malware Traffic. [Citation Graph (, )][DBLP]
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. [Citation Graph (, )][DBLP]
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|