The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Danfeng Yao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf]
  2. Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
    Accredited DomainKeys: A Service Architecture for Improved Email Validation. [Citation Graph (0, 0)][DBLP]
    CEAS, 2005, pp:- [Conf]
  3. Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
    Notarized Federated Identity Management for Web Services. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:133-147 [Conf]
  4. Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
    Point-Based Trust: Define How Much Privacy Is Worth. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:190-209 [Conf]
  5. Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia
    Decentralized authorization and data security in web content delivery. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1654-1661 [Conf]
  6. Roberto Tamassia, Danfeng Yao, William H. Winsborough
    Role-based cascaded delegation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:146-155 [Conf]
  7. Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
    Visualization of Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:8- [Conf]
  8. Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
    Privacy-Preserving Schema Matching Using Mutual Information. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:93-94 [Conf]

  9. OMOS: A Framework for Secure Communication in Mashup Applications. [Citation Graph (, )][DBLP]


  10. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP]


  11. The union-split algorithm and cluster-based anonymization of social networks. [Citation Graph (, )][DBLP]


  12. Towards publishing recommendation data with predictive anonymization. [Citation Graph (, )][DBLP]


  13. Improving Email Trustworthiness through Social-Group Key Authentication. [Citation Graph (, )][DBLP]


  14. An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. [Citation Graph (, )][DBLP]


  15. Privacy-aware identity management for client-side mashup applications. [Citation Graph (, )][DBLP]


  16. User-Assisted Host-Based Detection of Outbound Malware Traffic. [Citation Graph (, )][DBLP]


  17. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. [Citation Graph (, )][DBLP]


  18. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002