The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xuhua Ding: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yingjiu Li, Xuhua Ding
    Protecting RFID communications in supply chains. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:234-241 [Conf]
  2. Xuhua Ding, Gene Tsudik
    Simple Identity-Based Cryptography with Mediated RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:193-210 [Conf]
  3. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:49-64 [Conf]
  4. Xuhua Ding, Gene Tsudik, Shouhuai Xu
    Leak-Free Group Signatures with Immediate Revocation. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:608-615 [Conf]
  5. Wei Wei, Xuhua Ding, Kefei Chen
    Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:269-279 [Conf]
  6. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
    Experimenting with Server-Aided Signatures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  7. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
    Equipping smart devices with public key signatures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2007, v:7, n:1, pp:- [Journal]
  8. Dan Boneh, Xuhua Ding, Gene Tsudik
    Fine-grained control of security capabilities. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2004, v:4, n:1, pp:60-82 [Journal]
  9. Ying Pan, Xuhua Ding
    Anomaly Based Web Phishing Page Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:381-392 [Conf]

  10. A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. [Citation Graph (, )][DBLP]


  11. Remote attestation on program execution. [Citation Graph (, )][DBLP]


  12. Conditional proxy re-encryption secure against chosen-ciphertext attack. [Citation Graph (, )][DBLP]


  13. A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. [Citation Graph (, )][DBLP]


  14. Private Query on Encrypted Data in Multi-user Settings. [Citation Graph (, )][DBLP]


  15. An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP]


  16. Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. [Citation Graph (, )][DBLP]


  17. Remote Attestation on Function Execution (Work-in-Progress). [Citation Graph (, )][DBLP]


  18. Privacy-Preserving Querying in Sensor Networks [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002