Search the dblp DataBase
Shouhuai Xu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shouhuai Xu , Weining Zhang Knowledge as a Service and Knowledge Breaching. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:87-94 [Conf ] Xiaohu Li , T. Paul Parker , Shouhuai Xu Towards Quantifying the (In)Security of Networked Systems. [Citation Graph (0, 0)][DBLP ] AINA, 2007, pp:420-427 [Conf ] Gene Tsudik , Shouhuai Xu Accumulating Composites and Improved Group Signing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:269-286 [Conf ] Shouhuai Xu , Moti Yung Accountable Ring Signatures: A Smart Card Approach. [Citation Graph (0, 0)][DBLP ] CARDIS, 2004, pp:271-286 [Conf ] Shouhuai Xu , Moti Yung , Gendu Zhang Friendly Observers Ease Off-Line E-Cash. [Citation Graph (0, 0)][DBLP ] CARDIS, 2000, pp:3-18 [Conf ] Shouhuai Xu , Moti Yung k-anonymous secret handshakes with reusable credentials. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:158-167 [Conf ] Shouhuai Xu , Ravi S. Sandhu Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:355-372 [Conf ] T. Paul Parker , Shouhuai Xu Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:155-162 [Conf ] Jim Dowd , Shouhuai Xu , Weining Zhang Privacy-Preserving Decision Tree Mining Based on Random Substitutions. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:145-159 [Conf ] Yevgeniy Dodis , Jonathan Katz , Shouhuai Xu , Moti Yung Key-Insulated Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:65-82 [Conf ] Shouhuai Xu , Moti Yung The Dark Side of Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:198-219 [Conf ] Shouhuai Xu , Moti Yung Retrofitting Fairness on the Original RSA-Based E-cash. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:51-68 [Conf ] Xuhua Ding , Gene Tsudik , Shouhuai Xu Leak-Free Group Signatures with Immediate Revocation. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:608-615 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:749-0 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:326-335 [Conf ] Shouhuai Xu , Moti Yung , Gendu Zhang , Hong Zhu Money Conservation via Atomicity in Fair Off-Line E-Cash. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:14-31 [Conf ] Shouhuai Xu , William Robert Nelson Jr. , Ravi S. Sandhu Enhancing Anonymity via Market Competition. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:30-34 [Conf ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2004, pp:42-51 [Conf ] Gene Tsudik , Shouhuai Xu A Flexible Framework for Secret Handshakes. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:295-315 [Conf ] Yevgeniy Dodis , Jonathan Katz , Shouhuai Xu , Moti Yung Strong Key-Insulated Signature Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:130-144 [Conf ] Gene Tsudik , Shouhuai Xu Brief announcement: a flexible framework for secret handshakes. [Citation Graph (0, 0)][DBLP ] PODC, 2005, pp:39- [Conf ] Shouhuai Xu , Ravi S. Sandhu Authenticated multicast immune to denial-of-service attack. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:196-200 [Conf ] Shouhuai Xu On the security of group communication schemes based on symmetric key cryptosystems. [Citation Graph (0, 0)][DBLP ] SASN, 2005, pp:22-31 [Conf ] Amitabha Bagchi , Amitabh Chaudhary , Michael T. Goodrich , Shouhuai Xu Constructing Disjoint Paths for Secure Communication. [Citation Graph (0, 0)][DBLP ] DISC, 2003, pp:181-195 [Conf ] Erhan J. Kartaltepe , Shouhuai Xu Towards Blocking Outgoing Malicious Impostor Emails. [Citation Graph (0, 0)][DBLP ] WOWMOM, 2006, pp:657-661 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal ] Shouhuai Xu On the security of group communication schemes. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:129-169 [Journal ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal ] Shouhuai Xu , Gendu Zhang , Hong Zhu On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1997, v:31, n:4, pp:12-23 [Journal ] Shouhuai Xu , Gendu Zhang , Hong Zhu On the Security of Three-Party Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:3, pp:7-20 [Journal ] Erhan J. Kartaltepe , T. Paul Parker , Shouhuai Xu How to Secure Your Email Address Book and Beyond. [Citation Graph (0, 0)][DBLP ] CANS, 2007, pp:228-246 [Conf ] Shouhuai Xu , Ravi S. Sandhu A Scalable and Secure Cryptographic Service. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:144-160 [Conf ] Keith Harrison , Shouhuai Xu Protecting Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (0, 0)][DBLP ] DSN, 2007, pp:137-143 [Conf ] A First Step towards Characterizing Stealthy Botnets. [Citation Graph (, )][DBLP ] A Framework for Understanding Botnets. [Citation Graph (, )][DBLP ] Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. [Citation Graph (, )][DBLP ] Exploiting social networks for threshold signing: attack-resilience vs. availability. [Citation Graph (, )][DBLP ] Empirical Analysis of Certificate Revocation Lists. [Citation Graph (, )][DBLP ] Expecting the Unexpected: Towards Robust Credential Infrastructure. [Citation Graph (, )][DBLP ] K -Anonymous Multi-party Secret Handshakes. [Citation Graph (, )][DBLP ] A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. [Citation Graph (, )][DBLP ] Privacy-Preserving Data Mining through Knowledge Model Sharing. [Citation Graph (, )][DBLP ] Symptoms-Based Detection of Bot Processes. [Citation Graph (, )][DBLP ] Privacy Preserving Data Mining within Anonymous Credential Systems. [Citation Graph (, )][DBLP ] An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP ] Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP ] Collaborative Attack vs. Collaborative Defense. [Citation Graph (, )][DBLP ] Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP ] A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (, )][DBLP ] SocialClouds: Concept, Security Architecture and Some Mechanisms. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.153secs