The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shouhuai Xu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shouhuai Xu, Weining Zhang
    Knowledge as a Service and Knowledge Breaching. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:87-94 [Conf]
  2. Xiaohu Li, T. Paul Parker, Shouhuai Xu
    Towards Quantifying the (In)Security of Networked Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:420-427 [Conf]
  3. Gene Tsudik, Shouhuai Xu
    Accumulating Composites and Improved Group Signing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:269-286 [Conf]
  4. Shouhuai Xu, Moti Yung
    Accountable Ring Signatures: A Smart Card Approach. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:271-286 [Conf]
  5. Shouhuai Xu, Moti Yung, Gendu Zhang
    Friendly Observers Ease Off-Line E-Cash. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:3-18 [Conf]
  6. Shouhuai Xu, Moti Yung
    k-anonymous secret handshakes with reusable credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:158-167 [Conf]
  7. Shouhuai Xu, Ravi S. Sandhu
    Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:355-372 [Conf]
  8. T. Paul Parker, Shouhuai Xu
    Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:155-162 [Conf]
  9. Jim Dowd, Shouhuai Xu, Weining Zhang
    Privacy-Preserving Decision Tree Mining Based on Random Substitutions. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:145-159 [Conf]
  10. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
    Key-Insulated Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:65-82 [Conf]
  11. Shouhuai Xu, Moti Yung
    The Dark Side of Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:198-219 [Conf]
  12. Shouhuai Xu, Moti Yung
    Retrofitting Fairness on the Original RSA-Based E-cash. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:51-68 [Conf]
  13. Xuhua Ding, Gene Tsudik, Shouhuai Xu
    Leak-Free Group Signatures with Immediate Revocation. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:608-615 [Conf]
  14. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:749-0 [Conf]
  15. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:326-335 [Conf]
  16. Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu
    Money Conservation via Atomicity in Fair Off-Line E-Cash. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:14-31 [Conf]
  17. Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu
    Enhancing Anonymity via Market Competition. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:30-34 [Conf]
  18. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2004, pp:42-51 [Conf]
  19. Gene Tsudik, Shouhuai Xu
    A Flexible Framework for Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:295-315 [Conf]
  20. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
    Strong Key-Insulated Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:130-144 [Conf]
  21. Gene Tsudik, Shouhuai Xu
    Brief announcement: a flexible framework for secret handshakes. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:39- [Conf]
  22. Shouhuai Xu, Ravi S. Sandhu
    Authenticated multicast immune to denial-of-service attack. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:196-200 [Conf]
  23. Shouhuai Xu
    On the security of group communication schemes based on symmetric key cryptosystems. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:22-31 [Conf]
  24. Amitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, Shouhuai Xu
    Constructing Disjoint Paths for Secure Communication. [Citation Graph (0, 0)][DBLP]
    DISC, 2003, pp:181-195 [Conf]
  25. Erhan J. Kartaltepe, Shouhuai Xu
    Towards Blocking Outgoing Malicious Impostor Emails. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:657-661 [Conf]
  26. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal]
  27. Shouhuai Xu
    On the security of group communication schemes. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:129-169 [Journal]
  28. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal]
  29. Shouhuai Xu, Gendu Zhang, Hong Zhu
    On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:4, pp:12-23 [Journal]
  30. Shouhuai Xu, Gendu Zhang, Hong Zhu
    On the Security of Three-Party Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:3, pp:7-20 [Journal]
  31. Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu
    How to Secure Your Email Address Book and Beyond. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:228-246 [Conf]
  32. Shouhuai Xu, Ravi S. Sandhu
    A Scalable and Secure Cryptographic Service. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:144-160 [Conf]
  33. Keith Harrison, Shouhuai Xu
    Protecting Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:137-143 [Conf]

  34. A First Step towards Characterizing Stealthy Botnets. [Citation Graph (, )][DBLP]


  35. A Framework for Understanding Botnets. [Citation Graph (, )][DBLP]


  36. Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. [Citation Graph (, )][DBLP]


  37. Exploiting social networks for threshold signing: attack-resilience vs. availability. [Citation Graph (, )][DBLP]


  38. Empirical Analysis of Certificate Revocation Lists. [Citation Graph (, )][DBLP]


  39. Expecting the Unexpected: Towards Robust Credential Infrastructure. [Citation Graph (, )][DBLP]


  40. K-Anonymous Multi-party Secret Handshakes. [Citation Graph (, )][DBLP]


  41. A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. [Citation Graph (, )][DBLP]


  42. Privacy-Preserving Data Mining through Knowledge Model Sharing. [Citation Graph (, )][DBLP]


  43. Symptoms-Based Detection of Bot Processes. [Citation Graph (, )][DBLP]


  44. Privacy Preserving Data Mining within Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  45. An Access Control Language for a General Provenance Model. [Citation Graph (, )][DBLP]


  46. Trustworthy Information: Concepts and Mechanisms. [Citation Graph (, )][DBLP]


  47. Collaborative Attack vs. Collaborative Defense. [Citation Graph (, )][DBLP]


  48. Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). [Citation Graph (, )][DBLP]


  49. A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (, )][DBLP]


  50. SocialClouds: Concept, Security Architecture and Some Mechanisms. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002