Shouhuai Xu

Orcid: 0000-0001-8034-0942

According to our database1, Shouhuai Xu authored at least 216 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey.
Proc. IEEE, March, 2024

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees.
CoRR, 2024

Smart Home Cyber Insurance Pricing.
CoRR, 2024

Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.
CoRR, 2024

Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails.
CoRR, 2024

Towards Principled Risk Scores for Space Cyber Risk Management.
CoRR, 2024

SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges.
CoRR, 2024

On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Jamming-Resistant Communications Via Cryptographic Secret Sharing.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Electoral manipulation via influence: probabilistic model.
Auton. Agents Multi Agent Syst., June, 2023

Does OpenBSD and Firefox's Security Improve With Time?
IEEE Trans. Dependable Secur. Comput., 2023

Arms Race in Adversarial Malware Detection: A Survey.
ACM Comput. Surv., 2023

Analysis of Contagion Dynamics with Active Cyber Defenders.
CoRR, 2023

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks.
CoRR, 2023

Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone.
Proceedings of the 32nd USENIX Security Symposium, 2023

Optimally Blending Honeypots into Production Networks: Hardness and Algorithms.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Quantifying Psychological Sophistication of Malicious Emails.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Analysis of Contagion Dynamics with Active Cyber Defenders.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2022
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector.
IEEE Trans. Dependable Secur. Comput., 2022

Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity.
IEEE Trans. Dependable Secur. Comput., 2022

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-based automated and robust cyber security management.
J. Parallel Distributed Comput., 2022

Utility-Prioritized Differential Privacy for Quantitative Biomedical Data.
J. Circuits Syst. Comput., 2022

A Coupling Approach to Analyzing Games with Dynamic Environments.
CoRR, 2022

SoK: Why Have Defenses against Social Engineering Attacks Achieved Limited Success?
CoRR, 2022

Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study.
CoRR, 2022

SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022

Cyber Social Engineering Kill Chain.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Poster: Toward Zero-Trust Path-Aware Access Control.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Reducing Intrusion Alert Trees to Aid Visualization.
Proceedings of the Network and System Security - 16th International Conference, 2022

RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Auditing a Software-Defined Cross Domain Solution Architecture.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching.
ACM Trans. Softw. Eng. Methodol., 2021

A Framework for Enhancing Deep Neural Networks Against Adversarial Malware.
IEEE Trans. Netw. Sci. Eng., 2021

Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive.
IEEE Trans. Netw. Sci. Eng., 2021

A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity.
IEEE Trans. Inf. Forensics Secur., 2021

$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Computational complexity characterization of protecting elections from bribery.
Theor. Comput. Sci., 2021

Seeking Foundations for the Science of Cyber Security.
Inf. Syst. Frontiers, 2021

ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks.
IEEE Internet Things J., 2021

Using Event-Based Method to Estimate Cybersecurity Equilibrium.
IEEE CAA J. Autom. Sinica, 2021

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses.
ACM Comput. Surv., 2021

Quantifying Cybersecurity Effectiveness of Software Diversity.
CoRR, 2021

Towards Making Deep Learning-based Vulnerability Detectors Robust.
CoRR, 2021

IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021

SARR: A Cybersecurity Metrics and Quantification Framework (Keynote).
Proceedings of the Science of Cyber Security - Third International Conference, 2021

A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

vCDS: A Virtualized Cross Domain Solution Architecture.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Paying Firms to Share Cyber Threat Intelligence.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Hardness and Algorithms for Electoral Manipulation Under Media Influence.
Proceedings of the Frontiers of Algorithmics - International Joint Conference, 2021

ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study.
EAI Endorsed Trans. Security Safety, 2020

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity.
CoRR, 2020

Human Cognition through the Lens of Social Engineering Cyberattacks.
CoRR, 2020

SoK: Arms Race in Adversarial Malware Detection.
CoRR, 2020

Enhancing Deep Neural Networks Against Adversarial Malware Examples.
CoRR, 2020

μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
CoRR, 2020

Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

APIN: Automatic Attack Path Identification in Computer Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

The Cybersecurity Dynamics Way of Thinking and Landscape.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2019
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent.
IEEE/ACM Trans. Netw., 2019

Metrics Towards Measuring Cyber Agility.
IEEE Trans. Inf. Forensics Secur., 2019

A deep learning framework for predicting cyber attacks rates.
EURASIP J. Inf. Secur., 2019

STRAM: Measuring the Trustworthiness of Computer-Based Systems.
ACM Comput. Surv., 2019

Node diversification in complex networks by decentralized colouring.
J. Complex Networks, 2019

Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

A Case Study on using Deep Learning for Network Intrusion Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Election with Bribe-Effect Uncertainty: A Dichotomy Result.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

KCRS: A Blockchain-Based Key Compromise Resilient Signature System.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
Dataset, November, 2018

Multi-context features for detecting malicious programs.
J. Comput. Virol. Hacking Tech., 2018

Preventive and Reactive Cyber Defense Dynamics Is Globally Stable.
IEEE Trans. Netw. Sci. Eng., 2018

Modeling and Predicting Cyber Hacking Breaches.
IEEE Trans. Inf. Forensics Secur., 2018

Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth.
IEEE Trans. Inf. Forensics Secur., 2018

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Comput., 2018

Efficient Public Blockchain Client for Lightweight Users.
EAI Endorsed Trans. Security Safety, 2018

TNGuard: Securing IoT Oriented Tenant Networks Based on SDN.
IEEE Internet Things J., 2018

RollSec: Automatically Secure Software States Against General Rollback.
Int. J. Parallel Program., 2018

Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.
CoRR, 2018

Node Diversification in Complex Networks by Decentralized Coloring.
CoRR, 2018

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.
CoRR, 2018

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
CoRR, 2018

Special issue on social network security and privacy.
Concurr. Comput. Pract. Exp., 2018

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Characterizing the Effectiveness of Network-Based Intrusion Detection Systems.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A safety and security architecture for reducing accidents in intelligent transportation systems.
Proceedings of the International Conference on Computer-Aided Design, 2018

Quantifying the security effectiveness of network diversity: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Quantifying the security effectiveness of firewalls and DMZs.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Protecting Election from Bribery: New Approach and Computational Complexity Characterization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning.
Technometrics, 2017

Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization.
Reliab. Eng. Syst. Saf., 2017

A Survey on Systems Security Metrics.
ACM Comput. Surv., 2017

A control flow graph-based signature for packer identification.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

A dataset generator for next generation system call host intrusion detection systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

EPBC: Efficient Public Blockchain Client for lightweight users.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

2016
A Survey on Security Metrics.
CoRR, 2016

Spatiotemporal patterns and predictability of cyberattacks.
CoRR, 2016

Metrics and measurement of trustworthy systems.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Extracting attack narratives from traffic datasets.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Predicting Cyber Attack Rates With Extreme Values.
IEEE Trans. Inf. Forensics Secur., 2015

A Stochastic Model of Active Cyber Defense Dynamics.
Internet Math., 2015

Cyber Epidemic Models with Dependences.
Internet Math., 2015

TEE: A virtual DRTM based execution environment for secure cloud-end computing.
Future Gener. Comput. Syst., 2015

Active cyber defense dynamics exhibiting rich phenomena.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Adaptive Epidemic Dynamics in Networks: Thresholds and Control.
ACM Trans. Auton. Adapt. Syst., 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

An Evasion and Counter-Evasion Study in Malicious Websites Detection.
CoRR, 2014

Instructions-Based Detection of Sophisticated Obfuscation and Packing.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

A Characterization of Cybersecurity Posture from Network Telescope Data.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Cybersecurity dynamics.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Emergent behavior in cybersecurity.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Characterizing the power of moving target defense via cyber epidemic dynamics.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

A new approach to modeling and analyzing security of networked systems.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

An evasion and counter-evasion study in malicious websites detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.
IEEE Trans. Inf. Forensics Secur., 2013

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data.
IACR Cryptol. ePrint Arch., 2013

Optimizing Active Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Cross-layer detection of malicious websites.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment.
Proceedings of the Computing Frontiers Conference, 2013

Real-time detection and prevention of android SMS permission abuses.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
A Stochastic Model of Multivirus Dynamics.
IEEE Trans. Dependable Secur. Comput., 2012

Enhancing Data Trustworthiness via Assured Digital Signing.
IEEE Trans. Dependable Secur. Comput., 2012

A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining.
Trans. Data Priv., 2012

Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights.
ACM Trans. Auton. Adapt. Syst., 2012

An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems.
Internet Math., 2012

Efficient Query Integrity for Outsourced Dynamic Databases.
IACR Cryptol. ePrint Arch., 2012

Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data.
IEEE Trans. Inf. Forensics Secur., 2011

A Stochastic Model for Quantitative Security Analyses of Networked Systems.
IEEE Trans. Dependable Secur. Comput., 2011

Secure and Efficient Proof of Storage with Deduplication.
IACR Cryptol. ePrint Arch., 2011

Building malware infection trees.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Fair and dynamic proofs of retrievability.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Non-interactive editable signatures for assured data provenance.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Non-interactive multisignatures in the plain public-key model with efficient verification.
Inf. Process. Lett., 2010

Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Assigning applications to servers: a simulation study.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Analyzing and Exploiting Network Behaviors of Malware.
Proceedings of the Security and Privacy in Communication Networks, 2010

Symptoms-Based Detection of Bot Processes.
Proceedings of the Computer Network Security, 2010

Evaluating detection and treatment effectiveness of commercial anti-malware programs.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
A probabilistic characterization of a fault-tolerant gossiping algorithm.
J. Syst. Sci. Complex., 2009

Leak-free mediated group signatures.
J. Comput. Secur., 2009

An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Analyzing DNS activities of bot processes.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

A Characterization of the problem of secure provenance management.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


SocialClouds: Concept, Security Architecture and Some Mechanisms.
Proceedings of the Trusted Systems, First International Conference, 2009

A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.
Proceedings of the Trusted Systems, First International Conference, 2009

TIUPAM: A Framework for Trustworthiness-Centric Information Sharing.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Expecting the Unexpected: Towards Robust Credential Infrastructure.
Proceedings of the Financial Cryptography and Data Security, 2009

A Framework for Understanding Botnets.
Proceedings of the The Forth International Conference on Availability, 2009

A First Step towards Characterizing Stealthy Botnets.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur., 2008

Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Privacy-Preserving Accountable Accuracy Management Systems (PAAMS).
Proceedings of the Protecting Persons While Protecting the People, 2008

Empirical Analysis of Certificate Revocation Lists.
Proceedings of the Data and Applications Security XXII, 2008

Collaborative Attack vs. Collaborative Defense.
Proceedings of the Collaborative Computing: Networking, 2008

Exploiting social networks for threshold signing: attack-resilience vs. availability.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
On the security of group communication schemes.
J. Comput. Secur., 2007

Towards an analytic model of epidemic spreading in heterogeneous systems.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Privacy-Preserving Data Mining through Knowledge Model Sharing.
Proceedings of the Privacy, 2007

A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

<i>K</i>-Anonymous Multi-party Secret Handshakes.
Proceedings of the Financial Cryptography and Data Security, 2007

Protecting Cryptographic Keys from Memory Disclosure Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

A Scalable and Secure Cryptographic Service.
Proceedings of the Data and Applications Security XXI, 2007

How to Secure Your Email Address Book and Beyond.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Towards Quantifying the (In)Security of Networked Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
J. Comput. Secur., 2006

LHAP: A lightweight network access control protocol for ad hoc networks.
Ad Hoc Networks, 2006

Towards Blocking Outgoing Malicious Impostor Emails.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

A Flexible Framework for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Privacy-Preserving Decision Tree Mining Based on Random Substitutions.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication).
IACR Cryptol. ePrint Arch., 2005

On the security of group communication schemes based on symmetric key cryptosystems.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Brief announcement: a flexible framework for secret handshakes.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

On Automatically Detecting Malicious Impostor Emails.
Proceedings of the Applied Public Key Infrastructure, 2005

Knowledge as a Service and Knowledge Breaching.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Enhancing Anonymity via Market Competition.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Leak-Free Group Signatures with Immediate Revocation.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

k-anonymous secret handshakes with reusable credentials.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Accountable Ring Signatures: A Smart Card Approach.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Accumulating Composites and Improved Group Signing.
IACR Cryptol. ePrint Arch., 2003

Constructing Disjoint Paths for Secure Communication.
Proceedings of the Distributed Computing, 17th International Conference, 2003

Strong Key-Insulated Signature Schemes.
Proceedings of the Public Key Cryptography, 2003

Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Retrofitting Fairness on the Original RSA-Based E-cash.
Proceedings of the Financial Cryptography, 2003

Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures.
Proceedings of the Topics in Cryptology, 2003

2002
Key-Insulated Public-Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2002

Authenticated multicast immune to denial-of-service attack.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

The Dark Side of Threshold Cryptography.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2000
Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Money Conservation via Atomicity in Fair Off-Line E-Cash.
Proceedings of the Information Security, Second International Workshop, 1999

1998
On the Security of Three-Party Cryptographic Protocols.
ACM SIGOPS Oper. Syst. Rev., 1998

1997
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
ACM SIGOPS Oper. Syst. Rev., 1997


  Loading...