Yingjiu Li

Orcid: 0000-0001-8256-6988

According to our database1, Yingjiu Li authored at least 209 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2024

Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting.
IEEE Trans. Inf. Forensics Secur., 2024

AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential.
IEEE Trans. Dependable Secur. Comput., 2024

Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures.
IEEE Trans. Dependable Secur. Comput., 2024

AnoPas: Practical anonymous transit pass from group signatures with time-bound keys.
J. Syst. Archit., 2024

PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024

SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner.
CoRR, 2024

Policy-Based Remote User Authentication From Multi-Biometrics.
Comput. J., 2024

SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme.
IEEE Trans. Reliab., December, 2023

Threshold Attribute-Based Credentials With Redactable Signature.
IEEE Trans. Serv. Comput., 2023

CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
IEEE Trans. Inf. Forensics Secur., 2023

ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
IEEE Trans. Inf. Forensics Secur., 2023

Accountable and Fine-Grained Controllable Rewriting in Blockchains.
IEEE Trans. Inf. Forensics Secur., 2023

SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

A Robustness-Assured White-Box Watermark in Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023

2022
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering.
IEEE Trans. Dependable Secur. Comput., 2022

DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
CoRR, 2022

Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification.
Comput. J., 2022

Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption.
Proceedings of the Information Security Practice and Experience, 2022

FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Lattice-based remote user authentication from reusable fuzzy signature.
J. Comput. Secur., 2021

A Practical Forward-Secure DualRing.
IACR Cryptol. ePrint Arch., 2021

Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks.
CoRR, 2021

Unlinkable and Revocable Secret Handshake.
Comput. J., 2021

Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

UltraPIN: Inferring PIN Entries via Ultrasound.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Privacy-preserving Network Path Validation.
ACM Trans. Internet Techn., 2020

Lightweight Sharable and Traceable Secure Mobile Health System.
IEEE Trans. Dependable Secur. Comput., 2020

Leakage-resilient biometric-based remote user authentication with fuzzy extractors.
Theor. Comput. Sci., 2020

A new framework for privacy-preserving biometric-based remote user authentication.
J. Comput. Secur., 2020

Efficient ciphertext-policy attribute-based encryption with blackbox traceability.
Inf. Sci., 2020

Editing-Enabled Signatures: A New Tool for Editing Authenticated Data.
IEEE Internet Things J., 2020

A New Construction for Linkable Secret Handshake.
Comput. J., 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud.
IEEE Trans. Big Data, 2019

Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log.
EAI Endorsed Trans. Security Safety, 2019

Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin.
J. Comput. Secur., 2019

DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019

When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Comput. Secur., 2019

Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019

Adopting Hyperledger Fabric Blockchain for EPCglobal Network.
Proceedings of the IEEE International Conference on RFID, 2019

DroidEvolver: Self-Evolving Android Malware Detection System.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Super Payment Channel for Decentralized Cryptocurrencies.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018

Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Inf. Forensics Secur., 2018

Empirical Study of Face Authentication Systems Under OSNFD Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2018

Attribute-based cloud storage with secure provenance over encrypted data.
Future Gener. Comput. Syst., 2018

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecur., 2018

What's (Not) Validating Network Paths: A Survey.
CoRR, 2018

User-friendly deniable storage for mobile devices.
Comput. Secur., 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Privacy-Preserving Remote User Authentication with k-Times Untraceability.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.
IEEE Trans. Serv. Comput., 2017

A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Secur. Comput., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Secur. Comput., 2017

A study on a feasible no-root approach on Android.
J. Comput. Secur., 2017

EvoPass: Evolvable graphical password against shoulder-surfing attacks.
Comput. Secur., 2017

Employing Smartwatch for Enhanced Password Authentication.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Attribute-Based Secure Messaging in the Public Cloud.
Proceedings of the A Systems Approach to Cyber Security, 2017

Fair deposits against double-spending for Bitcoin transactions.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
ICCDetector: ICC-Based Malware Detection on Android.
IEEE Trans. Inf. Forensics Secur., 2016

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Secur. Commun. Networks, 2016

SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016

Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016

Attacking Android smartphone systems without permissions.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Dissecting developer policy violating apps: characterization and detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Efficient Tag Path Authentication Protocol with Less Tag Memory.
Proceedings of the Information Security Practice and Experience, 2016

Server-Aided Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2016, 2016

A Feasible No-Root Approach on Android.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Leakage Resilient Password Systems
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS J. Comput., 2015

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network.
CoRR, 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Comput. Secur., 2015

Privacy leakage analysis in online social networks.
Comput. Secur., 2015

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Server-Aided Revocable Identity-Based Encryption.
Proceedings of the Computer Security - ESORICS 2015, 2015

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On RFID False Authentications.
Proceedings of the Big Data and Internet of Things: A Roadmap for Smart Environments, 2014

A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration.
Wirel. Pers. Commun., 2014

Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Risk balance defense approach against intrusions for network server.
Int. J. Inf. Sec., 2014

Innovative Applications and Security of Internet of Things.
Int. J. Distributed Sens. Networks, 2014

Permission based Android security: Issues and countermeasures.
Comput. Secur., 2014

AnonEPC - making the querying user anonymous in EPCglobal network.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014

Batch Clone Detection in RFID-enabled supply chain.
Proceedings of the IEEE International Conference on RFID, 2014

Detecting Camouflaged Applications on Mobile Application Markets.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Understanding OSN-based facial disclosure against face authentication systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
RFID Security and Privacy
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02340-8, 2013

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks.
Proceedings of the Information Security Practice and Experience, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Guest Editor's Preface.
J. Comput. Secur., 2012

A Survey on Privacy Frameworks for RFID Authentication.
IEICE Trans. Inf. Syst., 2012

A secure and efficient discovery service system in EPCglobal network.
Comput. Secur., 2012

SecTTS: A secure track & trace system for RFID-enabled supply chains.
Comput. Ind., 2012

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
Proceedings of the Information Security and Privacy Research, 2012

Design and Implementation of a Secure Prototype for EPCglobal Network Services.
Proceedings of the Radio Frequency Identification System Security, 2012

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

SecDS: a secure EPC discovery service system in EPCglobal network.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Expressive CP-ABE with partially hidden access structures.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

A New Framework for Privacy of RFID Path Authentication.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
On two RFID privacy notions and their relations.
ACM Trans. Inf. Syst. Secur., 2011

Guest editors' preface.
J. Comput. Secur., 2011

A zero-knowledge based framework for RFID privacy.
J. Comput. Secur., 2011

Privacy Risk Assessment with Bounds Deduced from Bounds.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011

Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture.
Int. J. Commun. Syst., 2011

Adaptive collision resolution for efficient RFID tag identification.
EURASIP J. Wirel. Commun. Netw., 2011

Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
Proceedings of the Security and Privacy in Communication Networks, 2011

Fully Secure Cipertext-Policy Hiding CP-ABE.
Proceedings of the Information Security Practice and Experience, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Shifting Inference Control to User Side: Architecture and Protocol.
IEEE Trans. Dependable Secur. Comput., 2010

Two robust remote user authentication protocols using smart cards.
J. Syst. Softw., 2010

Information Technology Diffusion with Influentials, Imitators, and Opponents.
J. Manag. Inf. Syst., 2010

Achieving high security and efficiency in RFID-tagged supply chains.
Int. J. Appl. Cryptogr., 2010

A New Framework for RFID Privacy.
IACR Cryptol. ePrint Arch., 2010

An intrusion response decision-making model based on hierarchical task network planning.
Expert Syst. Appl., 2010

Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Comput. Networks, 2010

Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.
Proceedings of the Privacy in Statistical Databases, 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010

An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Revisiting Unpredictability-Based RFID Privacy Models.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

A Multiple-Bits Watermark for Relational Data.
Proceedings of the Principle Advancements in Database Management Technologies: New Applications and Frameworks, 2010

2009
Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics.
J. Comput. Sci. Technol., 2009

Certificate revocation release policies.
J. Comput. Secur., 2009

Wake up or fall asleep-value implication of trusted computing.
Inf. Technol. Manag., 2009

Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

A Robust Damage Assessment Model for Corrupted Database Systems.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

A Multiple-Bits Watermark for Relational Data.
Proceedings of the Database Technologies: Concepts, 2009

2008
Database Watermarking: A Systematic View.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Practical Inference Control for Data Cubes.
IEEE Trans. Dependable Secur. Comput., 2008

Protecting business intelligence and customer privacy while outsourcing data mining tasks.
Knowl. Inf. Syst., 2008

Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining.
Knowl. Inf. Syst., 2008

Disclosure Analysis and Control in Statistical Databases.
Proceedings of the Computer Security, 2008

Empirical Analysis of Certificate Revocation Lists.
Proceedings of the Data and Applications Security XXII, 2008

A Security and Performance Evaluation of Hash-Based RFID Protocols.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Preserving privacy in association rule mining with bloom filters.
J. Intell. Inf. Syst., 2007

Parity-based inference control for multi-dimensional range sum queries.
J. Comput. Secur., 2007

Chaining watermarks for detecting malicious modifications to streaming data.
Inf. Sci., 2007

New Paradigm of Inference Control with Trusted Computing.
Proceedings of the Data and Applications Security XXI, 2007

Protecting RFID communications in supply chains.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006

A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006

On the Release of CRLs in Public Key Infrastructure.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Practical Inference Control for Data Cubes (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards value disclosure analysis in modeling general databases.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Disclosure Analysis for Two-Way Contingency Tables.
Proceedings of the Privacy in Statistical Databases, 2006

On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2006, 2006

Rights Protection for Data Cubes.
Proceedings of the Information Security, 9th International Conference, 2006

Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
Proceedings of the Information Systems Security, Second International Conference, 2006

An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Deriving Private Information from Perturbed Data Using IQR Based Approach.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Publicly verifiable ownership protection for relational databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Optimal CRL Releasing Strategy in Public Key Infrastructure.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Secur. Comput., 2005

Securing credit card transactions with one-time payment scheme.
Electron. Commer. Res. Appl., 2005

Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

An attribute-based access matrix model.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Generic Protocol for Controlling Access to Mobile Services.
Proceedings of the Applied Public Key Infrastructure, 2005

2004
A Security-Enhanced One-Time Payment Scheme for Credit Card.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

Tamper detection and localization for categorical data using fragile watermarks.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Discovering calendar-based temporal association rules.
Data Knowl. Eng., 2003

Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Proceedings of the Computer Security, 2003

Constructing a virtual primary key for fingerprinting relational data.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

2002
Enhancing Profiles for Anomaly Detection Using Time Granularities.
J. Comput. Secur., 2002

Preventing Interval-Based Inference by Random Data Perturbation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

A Privacy-Enhanced Microaggregation Method.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Auditing Interval-Based Inference.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002

2000
Discovering Temporal Patterns in Multiple Granularities.
Proceedings of the Temporal, 2000


  Loading...