dblp.uni-trier.dewww.uni-trier.de

Hongxia Jin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
28EEQihua Wang, Hongxia Jin: Selective message distribution with people-tagging in user-collaborative environments. CHI Extended Abstracts 2009: 4549-4554
27EEHongxia Jin, Jeffrey B. Lotspiech: Defending against the Pirate Evolution Attack. ISPEC 2009: 147-158
26EEHongxia Jin: Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution. IJDCF 1(1): 59-74 (2009)
2008
25EEHongxia Jin, Jeffrey B. Lotspiech, Michael Nelson, Nimrod Megiddo: Adaptive traitor tracing for large anonymous attack. Digital Rights Management Workshop 2008: 1-8
24EEAvinash L. Varna, Hongxia Jin: Generalized traitor tracing for nested codes. ICME 2008: 561-564
23EEHongxia Jin, Jeffery Lotspiech, Nimrod Megiddo: Efficient Coalition Detection in Traitor Tracing. SEC 2008: 365-380
22EEHongxia Jin, Vladimir Zbarsky: Enabling secure digital marketplace. WWW 2008: 1217-1218
2007
21 Philip Zigoris, Hongxia Jin: Adaptive Traitor Tracing with Bayesian Networks. AAAI 2007: 1833-1839
20EEPhilip Zigoris, Hongxia Jin: Bayesian Methods for Practical Traitor Tracing. ACNS 2007: 194-206
19EEHongxia Jin, Jeffery Lotspiech: Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. ESORICS 2007: 563-577
18EEHongxia Jin, Ginger Myles: A technique for self-certifying tamper resistant software. QoP 2007: 12-14
17EEHongxia Jin, Jianna Zhao, Xiaoxuan Chen: The Application of Neuro-Fuzzy Decision Tree in Optimal Selection of Teconological Innovation Projects. SNPD (3) 2007: 438-443
16EEHongxia Jin, Mario Blaum: Combinatorial Properties for Traceability Codes Using Error Correcting Codes. IEEE Transactions on Information Theory 53(2): 804-808 (2007)
2006
15EEHongxia Jin, Jeffery Lotspiech: Hybrid Traitor Tracing. ICME 2006: 1329-1332
14EEHongxia Jin, Jeffery Lotspiech: Practical Forensic Analysis in Advanced Access Content System. ISPEC 2006: 302-313
13EEHongxia Jin: Privacy, traceability, and anonymity for content protection. PST 2006: 63
12 Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum: Traitor Tracing for Subscription-Based Systems. SECRYPT 2006: 223-228
11EEHongxia Jin: Higher Dependability and Security for Mobile Applications. SPC 2006: 89-103
2005
10EEHongxia Jin, Jeffery Lotspiech: Flexible Traitor Tracing for Anonymous Attacks. Communications and Multimedia Security 2005: 269-270
9EEHongxia Jin, Jeffery Lotspiech: Attacks and Forensic Analysis for Multimedia Content Protection. ICME 2005: 1392-1395
8EEHongxia Jin, Ginger Myles, Jeffery Lotspiech: Towards Better Software Tamper Resistance. ISC 2005: 417-430
7EEGinger Myles, Hongxia Jin: Self-validating Branch-Based Software Watermarking. Information Hiding 2005: 342-356
2004
6EEHongxia Jin, Jeffery Lotspiech, Stefan Nusser: Traitor tracing for prerecorded and recordable media. Digital Rights Management Workshop 2004: 83-90
2003
5EEHongxia Jin, Jeffery Lotspiech: Proactive Software Tampering Detection. ISC 2003: 352-365
4EEHongxia Jin, Jeffery Lotspiech: Forensic Analysis for Tamper Resistant Software. ISSRE 2003: 133-142
3EEHongxia Jin, Gregory F. Sullivan, Gerald M. Masson: Software Tamper Resistance Using Program Certificates. SAFECOMP 2003: 144-158
2001
2EEHongxia Jin, Peter Santhanam: An Approach to Higher Reliability Using Software Components. ISSRE 2001: 2-11
1999
1 Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson: Run-time Result Certification for Distributed Computations. PDPTA 1999: 890-895

Coauthor Index

1Mario Blaum [12] [16]
2Xiaoxuan Chen [17]
3Jeffrey B. Lotspiech (Jeffery Lotspiech) [4] [5] [6] [8] [9] [10] [12] [14] [15] [19] [23] [25] [27]
4Gerald M. Masson [1] [3]
5Nimrod Megiddo [23] [25]
6Ginger Myles [7] [8] [18]
7Michael Nelson [25]
8Stefan Nusser [6]
9Peter Santhanam [2]
10Gregory F. Sullivan [1] [3]
11Avinash L. Varna [24]
12Qihua Wang [28]
13Vladimir Zbarsky [22]
14Jianna Zhao [17]
15Philip Zigoris [20] [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)