![]() |
| 2008 | ||
|---|---|---|
| 5 | EE | Shouhuai Xu, Xiaohu Li, T. Paul Parker: Exploiting social networks for threshold signing: attack-resilience vs. availability. ASIACCS 2008: 325-336 |
| 2007 | ||
| 4 | EE | Xiaohu Li, T. Paul Parker, Shouhuai Xu: Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427 |
| 3 | EE | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu: How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246 |
| 2 | EE | Xiaohu Li, T. Paul Parker, Shouhuai Xu: A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290 |
| 2006 | ||
| 1 | EE | T. Paul Parker, Shouhuai Xu: Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162 |
| 1 | Erhan J. Kartaltepe | [3] |
| 2 | Xiaohu Li | [2] [4] [5] |
| 3 | Shouhuai Xu | [1] [2] [3] [4] [5] |