![]() | ![]() |
2008 | ||
---|---|---|
5 | EE | Shouhuai Xu, Xiaohu Li, T. Paul Parker: Exploiting social networks for threshold signing: attack-resilience vs. availability. ASIACCS 2008: 325-336 |
2007 | ||
4 | EE | Xiaohu Li, T. Paul Parker, Shouhuai Xu: Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427 |
3 | EE | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu: How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246 |
2 | EE | Xiaohu Li, T. Paul Parker, Shouhuai Xu: A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290 |
2006 | ||
1 | EE | T. Paul Parker, Shouhuai Xu: Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162 |
1 | Erhan J. Kartaltepe | [3] |
2 | Xiaohu Li | [2] [4] [5] |
3 | Shouhuai Xu | [1] [2] [3] [4] [5] |