dblp.uni-trier.dewww.uni-trier.de

XiaoFeng Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EERui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li: Towards automatic reverse engineering of software security configurations. ACM Conference on Computer and Communications Security 2008: 245-256
14EEZhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter: AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246
13EERui Wang, XiaoFeng Wang, Zhuowei Li: Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . USENIX Security Symposium 2008: 291-306
12EEXiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil: Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
11EEXiaoFeng Wang, Michael K. Reiter: A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Sec. 7(4): 243-263 (2008)
10EEChunming Tang, Dingyi Pei, XiaoFeng Wang, ZhuoJun Liu: Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. Science in China Series F: Information Sciences 51(2): 128-144 (2008)
2007
9EEZhuowei Li, XiaoFeng Wang, Jong Youl Choi: SpyShield: Preserving Privacy from Spy Add-Ons. RAID 2007: 296-316
2006
8EEXiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi: Packet vaccine: black-box exploit detection and signature generation. ACM Conference on Computer and Communications Security 2006: 37-46
7EEPhilippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow: Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. IEEE Symposium on Security and Privacy 2006: 121-131
6EEXiaoFeng Wang, Michael K. Reiter: WRAPS: Denial-of-Service Defense through Web Referrals. SRDS 2006: 51-60
2005
5EEMichael K. Reiter, XiaoFeng Wang, Matthew Wright: Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392
2004
4EEMichael K. Reiter, XiaoFeng Wang: Fragile mixing. ACM Conference on Computer and Communications Security 2004: 227-235
3EEXiaoFeng Wang, Michael K. Reiter: Mitigating bandwidth-exhaustion attacks using congestion puzzles. ACM Conference on Computer and Communications Security 2004: 257-267
2EEMarkus Jakobsson, XiaoFeng Wang, Susanne Wetzel: Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222
2003
1EEXiaoFeng Wang, Michael K. Reiter: Defending Against Denial-of-Service Attacks with Puzzle Auction. IEEE Symposium on Security and Privacy 2003: 78-92

Coauthor Index

1Jong Youl Choi [8] [9] [12]
2Philippe Golle [7]
3Markus Jakobsson [2] [7]
4Chongkyung Kil [8] [12]
5Zhuowei Li [8] [9] [12] [13] [14] [15]
6Zhenkai Liang [14]
7ZhuoJun Liu [10]
8Dingyi Pei [10]
9Michael K. Reiter [1] [3] [4] [5] [6] [8] [11] [12] [14]
10Chunming Tang [10]
11Alex Tsow [7]
12Rui Wang [13] [15]
13Susanne Wetzel [2]
14Matthew Wright [5]
15Jun Xu [8] [12]
16Kehuan Zhang [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)