2008 |
43 | | Shouhuai Xu,
Cristina Nita-Rotaru,
Jean-Pierre Seifert:
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008
ACM 2008 |
42 | EE | Shouhuai Xu,
Xiaohu Li,
T. Paul Parker:
Exploiting social networks for threshold signing: attack-resilience vs. availability.
ASIACCS 2008: 325-336 |
41 | EE | Daryl Walleck,
Yingjiu Li,
Shouhuai Xu:
Empirical Analysis of Certificate Revocation Lists.
DBSec 2008: 159-174 |
40 | EE | Aggelos Kiayias,
Shouhuai Xu,
Moti Yung:
Privacy Preserving Data Mining within Anonymous Credential Systems.
SCN 2008: 57-76 |
39 | EE | Shouhuai Xu,
Srdjan Capkun:
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
2007 |
38 | | Peng Ning,
Vijay Atluri,
Shouhuai Xu,
Moti Yung:
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007
ACM 2007 |
37 | EE | Xiaohu Li,
T. Paul Parker,
Shouhuai Xu:
Towards Quantifying the (In)Security of Networked Systems.
AINA 2007: 420-427 |
36 | EE | Erhan J. Kartaltepe,
T. Paul Parker,
Shouhuai Xu:
How to Secure Your Email Address Book and Beyond.
CANS 2007: 228-246 |
35 | EE | Shouhuai Xu,
Ravi S. Sandhu:
A Scalable and Secure Cryptographic Service.
DBSec 2007: 144-160 |
34 | EE | Keith Harrison,
Shouhuai Xu:
Protecting Cryptographic Keys from Memory Disclosure Attacks.
DSN 2007: 137-143 |
33 | EE | Shouhuai Xu,
Moti Yung:
K-Anonymous Multi-party Secret Handshakes.
Financial Cryptography 2007: 72-87 |
32 | EE | Xiaohu Li,
T. Paul Parker,
Shouhuai Xu:
A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm.
HASE 2007: 283-290 |
31 | EE | Patrick Sharkey,
Hongwei Tian,
Weining Zhang,
Shouhuai Xu:
Privacy-Preserving Data Mining through Knowledge Model Sharing.
PinKDD 2007: 97-115 |
30 | EE | Shouhuai Xu:
On the security of group communication schemes.
Journal of Computer Security 15(1): 129-169 (2007) |
2006 |
29 | | Ari Juels,
Gene Tsudik,
Shouhuai Xu,
Moti Yung:
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006
ACM 2006 |
28 | EE | T. Paul Parker,
Shouhuai Xu:
Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.
DASC 2006: 155-162 |
27 | EE | Jim Dowd,
Shouhuai Xu,
Weining Zhang:
Privacy-Preserving Decision Tree Mining Based on Random Substitutions.
ETRICS 2006: 145-159 |
26 | EE | Gene Tsudik,
Shouhuai Xu:
A Flexible Framework for Secret Handshakes.
Privacy Enhancing Technologies 2006: 295-315 |
25 | EE | Erhan J. Kartaltepe,
Shouhuai Xu:
Towards Blocking Outgoing Malicious Impostor Emails.
WOWMOM 2006: 657-661 |
24 | EE | Sencun Zhu,
Shouhuai Xu,
Sanjeev Setia,
Sushil Jajodia:
LHAP: A lightweight network access control protocol for ad hoc networks.
Ad Hoc Networks 4(5): 567-585 (2006) |
23 | EE | Sencun Zhu,
Sanjeev Setia,
Shouhuai Xu,
Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
Journal of Computer Security 14(4): 301-325 (2006) |
2005 |
22 | EE | Shouhuai Xu,
Weining Zhang:
Knowledge as a Service and Knowledge Breaching.
IEEE SCC 2005: 87-94 |
21 | EE | Gene Tsudik,
Shouhuai Xu:
Brief announcement: a flexible framework for secret handshakes.
PODC 2005: 39 |
20 | EE | Shouhuai Xu:
On the security of group communication schemes based on symmetric key cryptosystems.
SASN 2005: 22-31 |
2004 |
19 | EE | Shouhuai Xu,
Moti Yung:
k-anonymous secret handshakes with reusable credentials.
ACM Conference on Computer and Communications Security 2004: 158-167 |
18 | | Shouhuai Xu,
Moti Yung:
Accountable Ring Signatures: A Smart Card Approach.
CARDIS 2004: 271-286 |
17 | EE | Xuhua Ding,
Gene Tsudik,
Shouhuai Xu:
Leak-Free Group Signatures with Immediate Revocation.
ICDCS 2004: 608-615 |
16 | EE | Shouhuai Xu,
William Robert Nelson Jr.,
Ravi S. Sandhu:
Enhancing Anonymity via Market Competition.
ITCC (1) 2004: 30-34 |
15 | EE | Sencun Zhu,
Sanjeev Setia,
Shouhuai Xu,
Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
MobiQuitous 2004: 42-51 |
2003 |
14 | EE | Gene Tsudik,
Shouhuai Xu:
Accumulating Composites and Improved Group Signing.
ASIACRYPT 2003: 269-286 |
13 | EE | Shouhuai Xu,
Ravi S. Sandhu:
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures.
CT-RSA 2003: 355-372 |
12 | EE | Amitabha Bagchi,
Amitabh Chaudhary,
Michael T. Goodrich,
Shouhuai Xu:
Constructing Disjoint Paths for Secure Communication.
DISC 2003: 181-195 |
11 | EE | Shouhuai Xu,
Moti Yung:
Retrofitting Fairness on the Original RSA-Based E-cash.
Financial Cryptography 2003: 51-68 |
10 | EE | Sencun Zhu,
Shouhuai Xu,
Sanjeev Setia,
Sushil Jajodia:
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
ICDCS Workshops 2003: 749- |
9 | EE | Sencun Zhu,
Shouhuai Xu,
Sanjeev Setia,
Sushil Jajodia:
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
ICNP 2003: 326-335 |
8 | EE | Yevgeniy Dodis,
Jonathan Katz,
Shouhuai Xu,
Moti Yung:
Strong Key-Insulated Signature Schemes.
Public Key Cryptography 2003: 130-144 |
2002 |
7 | EE | Yevgeniy Dodis,
Jonathan Katz,
Shouhuai Xu,
Moti Yung:
Key-Insulated Public Key Cryptosystems.
EUROCRYPT 2002: 65-82 |
6 | EE | Shouhuai Xu,
Moti Yung:
The Dark Side of Threshold Cryptography.
Financial Cryptography 2002: 198-219 |
5 | EE | Shouhuai Xu,
Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack.
SAC 2002: 196-200 |
2000 |
4 | | Shouhuai Xu,
Moti Yung,
Gendu Zhang:
Friendly Observers Ease Off-Line E-Cash.
CARDIS 2000: 3-18 |
1999 |
3 | EE | Shouhuai Xu,
Moti Yung,
Gendu Zhang,
Hong Zhu:
Money Conservation via Atomicity in Fair Off-Line E-Cash.
ISW 1999: 14-31 |
1998 |
2 | | Shouhuai Xu,
Gendu Zhang,
Hong Zhu:
On the Security of Three-Party Cryptographic Protocols.
Operating Systems Review 32(3): 7-20 (1998) |
1997 |
1 | | Shouhuai Xu,
Gendu Zhang,
Hong Zhu:
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
Operating Systems Review 31.(4): 12-23 (1997) |