dblp.uni-trier.dewww.uni-trier.de

Shouhuai Xu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
43 Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
42EEShouhuai Xu, Xiaohu Li, T. Paul Parker: Exploiting social networks for threshold signing: attack-resilience vs. availability. ASIACCS 2008: 325-336
41EEDaryl Walleck, Yingjiu Li, Shouhuai Xu: Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174
40EEAggelos Kiayias, Shouhuai Xu, Moti Yung: Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76
39EEShouhuai Xu, Srdjan Capkun: Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM Trans. Inf. Syst. Secur. 12(1): (2008)
2007
38 Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007
37EEXiaohu Li, T. Paul Parker, Shouhuai Xu: Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427
36EEErhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu: How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246
35EEShouhuai Xu, Ravi S. Sandhu: A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160
34EEKeith Harrison, Shouhuai Xu: Protecting Cryptographic Keys from Memory Disclosure Attacks. DSN 2007: 137-143
33EEShouhuai Xu, Moti Yung: K-Anonymous Multi-party Secret Handshakes. Financial Cryptography 2007: 72-87
32EEXiaohu Li, T. Paul Parker, Shouhuai Xu: A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290
31EEPatrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu: Privacy-Preserving Data Mining through Knowledge Model Sharing. PinKDD 2007: 97-115
30EEShouhuai Xu: On the security of group communication schemes. Journal of Computer Security 15(1): 129-169 (2007)
2006
29 Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006
28EET. Paul Parker, Shouhuai Xu: Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162
27EEJim Dowd, Shouhuai Xu, Weining Zhang: Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ETRICS 2006: 145-159
26EEGene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315
25EEErhan J. Kartaltepe, Shouhuai Xu: Towards Blocking Outgoing Malicious Impostor Emails. WOWMOM 2006: 657-661
24EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006)
23EESencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006)
2005
22EEShouhuai Xu, Weining Zhang: Knowledge as a Service and Knowledge Breaching. IEEE SCC 2005: 87-94
21EEGene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39
20EEShouhuai Xu: On the security of group communication schemes based on symmetric key cryptosystems. SASN 2005: 22-31
2004
19EEShouhuai Xu, Moti Yung: k-anonymous secret handshakes with reusable credentials. ACM Conference on Computer and Communications Security 2004: 158-167
18 Shouhuai Xu, Moti Yung: Accountable Ring Signatures: A Smart Card Approach. CARDIS 2004: 271-286
17EEXuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615
16EEShouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu: Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34
15EESencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51
2003
14EEGene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286
13EEShouhuai Xu, Ravi S. Sandhu: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372
12EEAmitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, Shouhuai Xu: Constructing Disjoint Paths for Secure Communication. DISC 2003: 181-195
11EEShouhuai Xu, Moti Yung: Retrofitting Fairness on the Original RSA-Based E-cash. Financial Cryptography 2003: 51-68
10EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749-
9EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335
8EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144
2002
7EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82
6EEShouhuai Xu, Moti Yung: The Dark Side of Threshold Cryptography. Financial Cryptography 2002: 198-219
5EEShouhuai Xu, Ravi S. Sandhu: Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200
2000
4 Shouhuai Xu, Moti Yung, Gendu Zhang: Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18
1999
3EEShouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu: Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31
1998
2 Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Security of Three-Party Cryptographic Protocols. Operating Systems Review 32(3): 7-20 (1998)
1997
1 Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. Operating Systems Review 31.(4): 12-23 (1997)

Coauthor Index

1Vijayalakshmi Atluri (Vijay Atluri) [38]
2Amitabha Bagchi [12]
3Srdjan Capkun [39]
4Amitabh Chaudhary [12]
5Xuhua Ding [17]
6Yevgeniy Dodis [7] [8]
7Jim Dowd [27]
8Michael T. Goodrich [12]
9Keith Harrison [34]
10Sushil Jajodia [9] [10] [15] [23] [24]
11Ari Juels [29]
12Erhan J. Kartaltepe [25] [36]
13Jonathan Katz [7] [8]
14Aggelos Kiayias [40]
15Xiaohu Li [32] [37] [42]
16Yingjiu Li [41]
17William Robert Nelson Jr. [16]
18Peng Ning [38]
19Cristina Nita-Rotaru [43]
20T. Paul Parker [28] [32] [36] [37] [42]
21Ravi S. Sandhu [5] [13] [16] [35]
22Jean-Pierre Seifert [43]
23Sanjeev Setia [9] [10] [15] [23] [24]
24Patrick Sharkey [31]
25Hongwei Tian [31]
26Gene Tsudik [14] [17] [21] [26] [29]
27Daryl Walleck [41]
28Moti Yung (Mordechai M. Yung) [3] [4] [6] [7] [8] [11] [18] [19] [29] [33] [38] [40]
29Gendu Zhang [1] [2] [3] [4]
30Weining Zhang [22] [27] [31]
31Hong Zhu [1] [2] [3]
32Sencun Zhu [9] [10] [15] [23] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)