Danfeng (Daphne) Yao
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
15 | EE | Brian Thompson, Danfeng Yao: The union-split algorithm and cluster-based anonymization of social networks. ASIACCS 2009: 218-227 |
14 | EE | Danfeng Yao, Roberto Tamassia: Compact and Anonymous Role-Based Authorization Chain. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 | ||
13 | EE | Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. ASIACCS 2008: 353-362 |
12 | Danfeng Yao: An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. Security and Management 2008: 555-561 | |
11 | EE | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
10 | EE | Yunhua Koglin, Danfeng Yao, Elisa Bertino: Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. IEEE Trans. Parallel Distrib. Syst. 19(5): 615-626 (2008) |
9 | EE | Michael T. Goodrich, Roberto Tamassia, Danfeng (Daphne) Yao: Notarized federated ID management and authentication. Journal of Computer Security 16(4): 399-418 (2008) |
2007 | ||
8 | EE | Isabel F. Cruz, Roberto Tamassia, Danfeng Yao: Privacy-Preserving Schema Matching Using Mutual Information. DBSec 2007: 93-94 |
7 | EE | Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia: Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661 |
2006 | ||
6 | EE | Michael T. Goodrich, Roberto Tamassia, Danfeng Yao: Notarized Federated Identity Management for Web Services. DBSec 2006: 133-147 |
5 | EE | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia: Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 |
2005 | ||
4 | EE | Michael T. Goodrich, Roberto Tamassia, Danfeng Yao: Accredited DomainKeys: A Service Architecture for Improved Email Validation. CEAS 2005 |
3 | EE | Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough: Visualization of Automated Trust Negotiation. VizSEC 2005: 8 |
2004 | ||
2 | EE | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ACM Conference on Computer and Communications Security 2004: 354-363 |
1 | EE | Roberto Tamassia, Danfeng Yao, William H. Winsborough: Role-based cascaded delegation. SACMAT 2004: 146-155 |
1 | Mikhail J. Atallah | [5] [11] |
2 | Elisa Bertino | [7] [10] |
3 | Isabel F. Cruz | [8] |
4 | Yevgeniy Dodis | [2] |
5 | Nelly Fazio | [2] |
6 | Keith B. Frikken | [5] [11] |
7 | Michael T. Goodrich | [4] [6] [9] |
8 | Stuart Haber | [13] |
9 | Yasuo Hatano | [13] |
10 | Yoshinori Honda | [13] |
11 | William Horne | [13] |
12 | Yunhua Koglin | [7] [10] |
13 | Anna Lysyanskaya | [2] |
14 | Kunihiko Miyazaki | [13] |
15 | Tomas Sander | [13] |
16 | Michael Shin | [3] |
17 | Roberto Tamassia | [1] [3] [4] [5] [6] [7] [8] [9] [11] [14] |
18 | Satoru Tezoku | [13] |
19 | Brian Thompson | [15] |
20 | William H. Winsborough | [1] [3] |