Shouhuai Xu
Título
Citado por
Citado por
Año
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
4852002
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4552003
VABKS: verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 522-530, 2014
2982014
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
International Workshop on Public Key Cryptography, 130-144, 2003
2952003
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
S Zhu, S Xu, S Setia, S Jajodia
23rd International Conference on Distributed Computing Systems Workshops …, 2003
1872003
Analyzing and exploiting network behaviors of malware
JA Morales, A Al-Bataineh, S Xu, R Sandhu
International conference on security and privacy in communication systems, 20-34, 2010
1802010
Fair and dynamic proofs of retrievability
Q Zheng, S Xu
Proceedings of the first ACM conference on Data and application security and …, 2011
1782011
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
S Zhu, S Setia, S Xu, S Jajodia
Journal of Computer Security 14 (4), 301-325, 2006
1452006
Secure and efficient proof of storage with deduplication
Q Zheng, S Xu
Proceedings of the second ACM conference on Data and Application Security …, 2012
1402012
Vuldeepecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
arXiv preprint arXiv:1801.01681, 2018
1172018
Social network-based botnet command-and-control: emerging threats and countermeasures
EJ Kartaltepe, JA Morales, S Xu, R Sandhu
International conference on applied cryptography and network security, 511-528, 2010
1032010
Accumulating composites and improved group signing
G Tsudik, S Xu
International Conference on the Theory and Application of Cryptology and …, 2003
992003
A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016
962016
Characterizing honeypot-captured cyber attacks: Statistical framework and case study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013
952013
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Workshop on Secure Data Management, 68-88, 2009
872009
Statistical predictive modeling and compensation of geometric deviations of three-dimensional printed products
Q Huang, H Nouri, K Xu, Y Chen, S Sosina, T Dasgupta
Journal of Manufacturing Science and Engineering 136 (6), 2014
842014
A stochastic model of multivirus dynamics
S Xu, W Lu, Z Zhan
IEEE Transactions on Dependable and Secure Computing 9 (1), 30-45, 2011
802011
A flexible framework for secret handshakes
G Tsudik, S Xu
International Workshop on Privacy Enhancing Technologies, 295-315, 2006
74*2006
Adaptive epidemic dynamics in networks: Thresholds and control
S Xu, W Lu, L Xu, Z Zhan
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (4), 1-19, 2014
732014
Cross-layer detection of malicious websites
L Xu, Z Zhan, S Xu, K Ye
Proceedings of the third ACM conference on Data and application security and …, 2013
732013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20