Shouhuai Xu
TítuloCitado porAño
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
4722002
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4442003
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
International Workshop on Public Key Cryptography, 130-144, 2003
2902003
VABKS: verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 522-530, 2014
2572014
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
S Zhu, S Xu, S Setia, S Jajodia
ICDCS Workshops, 749-, 2003
1862003
Fair and dynamic proofs of retrievability
Q Zheng, S Xu
Proceedings of the first ACM conference on Data and application security and …, 2011
1782011
Analyzing and exploiting network behaviors of malware
JA Morales, A Al-Bataineh, S Xu, R Sandhu
International conference on security and privacy in communication systems, 20-34, 2010
1762010
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
S Zhu, S Setia, S Xu, S Jajodia
Journal of Computer Security 14 (4), 301-325, 2006
1392006
Secure and efficient proof of storage with deduplication
Q Zheng, S Xu
Proceedings of the second ACM conference on Data and Application Security …, 2012
1342012
Social network-based botnet command-and-control: emerging threats and countermeasures
EJ Kartaltepe, JA Morales, S Xu, R Sandhu
International Conference on Applied Cryptography and Network Security, 511-528, 2010
982010
Accumulating composites and improved group signing
G Tsudik, S Xu
International Conference on the Theory and Application of Cryptology and …, 2003
962003
Characterizing honeypot-captured cyber attacks: Statistical framework and case study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013
862013
A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys (CSUR) 49 (4), 62, 2017
842017
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Workshop on Secure Data Management, 68-88, 2009
842009
Statistical predictive modeling and compensation of geometric deviations of three-dimensional printed products
Q Huang, H Nouri, K Xu, Y Chen, S Sosina, T Dasgupta
Journal of Manufacturing Science and Engineering 136 (6), 061008, 2014
742014
A stochastic model of multivirus dynamics
S Xu, W Lu, Z Zhan
IEEE Transactions on Dependable and Secure Computing 9 (1), 30-45, 2011
742011
A flexible framework for secret handshakes
G Tsudik, S Xu
International Workshop on Privacy Enhancing Technologies, 295-315, 2006
74*2006
VulDeePecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
arXiv preprint arXiv:1801.01681, 2018
712018
Push-and pull-based epidemic spreading in networks: Thresholds and deeper insights
S Xu, W Lu, L Xu
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (3), 32, 2012
692012
Adaptive epidemic dynamics in networks: Thresholds and control
S Xu, W Lu, L Xu, Z Zhan
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (4), 19, 2014
682014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20