Xuhua Ding
Title
Cited by
Cited by
Year
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
D Boneh, X Ding, G Tsudik, CM Wong
USENIX Security Symposium, 22-22, 2001
2792001
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
2672014
Anomaly based web phishing page detection
Y Pan, X Ding
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 381-392, 2006
2462006
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
2412008
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1932009
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1382007
Simple identity-based cryptography with mediated RSA
X Ding, G Tsudik
Cryptographers’ Track at the RSA Conference, 193-210, 2003
1342003
Fine-grained control of security capabilities
D Boneh, X Ding, G Tsudik
ACM Transactions on Internet Technology (TOIT) 4 (1), 60-82, 2004
1102004
Private information retrieval using trusted hardware
S Wang, X Ding, RH Deng, F Bao
European Symposium on Research in Computer Security, 49-64, 2006
902006
Remote attestation on program execution
L Gu, X Ding, RH Deng, B Xie, H Mei
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008
892008
Experimenting with server-aided signatures
X Ding, D Mozzacchi, G Tsudik
Internet Society, 2002
602002
Embellishing text search queries to protect user privacy
HH Pang, X Ding, X Xiao
ACM 3 (1/2), 598, 2010
522010
Leak-free group signatures with immediate revocation
X Ding, G Tsudik, S Xu
24th International Conference on Distributed Computing Systems, 2004 …, 2004
382004
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
International Journal of Applied Cryptography 1 (4), 309-319, 2009
372009
Hardware-assisted fine-grained code-reuse attack detection
P Yuan, Q Zeng, X Ding
International Symposium on Recent Advances in Intrusion Detection, 66-85, 2015
332015
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
312013
Identity-based mediated RSA
D Boneh, X Ding, G Tsudik
3rd Workshop on Information Security Application, Jeju Island, Korea 12, 2002
302002
A scalable and format-compliant encryption scheme for H. 264/SVC bitstreams
Z Wei, Y Wu, X Ding, RH Deng
Signal Processing: Image Communication 27 (9), 1011-1024, 2012
282012
Efficient processing of exact top-k queries over disk-resident sorted lists
H Pang, X Ding, B Zheng
The VLDB Journal 19 (3), 437-456, 2010
282010
Privacy-preserving querying in sensor networks
E De Cristofaro, X Ding, G Tsudik
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
282009
The system can't perform the operation now. Try again later.
Articles 1–20