Biblio

Export 26 results:
Sort by:
Filters: Author is Danfeng Yao  [Clear All Filters]
2015
Liu, F., X. Shu, D. Yao, and A. R. Butt, "Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce", Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, USA, March 2-4, 2015, pp. 195–206, 2015.
2014
Xu, K., D. Yao, M. A. Pérez-Quiñones, C. Link, and E. S. Geller, "Role-playing game for studying user behaviors in security: A case study on email secrecy", Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2014 International Conference on, pp. 18-26, Oct, 2014.
2013
Elish, K., Y. Deng, D. Yao, and D. Kafura, "Device-Based Isolation for Securing Cryptographic Keys", Third International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT 2013), Halifax, Nova Scotia, Canada, June 25-28, 2013.
2012
2011
Wang, Y., Z. Zhang, D. Yao, B. Qu, and L. Guo, "Inferring Protocol-State Machine from Network Traces: A Probabilistic Description Method", International Conference on Applied Cryptography and Network Security (ACNS), Malaga, Spain., Springer., 06/2011.
Butler, P., K. Xu, and D. Yao, "Quantitatively Analyzing Stealthy Communication Channels", International Conference on Applied Cryptography and Network Security (ACNS), Malaga Spain, Lecture Notes in Computer Science. Springer., 06/2011.
2010
Tamassia, R., D. Yao, and W. H. Winsborough, "Independently-Verifiable Decentralized Role-Based Delegation", IEEE Transactions on Systems, Man, and Cybernetics (SMC), Part A., vol. 40, no. 6, 11/2010.
Stefan, D., and D. Yao, "Keystroke-Dynamics Authentication Against Synthetic Forgeries", International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 11/2010.
Stefan, D., C. Wu, D. Yao, and G. Xu, "Knowing Where Your Input is From: Kernel-Level Provenance Verification", 8th International Conference on Applied Cryptography and Network Security (ACNS), Beijing China, pp. 71-87, 06/2010.
Chang, C. - C., B. Thompson, H. Wang, and D. Yao, "Towards Publishing Recommendation Data With Predictive Anonymization", ACM Symposium on Information, Computer \& Communication Security (AsiaCCS), Beijing China, ACM Press, 04/2010.
Ramstetter, J. R., Y. Yang, and D. Yao, "Applications and Security of Next-Generation User-Centric Wireless Systems.", Future Internet, Special Issue on Security for Next Generation Wireless and Decentralized Systems., vol. 2, pp. 109-211, 2010.
2009
Xiong, H., P. Malhortra, D. Stefan, C. Wu, and D. Yao, "User-Assisted Host-Based Detection of Outbound Malware Traffic", Proceedings of International Conference on Information and Communications Security (ICICS), Beijing China, 12/2009.
Babic, A., H. Xiong, D. Yao, and L. Iftode, "Building Robust Authentication Systems With Activity-Based Personal Questions", ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, IL, 11/2009.
Zarandioon, S., D. Yao, and V. Ganapathy, "Privacy-aware Identity Management for Client-side Mashup Applications", the Fifth ACM Workshop on Digital Identity Management (DIM)., Chicago, IL, 11/2009.
Vyas, N. H., A. Squicciarini, C. - C. Chang, and D. Yao, "Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations.", International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Washington, DC, 11/2009.
Chumash, T., and D. Yao, "Detection and Prevention of Insider Threats in Database Driven Web Services", The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM), West Lafayette, IN, pp. 117-132, 06/2009.
Thompson, B., and D. Yao, "Union-Split Clustering Algorithm and Social Network Anonymization", ACM Symposium on Information, Computer & Communication Security (ASIACCS), Sydney, Australia, 03/2009.
Yao, D., and R. Tamassia, "Compact and Anonymous Role-Based Authorization Chain", ACM Transactions on Information and System Security, vol. 12, issue 3, pp. 1 - 27, 01/2009.