Export 20 results:
Sort by: Filters: Author is Danfeng Yao [Clear All Filters]
"Device-Based Isolation for Securing Cryptographic Keys",
Third International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT 2013), Halifax, Nova Scotia, Canada, June 25-28, 2013.
"Identifying Native Applications With High Assurance",
CODASPY'12, San Antonio, TX, February, 2012.
Abstract
"Inferring Protocol-State Machine from Network Traces: A Probabilistic Description Method",
International Conference on Applied Cryptography and Network Security (ACNS), Malaga, Spain., Springer., 06/2011.
"Quantitatively Analyzing Stealthy Communication Channels",
International Conference on Applied Cryptography and Network Security (ACNS), Malaga Spain, Lecture Notes in Computer Science. Springer., 06/2011.
"Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises",
Journal of Contingencies and Crisis Management, vol. 18, no. 4, 12/2010.
"Independently-Verifiable Decentralized Role-Based Delegation",
IEEE Transactions on Systems, Man, and Cybernetics (SMC), Part A., vol. 40, no. 6, 11/2010.
"Keystroke-Dynamics Authentication Against Synthetic Forgeries",
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 11/2010.
"Knowing Where Your Input is From: Kernel-Level Provenance Verification",
8th International Conference on Applied Cryptography and Network Security (ACNS), Beijing China, pp. 71-87, 06/2010.
"Towards Publishing Recommendation Data With Predictive Anonymization",
ACM Symposium on Information, Computer \& Communication Security (AsiaCCS), Beijing China, ACM Press, 04/2010.
"Applications and Security of Next-Generation User-Centric Wireless Systems.",
Future Internet, Special Issue on Security for Next Generation Wireless and Decentralized Systems., vol. 2, pp. 109-211, 2010.
"User-Assisted Host-Based Detection of Outbound Malware Traffic",
Proceedings of International Conference on Information and Communications Security (ICICS), Beijing China, 12/2009.
"Building Robust Authentication Systems With Activity-Based Personal Questions",
ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, IL, 11/2009.
"Privacy-aware Identity Management for Client-side Mashup Applications",
the Fifth ACM Workshop on Digital Identity Management (DIM)., Chicago, IL, 11/2009.
"Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations.",
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Washington, DC, 11/2009.
"Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases",
the 9th Privacy Enhancing Technologies Symposium (PETS), Seatte, WA, 08/2009.
"Detection and Prevention of Insider Threats in Database Driven Web Services",
The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM), West Lafayette, IN, pp. 117-132, 06/2009.
"Union-Split Clustering Algorithm and Social Network Anonymization",
ACM Symposium on Information, Computer & Communication Security (ASIACCS), Sydney, Australia, 03/2009.
"Compact and Anonymous Role-Based Authorization Chain",
ACM Transactions on Information and System Security, vol. 12, issue 3, pp. 1 - 27, 01/2009.
"Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes",
Identity-Based Cryptography: IOS Press, 2009.
