Return to Skip Menu
Export 20 results:Sort by:
Filters: Author is Danfeng Yao [Clear All Filters]
"Device-Based Isolation for Securing Cryptographic Keys", Third International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT 2013), Halifax, Nova Scotia, Canada, June 25-28, 2013.
"Inferring Protocol-State Machine from Network Traces: A Probabilistic Description Method", International Conference on Applied Cryptography and Network Security (ACNS), Malaga, Spain., Springer., 06/2011.
"Quantitatively Analyzing Stealthy Communication Channels", International Conference on Applied Cryptography and Network Security (ACNS), Malaga Spain, Lecture Notes in Computer Science. Springer., 06/2011.
"Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises", Journal of Contingencies and Crisis Management, vol. 18, no. 4, 12/2010.
"Independently-Verifiable Decentralized Role-Based Delegation", IEEE Transactions on Systems, Man, and Cybernetics (SMC), Part A., vol. 40, no. 6, 11/2010.
"Keystroke-Dynamics Authentication Against Synthetic Forgeries", International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 11/2010.
"Knowing Where Your Input is From: Kernel-Level Provenance Verification", 8th International Conference on Applied Cryptography and Network Security (ACNS), Beijing China, pp. 71-87, 06/2010.
"Towards Publishing Recommendation Data With Predictive Anonymization", ACM Symposium on Information, Computer \& Communication Security (AsiaCCS), Beijing China, ACM Press, 04/2010.
"Applications and Security of Next-Generation User-Centric Wireless Systems.", Future Internet, Special Issue on Security for Next Generation Wireless and Decentralized Systems., vol. 2, pp. 109-211, 2010.
"User-Assisted Host-Based Detection of Outbound Malware Traffic", Proceedings of International Conference on Information and Communications Security (ICICS), Beijing China, 12/2009.
"Building Robust Authentication Systems With Activity-Based Personal Questions", ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, IL, 11/2009.
"Privacy-aware Identity Management for Client-side Mashup Applications", the Fifth ACM Workshop on Digital Identity Management (DIM)., Chicago, IL, 11/2009.
"Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations.", International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Washington, DC, 11/2009.
"Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases", the 9th Privacy Enhancing Technologies Symposium (PETS), Seatte, WA, 08/2009.
"Detection and Prevention of Insider Threats in Database Driven Web Services", The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM), West Lafayette, IN, pp. 117-132, 06/2009.
"Union-Split Clustering Algorithm and Social Network Anonymization", ACM Symposium on Information, Computer & Communication Security (ASIACCS), Sydney, Australia, 03/2009.
"Compact and Anonymous Role-Based Authorization Chain", ACM Transactions on Information and System Security, vol. 12, issue 3, pp. 1 - 27, 01/2009.
"Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes", Identity-Based Cryptography: IOS Press, 2009.