Di Ma
Cited by
Cited by
A new approach to secure logging
D Ma, G Tsudik
ACM Transactions on Storage (TOS) 5 (1), 1-21, 2009
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
Forward-secure sequential aggregate authentication
D Ma, G Tsudik
2007 IEEE Symposium on Security and Privacy (SP'07), 86-91, 2007
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, AK Prasad, N Saxena, T Xiang
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
B Zhang, Q Zhan, S Chen, M Li, K Ren, C Wang, D Ma
IEEE internet of things journal 1 (1), 33-45, 2014
Security and privacy in emerging wireless networks
D Ma, G Tsudik
IEEE Wireless Communications 17 (5), 12-21, 2010
Rapid prototyping applications in medicine. Part 1: NURBS-based volume modelling
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18 (2), 103-117, 2001
Roles of astrocytic connexin-43, hemichannels, and gap junctions in oxygen-glucose deprivation/reperfusion injury induced neuroinflammation and the possible regulatory …
X Yin, L Feng, D Ma, P Yin, X Wang, S Hou, Y Hao, J Zhang, M Xin, ...
Journal of neuroinflammation 15 (1), 1-24, 2018
Rapid prototyping applications in medicine. Part 2: STL file generation and case studies
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18 (2), 118-127, 2001
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
Risk assessment for cooperative automated driving
D Dominic, S Chhawri, RM Eustice, D Ma, A Weimerskirch
Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016
Dish: Distributed self-healing
D Ma, G Tsudik
Symposium on Self-Stabilizing Systems, 47-62, 2008
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
Practical forward secure sequential aggregate signatures
D Ma
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Privacy leakage via de-anonymization and aggregation in heterogeneous social networks
H Li, Q Chen, H Zhu, D Ma, H Wen, XS Shen
IEEE Transactions on Dependable and Secure Computing 17 (2), 350-362, 2017
An intelligent intrusion detection system
N Kaja, A Shaout, D Ma
Applied Intelligence 49 (9), 3235-3247, 2019
Enabling secure location-based services in mobile cloud computing
Y Zhu, D Ma, D Huang, C Hu
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 27-32, 2013
How to use attribute-based encryption to implement role-based access control in the cloud
Y Zhu, D Ma, CJ Hu, D Huang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20