Xuhua Ding
Title
Cited by
Cited by
Year
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
D Boneh, X Ding, G Tsudik, CM Wong
USENIX Security Symposium, 22-22, 2001
2792001
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
2692014
Anomaly based web phishing page detection
Y Pan, X Ding
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 381-392, 2006
2492006
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
2432008
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1972009
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1382007
Simple identity-based cryptography with mediated RSA
X Ding, G Tsudik
Cryptographers’ Track at the RSA Conference, 193-210, 2003
1342003
Fine-grained control of security capabilities
D Boneh, X Ding, G Tsudik
ACM Transactions on Internet Technology (TOIT) 4 (1), 60-82, 2004
1122004
Remote attestation on program execution
L Gu, X Ding, RH Deng, B Xie, H Mei
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008
902008
Private information retrieval using trusted hardware
S Wang, X Ding, RH Deng, F Bao
European Symposium on Research in Computer Security, 49-64, 2006
902006
Experimenting with server-aided signatures
X Ding, D Mozzacchi, G Tsudik
Internet Society, 2002
602002
Embellishing text search queries to protect user privacy
HH Pang, X Ding, X Xiao
ACM 3 (1/2), 598, 2010
532010
Leak-free group signatures with immediate revocation
X Ding, G Tsudik, S Xu
24th International Conference on Distributed Computing Systems, 2004 …, 2004
382004
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
International Journal of Applied Cryptography 1 (4), 309-319, 2009
372009
Hardware-assisted fine-grained code-reuse attack detection
P Yuan, Q Zeng, X Ding
International Symposium on Recent Advances in Intrusion Detection, 66-85, 2015
332015
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
312013
Identity-based mediated RSA
D Boneh, X Ding, G Tsudik
3rd Workshop on Information Security Application, Jeju Island, Korea 12, 2002
312002
Efficient virtualization-based application protection against untrusted operating system
Y Cheng, X Ding, RH Deng
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
302015
A scalable and format-compliant encryption scheme for H. 264/SVC bitstreams
Z Wei, Y Wu, X Ding, RH Deng
Signal Processing: Image Communication 27 (9), 1011-1024, 2012
282012
Efficient processing of exact top-k queries over disk-resident sorted lists
H Pang, X Ding, B Zheng
The VLDB Journal 19 (3), 437-456, 2010
282010
The system can't perform the operation now. Try again later.
Articles 1–20