Xuhua Ding
Cited by
Cited by
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
A method for fast revocation of public key certificates and security capabilities
D Boneh, X Ding, G Tsudik, CM Wong
10th USENIX Security Symposium (USENIX Security 01), 2001
Anomaly based web phishing page detection
Y Pan, X Ding
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 381-392, 2006
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Simple identity-based cryptography with mediated RSA
X Ding, G Tsudik
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
Fine-grained control of security capabilities
D Boneh, X Ding, G Tsudik
ACM Transactions on Internet Technology (TOIT) 4 (1), 60-82, 2004
Remote attestation on program execution
L Gu, X Ding, RH Deng, B Xie, H Mei
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008
Private information retrieval using trusted hardware
S Wang, X Ding, RH Deng, F Bao
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
Embellishing text search queries to protect user privacy
HH Pang, X Ding, X Xiao
ACM 3 (1/2), 598, 2010
Hardware-assisted fine-grained code-reuse attack detection
P Yuan, Q Zeng, X Ding
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
Experimenting with server-aided signatures
X Ding, D Mozzacchi, G Tsudik
Internet Society, 2002
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
International Journal of Applied Cryptography 1 (4), 309-319, 2009
Efficient virtualization-based application protection against untrusted operating system
Y Cheng, X Ding, RH Deng
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Leak-free group signatures with immediate revocation
X Ding, G Tsudik, S Xu
24th International Conference on Distributed Computing Systems, 2004 …, 2004
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
Identity-based mediated RSA
D Boneh, X Ding, G Tsudik
3rd Workshop on Information Security Application, Jeju Island, Korea 12, 2002
Efficient processing of exact top-k queries over disk-resident sorted lists
HH Pang, X Ding, B Zheng
The VLDB Journal 19, 437-456, 2010
A scalable and format-compliant encryption scheme for H. 264/SVC bitstreams
Z Wei, Y Wu, X Ding, RH Deng
Signal Processing: Image Communication 27 (9), 1011-1024, 2012
The system can't perform the operation now. Try again later.
Articles 1–20