Follow
Xuhua Ding
Title
Cited by
Cited by
Year
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
3442014
A method for fast revocation of public key certificates and security capabilities
D Boneh, X Ding, G Tsudik, CM Wong
10th USENIX Security Symposium (USENIX Security 01), 2001
3032001
Anomaly based web phishing page detection
Y Pan, X Ding
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 381-392, 2006
2952006
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
2902008
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
2322009
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1482007
Simple identity-based cryptography with mediated RSA
X Ding, G Tsudik
Cryptographers¢ Track at the RSA Conference, 193-210, 2003
1422003
Fine-grained control of security capabilities
D Boneh, X Ding, G Tsudik
ACM Transactions on Internet Technology (TOIT) 4 (1), 60-82, 2004
1242004
Remote attestation on program execution
L Gu, X Ding, RH Deng, B Xie, H Mei
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008
992008
Private information retrieval using trusted hardware
S Wang, X Ding, RH Deng, F Bao
European Symposium on Research in Computer Security, 49-64, 2006
992006
Embellishing text search queries to protect user privacy
HH Pang, X Ding, X Xiao
ACM 3 (1/2), 598, 2010
642010
Experimenting with server-aided signatures
X Ding, D Mozzacchi, G Tsudik
Internet Society, 2002
632002
Hardware-assisted fine-grained code-reuse attack detection
P Yuan, Q Zeng, X Ding
International Symposium on Recent Advances in Intrusion Detection, 66-85, 2015
502015
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
International Journal of Applied Cryptography 1 (4), 309-319, 2009
432009
Leak-free group signatures with immediate revocation
X Ding, G Tsudik, S Xu
24th International Conference on Distributed Computing Systems, 2004 …, 2004
422004
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
362013
Efficient virtualization-based application protection against untrusted operating system
Y Cheng, X Ding, RH Deng
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
342015
Identity-based mediated RSA
D Boneh, X Ding, G Tsudik
3rd Workshop on Information Security Application, Jeju Island, Korea 12, 2002
332002
Efficient processing of exact top-k queries over disk-resident sorted lists
HH Pang, X Ding, B Zheng
The VLDB Journal 19 (3), 437-456, 2010
312010
A scalable and format-compliant encryption scheme for H. 264/SVC bitstreams
Z Wei, Y Wu, X Ding, RH Deng
Signal Processing: Image Communication 27 (9), 1011-1024, 2012
292012
The system can't perform the operation now. Try again later.
Articles 1–20