Xuhua Ding
Cited by
Cited by
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
Anomaly based web phishing page detection
Y Pan, X Ding
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 381-392, 2006
A method for fast revocation of public key certificates and security capabilities
D Boneh, X Ding, G Tsudik, CM Wong
10th USENIX Security Symposium (USENIX Security 01), 2001
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
Protecting RFID communications in supply chains
Y Li, X Ding
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Simple identity-based cryptography with mediated RSA
X Ding, G Tsudik
Cryptographers’ Track at the RSA Conference, 193-210, 2003
Fine-grained control of security capabilities
D Boneh, X Ding, G Tsudik
ACM Transactions on Internet Technology (TOIT) 4 (1), 60-82, 2004
Remote attestation on program execution
L Gu, X Ding, RH Deng, B Xie, H Mei
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008
Private information retrieval using trusted hardware
S Wang, X Ding, RH Deng, F Bao
European Symposium on Research in Computer Security, 49-64, 2006
Embellishing text search queries to protect user privacy
HH Pang, X Ding, X Xiao
ACM 3 (1/2), 598, 2010
Experimenting with server-aided signatures
X Ding, D Mozzacchi, G Tsudik
Internet Society, 2002
Hardware-assisted fine-grained code-reuse attack detection
P Yuan, Q Zeng, X Ding
International Symposium on Recent Advances in Intrusion Detection, 66-85, 2015
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
Journal of Applied Cryptography 1 (4), 309, 2009
Leak-free group signatures with immediate revocation
X Ding, G Tsudik, S Xu
24th International Conference on Distributed Computing Systems, 2004 …, 2004
Efficient virtualization-based application protection against untrusted operating system
Y Cheng, X Ding, RH Deng
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
Identity-based mediated RSA
D Boneh, X Ding, G Tsudik
3rd Workshop on Information Security Application, Jeju Island, Korea 12, 2002
Efficient processing of exact top-k queries over disk-resident sorted lists
HH Pang, X Ding, B Zheng
The VLDB Journal 19 (3), 437-456, 2010
Privacy-preserving querying in sensor networks
E De Cristofaro, X Ding, G Tsudik
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20