Year |
Citation |
Score |
2018 |
Zhao S, Ding X. FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems Acm Transactions On Information and System Security. 21: 15. DOI: 10.1145/3195181 |
0.407 |
|
2018 |
Ding X, Tsudik G. Initializing trust in smart devices via presence attestation Computer Communications. 131: 35-38. DOI: 10.1016/J.Comcom.2018.07.004 |
0.583 |
|
2017 |
Wang Y, Pang HH, Yang Y, Ding X. Secure server-aided top-k monitoring Information Sciences. 420: 345-363. DOI: 10.1016/J.Ins.2017.08.068 |
0.463 |
|
2014 |
Pang H, Ding X. Privacy-preserving ad-hoc Equi-join on outsourced data Acm Transactions On Database Systems. 39. DOI: 10.1145/2629501 |
0.403 |
|
2014 |
Wei Z, Wu Y, Deng RH, Ding X. A Hybrid Scheme for Authenticating Scalable Video Codestreams Ieee Transactions On Information Forensics and Security. 9: 543-553. DOI: 10.1109/Tifs.2014.2301916 |
0.357 |
|
2014 |
Zhao Y, Lo S, Deng RH, Ding X. Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks Journal of Computer and System Sciences. 80: 520-532. DOI: 10.1016/J.Jcss.2013.06.008 |
0.396 |
|
2014 |
Deng RH, Ding X, Wu Y, Wei Z. Efficient block-based transparent encryption for H.264/SVC bitstreams Multimedia Systems. 20: 165-178. DOI: 10.1007/S00530-013-0326-0 |
0.319 |
|
2014 |
Deng RH, Ding X, Lo S. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks Security and Communication Networks. 7: 611-625. DOI: 10.1002/Sec.762 |
0.454 |
|
2013 |
Cheng Y, Ding X, Deng RH. DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows Acm Transactions On Information and System Security. 16: 6. DOI: 10.1145/2505123 |
0.425 |
|
2012 |
Wei Z, Wu Y, Ding X, Deng RH. A scalable and format-compliant encryption scheme for H.264/SVC bitstreams Signal Processing-Image Communication. 27: 1011-1024. DOI: 10.1016/J.Image.2012.06.005 |
0.408 |
|
2011 |
Ding X, Yang Y, Deng RH. Database Access Pattern Protection Without Full-Shuffles Ieee Transactions On Information Forensics and Security. 6: 189-201. DOI: 10.1109/Tifs.2010.2101062 |
0.426 |
|
2010 |
Ding X, Yang Y, Deng RH, Wang S. A new hardware-assisted PIR with O( n ) shuffle cost International Journal of Information Security. 9: 237-252. DOI: 10.1007/S10207-010-0105-2 |
0.335 |
|
2009 |
Ding X, Tsudik G, Xu S. Leak-free mediated group signatures Journal of Computer Security. 17: 489-514. DOI: 10.3233/Jcs-2009-0342 |
0.564 |
|
2009 |
Yang Y, Bao F, Ding X, Deng RH. Multiuser private queries over encrypted databases International Journal of Applied Cryptography. 1: 309-319. DOI: 10.1504/Ijact.2009.028029 |
0.487 |
|
2009 |
Zheng B, Lee WC, Liu P, Lee DL, Ding X. Tuning on-air signatures for balancing performance and confidentiality Ieee Transactions On Knowledge and Data Engineering. 21: 1783-1797. DOI: 10.1109/Tkde.2009.43 |
0.38 |
|
2007 |
Ding X, Mazzocchi D, Tsudik G. Equipping smart devices with public key signatures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1189740.1189743 |
0.545 |
|
2004 |
Boneh D, Ding X, Tsudik G. Fine-grained control of security capabilities Acm Transactions On Internet Technology. 4: 60-82. DOI: 10.1145/967030.967033 |
0.562 |
|
Show low-probability matches. |