Xuhua Ding, Ph.D. - Publications

Affiliations: 
2003 University of Southern California, Los Angeles, CA, United States 
Area:
Computer Science

17 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Zhao S, Ding X. FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems Acm Transactions On Information and System Security. 21: 15. DOI: 10.1145/3195181  0.407
2018 Ding X, Tsudik G. Initializing trust in smart devices via presence attestation Computer Communications. 131: 35-38. DOI: 10.1016/J.Comcom.2018.07.004  0.583
2017 Wang Y, Pang HH, Yang Y, Ding X. Secure server-aided top-k monitoring Information Sciences. 420: 345-363. DOI: 10.1016/J.Ins.2017.08.068  0.463
2014 Pang H, Ding X. Privacy-preserving ad-hoc Equi-join on outsourced data Acm Transactions On Database Systems. 39. DOI: 10.1145/2629501  0.403
2014 Wei Z, Wu Y, Deng RH, Ding X. A Hybrid Scheme for Authenticating Scalable Video Codestreams Ieee Transactions On Information Forensics and Security. 9: 543-553. DOI: 10.1109/Tifs.2014.2301916  0.357
2014 Zhao Y, Lo S, Deng RH, Ding X. Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks Journal of Computer and System Sciences. 80: 520-532. DOI: 10.1016/J.Jcss.2013.06.008  0.396
2014 Deng RH, Ding X, Wu Y, Wei Z. Efficient block-based transparent encryption for H.264/SVC bitstreams Multimedia Systems. 20: 165-178. DOI: 10.1007/S00530-013-0326-0  0.319
2014 Deng RH, Ding X, Lo S. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks Security and Communication Networks. 7: 611-625. DOI: 10.1002/Sec.762  0.454
2013 Cheng Y, Ding X, Deng RH. DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows Acm Transactions On Information and System Security. 16: 6. DOI: 10.1145/2505123  0.425
2012 Wei Z, Wu Y, Ding X, Deng RH. A scalable and format-compliant encryption scheme for H.264/SVC bitstreams Signal Processing-Image Communication. 27: 1011-1024. DOI: 10.1016/J.Image.2012.06.005  0.408
2011 Ding X, Yang Y, Deng RH. Database Access Pattern Protection Without Full-Shuffles Ieee Transactions On Information Forensics and Security. 6: 189-201. DOI: 10.1109/Tifs.2010.2101062  0.426
2010 Ding X, Yang Y, Deng RH, Wang S. A new hardware-assisted PIR with O( n ) shuffle cost International Journal of Information Security. 9: 237-252. DOI: 10.1007/S10207-010-0105-2  0.335
2009 Ding X, Tsudik G, Xu S. Leak-free mediated group signatures Journal of Computer Security. 17: 489-514. DOI: 10.3233/Jcs-2009-0342  0.564
2009 Yang Y, Bao F, Ding X, Deng RH. Multiuser private queries over encrypted databases International Journal of Applied Cryptography. 1: 309-319. DOI: 10.1504/Ijact.2009.028029  0.487
2009 Zheng B, Lee WC, Liu P, Lee DL, Ding X. Tuning on-air signatures for balancing performance and confidentiality Ieee Transactions On Knowledge and Data Engineering. 21: 1783-1797. DOI: 10.1109/Tkde.2009.43  0.38
2007 Ding X, Mazzocchi D, Tsudik G. Equipping smart devices with public key signatures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1189740.1189743  0.545
2004 Boneh D, Ding X, Tsudik G. Fine-grained control of security capabilities Acm Transactions On Internet Technology. 4: 60-82. DOI: 10.1145/967030.967033  0.562
Show low-probability matches.