Shouhuai Xu (PhD: Fudan University,
Full Professor, Department of Computer Science, University of Texas at San
I direct the Laboratory for Cybersecurity
office: PNB 3.342
Department of Computer Science
University of Texas at San Antonio
One UTSA Circle
San Antonio, TX 78249
- (4/2015) One paper accepted to IEEE
T-IFS and one paper accepted to PLoS One.
- (4/2015) Yes, our paper won Taylor
& Francis Mathematics & Statistics Readers' Award 2015! Thank those
who read it and we hope you liked it!!
- (3/2015) Our paper entitled Cyber
Epidemic Models with Dependences published in Internet Mathematics is
shortlisted for Taylor & Francis Mathematics & Statistics Readers'
Award 2015! Only one paper is selected from each of the Mathematics &
Statistics journals published by Taylor & Francis. Please
feel free to download the paper from here!
- (2/2015) One paper accepted to
- (11/2014) The website for our Laboratory for Cybersecurity
Dynamics (LCD) is finally up!
- (11/2014) Our Cybersecurity
Posture paper accepted to InTrust'14!
- I will serve as a PC co-Chair for NSS'15 in New York City!---Please submit good papers (deadline extended to: 4/25/2015;
highlight: Proceedings published by Springer's Lecture Notes in Computer
Science; papers selected from the proceedings will be invited to submit to
two SCI-indexed journals)
- Several papers to appear in various
- I will be promoted to Full Professor
effective on 9/1/2014!
- (6/2014) One paper accepted to IEEE CNS
- (5/2014) Li Xu successfully defended
his PhD Thesis. His first employment: Security Engineer, Yahoo! Labs.
- (5/2014) Zhenxin
Zhan successfully defended his PhD Thesis. His first employment: Security
Researcher, Junipers Networks. Congrats!
- (4/2014) Qingji successfully
defended his PhD Thesis. His first employment: Staff Researcher, Huawei Research Center in San Jose. Congrats!
- (3/2014) Two papers and two posters
accepted to HotSoS'14.
- (3/2014) Qingji
Zheng won UTSA's Graduate Research Award.
- (3/2014) One paper accepted to
- (2/2014) I was invited to join the
Editorial Board of IEEE TIFS (term: 3/16/2014
- (1/2014) I was re-appointed to the
Editorial Board of IEEE TDSC for the 2nd term.
Dynamics: A Foundation for the Science of Cybersecurity
(click the link)
v Cybersecurity Mechanisms:
Moving-Target Defense; Defense Against Malware/Botnets/APT;
Trustworthy Cloud Computing (Cryptographic
Multi-Party Computing, Storage, Systems); Assured Information Sharing and
Cybersecurity Dynamics. Funded by ARO (Sept. 2013 -- June 2014; this is a
A Statistical Framework for Analyzing Cyber Threats. Funded by ARO (June
2013 -- May 2016)
Theoretical Framework for Cyber Defense Operations. Funded by ARO (July
2012 -- June 2015)
TC: Large: Collaborative Research: Privacy-Enhanced Secure Data
Provenance. Funded by NSF (Sept. 2011 -- Aug. 2016)
IAPD: Integrated Adaptive and Proactive Defense against Stealthy Botnets.
Funded by AFOSR (March 2009 -- Oct. 2012)
AFOSR MURI: A Framework for Managing the Assured Information Sharing
Lifecycle (July 2008 -- June 2013)
Securing the Smart Power Grid. Funded by UTSA (Sept. 2010 -- Aug. 2011)
A Systematic Defense Framework for Combating Botnets. Funded by ONR (April
2009 -- Dec. 2010)
- PI. Modeling Cyber Attacks.
Funded by UTSA (Nov. 2008 -- Nov. 2009)
Collaborative Research: Secure Knowledge Management: Models and
Mechanisms, funded by NSF CyberTrust (9/1/2005
SuE: A Framework for Survivable Tactical
Information Systems, Funded by Army Research (4/15/2005 -- 1/14/2008)
Survivability Analysis for Cryptographic Key Infrastructures in MANETS,
Funded by UTSA (9/1/2006 -- 12/31/2007)
Countering Malicious and Fast-Spreading Malicious Codes, Funded by UTSA
Center for Infrastructure Assurance and Security (6/1/2004 -- 8/31/2006)
I am always
seeking highly motivated PhD students who have a strong desire to pursue
excellent PhD work.
PhD/MS Students I supervise
Garcia Lebron (PhD)
students I supervised with Thesis
Li Xu (PhD
Thesis: Characterizing and Detecting Malicious Websites), May 2014. First
employment: Research Engineer, Yahoo! Labs
Zhenxin Zhan (PhD Thesis: A Statistical Framework for
Analyzing Cyber Threats), May 2014. First Employment: Security Researcher,
Qingji Zheng (PhD
Thesis: Verifiable Delegation of Computing over Outsourced Data), April 2014.
First Employment: Staff Researcher, Huawei Research
Center in San Jose, CA
Paul Parker (PhD
Thesis: Protecting Cryptographic Keys and Functions from Software-based
Attacks), Dec 2010. First employment: Assistant Professor at Dallas Baptist
Asma Alshehri (MS
Thesis: A Study on Complex Network Resilience), Dec. 2013. (Asma is now PhD
student at UTSA)
Adam Tyra (MS Thesis: A Characterization of Complex Network
Attack Resilience), Dec. 2012. (Adam was a part-time student.)
Valle (Masters Thesis: Protecting Cryptographic Keys
from Memory Disclosure Attacks), May 2010. First employment: Rackspace
Erhan John Kartaltepe (Masters Thesis: Malicious Impostor Emails: Emerging Threats
and Countermeasures), April 2006. First employment: SouthWest
Thesis Committees I Served
Yiming Han (CS@UTSA), PhD Thesis: Hierarchical Distributed
Loop Self-Scheduling Schemes on Cluster and Cloud Systems, Defended in April
(CS@UTSA), PhD Thesis: Access Control for Online Social Networks Using
Relationship Type Patterns. Defended in April 2014.
Pengjun Pan. PhD Thesis: Energy-efficient Secure and
Anonymous Communication Protocols for Wireless Sensor Networks. May 2013.
Weisong Tian (ECE). PhD Thesis: Generalized Homogeneous
Methodologies and New Solutions to Control Problems of Nonlinear Systems. April
Hongwei Tian. PhD Thesis: Privacy-preserving Data Mining Through Data Publishing and Knowledge Model Sharing. 2012
Lijie Zhang. PhD Thesis: Privacy-Preservation in Social
Ruting Jia (ECE). PhD Thesis: Semi-global Stabilization of
Nonlinear Systems via Output Feedback and Sampled-Data Controls with
Applications to Power Systems. 2012.
CS 6393 SP: Cyber Security (Spring 2015; Graduate)
CS 4363 Cryptography (Spring 2015; Undergraduate)
CS 5323 Principles of
Information Security (Fall 2014; Graduate)
CS 4593 Cloud Security (Spring 2014; Undergraduate)
CS 4363 Cryptography (Fall 2013; Undergraduate)
CS 6353 Unix
and Network Security (Spring 2013; Graduate)
CS 4363 Cryptography (Spring 2013; Undergraduate)
CS 6393 AT: Cyber Security (Fall 2012; Graduate)
CS 4363 Cryptography (Spring
CS 2233 Discrete
Mathematical Structures (Spring 2012; Undergraduate)
CS 6373 Applied Cryptography (Fall
CS 4363 Cryptography (Spring 2011; Undergraduate)
CS 2233 Discrete
Mathematical Structures (Spring 2011; Undergraduate)
CS 6393 AT: Cyber Security (Fall 2010; Graduate)
CS 4363 Cryptography (Spring 2010;
CS 6373 Applied Cryptography (Fall 2009;
CS 4363 Cryptography (Spring 2009;
CS 6373 Applied Cryptography (Fall 2008;
CS 4363 Cryptography (Spring 2008; Undergraduate)
CS 6393 Advanced Topics in Computer
Security: Reliable and Secure Distributed Systems (Fall 2007; Graduate)
CS 4363 Cryptography (Spring 2007;
CS 6463 AT: Applied Cryptography (Fall
CS 4363 Cryptography (Spring 2006;
CS 6973 Special Problems: Applied
Cryptography (Fall 2005; Graduate)
CS 4363 Cryptography (Spring 2005;
6973 Principles of Information Security (Fall 2004; Graduate)
4363 Cryptography (Spring 2004; Undergraduate)
CS 6973 Special Problems: Applied
Cryptography (Fall 2003; Graduate)
Editor or Member of Editorial Baord:
as a program (co-)chair of the following conferences/workshops:
9th International Conference on Network and System Security (NSS'15)
---Nov. 3-5, 2015 in New York City
o The 9th China
International Conference on Information Security and Cryptology (Inscrypt'13)
o 2013 ACM Asia Public-Key
Cryptography Workshop (AsiaPKC 2013)
o The Second ACM Workshop on
Scalable Trusted Computing (STC'07)
o The First ACM Workshop on Scalable
Trusted Computing (STC'06)
as a program committee member of the following
as a reviewer of the following journals/books:
- ACM Computing Survey
- IEEE/ACM Transactions on Networking (IEEE/ACM ToN)
- ACM Transactions on Sensor Networks (ACM ToSN)
- ACM Mobile Computing and Communications Review
- IEEE Transactions on Parallel and Distributed
Systems (IEEE TPDS)
- ACM Transactions on Information and System
Security (ACM TISSEC)
- IEEE Journal on Selected Areas in
Communications (IEEE JSAC)
- IEEE Transaction on Dependable and Secure
Computing (IEEE TDSC)
- IEEE Transactions on Computers (IEEE ToC)
- IEEE Transactions on Wireless Communication
- IEEE Transactions on Information Security &
Forensics (IEEE TIFS)
- Journla of Computer Security
- International Journal of Information Security
- IEEE Communication Letters
- Elsevier Ad Hoc Networks Journal
- IET Proceedings Information Security
- The Handbook of Information Security (John Wiley
\& Sons, Inc.)
Copyright notice: The
copyright of the papers available online had already been transferred to the
corresponding organizations or presses. Most of the recent papers can be
downloaded at http://www.cs.utsa.edu/~shxu/socs/
- (new) Z. Zhan, M. Xu, and S. Xu. Analyzing the
Extreme-Value Phenomenon Exhibited by Honeypot-Captured
Cyber Attacks. Accepted to IEEE T-IFS.
- (new) Y. Chen, Z. Huang,
S. Xu and Y. Lai. Spatiotemporal patterns and predictability of cyberattacks. Accepted to PLoS
- (new) R. Zheng, W. Lu and
S. Xu. Active Cyber Defense Dynamics Exhibiting Rich Phenomena.
2015 Symposium and Bootcamp on the Science of Security (HotSoS'15)
- (new) Q. Zheng and S. Xu.
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted
Data. Proc. of 2015 IEEE
International Conference on Cloud Engineering (IC2E).
- Z. Zhan, M. Xu, and S.
Xu. A Characterization of Cybersecurity Posture
from Network Telescope Data. Proceedings of The 6th
International Conference on Trustworthy Systems (InTrust'14), to appear.
- S. Xu, E. Ratazzi, and W. Du. Security Architecture for
Federated Mobile Cloud Computing. Book chapter in 2015 Springer book
entitled ``Mobile Cloud Security." (40+ pages)
- M. Saleh, P. Ratazzi, and S. Xu. Instructions-based Detection of
Sophisticated Obfuscation and Packing. Proceedings of IEEE MILCOM'14,
accepted for publication.
- W. Dai, H. Jin, D. Zou, S. Xu, W.
Zheng, L. Shi, and L. Yang. TEE: A Virtual DRTM Based Execution Environment
for Secure Cloud-End Computing. Future Generation Computer Systems,
accepted to appear.
- This is the fuller
version of "TEE: a virtual DRTM based execution environment for
secure cloud-end computing, " a poster appeared in Proceedings of
ACM CCS'2012, pp 663-665
- E. Bertino, G. Ghinita,
M. Kantarcioglu, D. Nguyen, J. Park, R. Sandhu, S. Sultana, B.
Thuraisingham, and S. Xu. A roadmap for privacy-enhanced secure data
provenance. Journal of Intelligent Information Systems, 2014, pp 1-21.
- L. Xu, Z. Zhan, S. Xu, and K. Ye. An Evasion and
Counter-Evasion Study in Malicious Websites Detection. IEEE 2014
Conference on Communications and Network Security (IEEE CNS'14).
Han, W. Lu and S. Xu. Characterizing the Power of Moving Target Defense via Cyber Epidemic
Symposium and Bootcamp on the Science of
Da, M. Xu and S. Xu. A New Approach to Modeling and Analyzing Security of Networked
Symposium and Bootcamp on the Science of
- S. Xu. Cybersecurity
Dynamics (poster). 2014
Symposium and Bootcamp on the Science of
- S. Xu. Emergent Behavior in Cybersecurity (poster). 2014
Symposium and Bootcamp on the Science of
- M. Xu, G. Da, and S. Xu. Cyber Epidemic
Models with Dependencies. Internet Mathematics.
- Taylor & Francis Mathematics & Statistics Readers'
Liu, W. Shi, S. Xu, and Z. Lin. Programmable decoder and shadow threads:
Tolerate remote code injection exploits with diversified redundancy.
Zheng, S. Xu, and G. Ateniese. VABKS: Verifiable Attribute-based Keyword
Search over Outsourced Encrypted Data. Infocom'14.
Xu, W. Lu, L. Xu, and Z. Zhan. Adaptive Epidemic Dynamics in Networks:
Thresholds and Control. ACM Transactions on Autonomous and Adaptive
Systems (TAAS), 8(4), Article 19, 2014
- This paper was accepted a long-time ago
but appeared just now.
Lu, S. Xu, and X. Yi. Optimizing Active Cyber Defense. The 4th
Conference on Decision and Game Theory for Security (GameSec'13).
Xu, W. Lu, and H. Li, A Stochastic Model of
Active Cyber Defense Dynamics. To appear in Internet Mathematics.
Zhan, M. Xu, and S. Xu. Characterizing Honeypot-Captured
Cyber Attacks: Statistical Framework and Case Study. IEEE Transactions on
Information Forensics & Security (IEEE TIFS), 8(11): 1775-1789 (2013).
Xu, Z. Zhan, S. Xu, and K. Ye. Cross-Layer Detection of Malicious
Websites. Proceedings of the Third ACM Conference on Data and Application
Security and Privacy (ACM CODASPY'13).
Wen, J. Lee, Z. Liu, Q. Zheng, W. Shi, S. Xu,
and T. Suh. Multi-processor architectural
support for protecting virtual machine privacy in untrusted
cloud environment. ACM Conference on Computing Frontiers (CF'13), 2013, Artical no: 25 (10 pages)
Luo, S. Xu, and X. Jiang. Real-time detection
and prevention of android SMS permission abuses. Proceedings of AisaCCS workshop on Security in Embedded Systems and Smartphones (SESP'13), 2013,pp
Luo and L. Xu and Z. Zhan and Q. Zheng and S.
Xu. Federated Cloud Security Architecture for Secure and Agile Clouds.
Book chapter to appear in 2013 Springer book entitled ``High Performance
Cloud Auditing and Applications."Springer book entitled ''High Performance
Semantic Cloud Audit.''
Morales, S. Xu, and R. Sandhu. Analyzing Malware Detection Efficiency with
Multiple Anti-Malware Programs. Proceedings of The
1st ASE International Conference on Cyber Security.
Zheng, S. Xu and G. Ateniese. Efficient Query Integrity for Outsourced
Dynamic Databases. ACM CCSW'12.
Dai, P. Parker, H. Jin and S. Xu. Enhancing Data Trustworthiness via
Assured Digital Signing. IEEE Trans. Dependable Secure Computing 9(6):
Xu and S. Xu. An Extended Stochastic Model for Quantitative Security
Analysis of Networked Systems. Internet Mathematics, 8(3): 288-320 (2012).
- Y. Dodis, W. Luo, S. Xu and M. Yung. Key-Insulated Symmetric Key
Cryptography and Mitigating Attacks against Cryptographic Cloud Software.
Zheng and S. Xu. Secure and Efficient Proof of Storage with Deduplication. Proceedings of Second ACM Conference on
Data and Application Security and Privacy (ACM CODASPY'12).
Shang, W. Luo, and S. Xu. L-hop percolation on
networks with arbitrary degree distributions and its applications.
Physical Review E, Sept. 2011.
Morales, M. Main, W. Luo, S. Xu, and R. Sandhu. Building Malware Infection Trees.
Proceedings of the 6th International Conference on Malicious
and Unwanted Software (Malware 2011).
Xu, W. Lu, and Z. Zhan. A Stochastic Model of Multi-Virus Dynamics. IEEE
Transactions on Dependable and Secure Computing (IEEE TDSC), Jan 2012.
Xu, W. Lu, and L. Xu. Push- and Pull-based Epidemic Spreading in Networks:
Thresholds and Deeper Insights. ACM Transactions on Autonomous and
Adaptive Systems (TAAS), to appear.
- S. Xu, X. Li, P. Parker, and
X. Wang. Exploiting Trust-Based
Social Networks for Distributed Protection of Sensitive Data. IEEE
Transactions on Information Forensics & Security, 2011.
- earlier version appeared in AsiaCCS'08
Qian and S. Xu. Non-Interactive Multisignatures in the Plain Public-Key Model with
Efficient Verification. Information Processing Letters, accepted, 2010
Qian and S. Xu. Non-Interactive Editable
Signatures for Assured Data Provenance. First ACM Conference on Data and
Application Security and Privacy (ACM CODASPY'11).
Zheng and S. Xu. Fair and Dynamic Proof of Retrievability.
First ACM Conference on Data and Application Security and Privacy (ACM
Li, P. Parker, and S. Xu. A Stochastic Model for Quantitative Security
Analysis of Networked Systems. IEEE Transactions on Dependable and Secure
Computing (IEEE TDSC), 2011.
Morales, R. Sandhu, and S. Xu. Evaluating Detection and Treatment Effectiveness
of Commercial Anti-Malware Programs. Proceedings of the 5th International
Conference on Malicious and Unwanted Software (Malware 2010), pp ???.
Morales, A. Al-Bataineh, S. Xu and R. Sandhu.
Analyzing and Exploiting Network Behaviors of Malware. SecureComm'10.
Morales, E. Kartaltepe, S. Xu, and R. Sandhu.
Symptoms-Based Detection of Bot Processes. MMM-ACNS-2010 (5th
International Conference on Mathematical Methods, Models, and
Architectures for Computer Networks Security).
Kartaltepe, J. Morales, S. Xu, and R. Sandhu.
Social Network-Based Botnet Command-and-Control: Emerging Threats and
Countermeasures. ACNS'10. Springer Lecture Notes in Computer Science 6123,
Xu, H. Qian, F. Wang, Z. Zhan, E. Bertino, and
R. Sandhu. Trustworthy Information: Concepts and Mechanisms. WAIM'10 (11th
International Conference on Web-Age Information Management). Springer
Lecture Notes in Computer Science 6184, pp 398-404.
Xu. Towards a Theoretical Framework for Trustworthy Cyber Sensing.
Proceedings of the 2010 SPIE Conference on SPIE Defense, Security, and
Parker and S. Xu. A Method for Safekeeping Cryptographic Keys from Memory
Disclosure Attacks. Intrust'09.
Xu and M. Yung. SocialClouds: Concept, Security
Architecture and Some Mechanisms. Intrust'09.
Morales, A. Al-Bataineh, S. Xu, and R. Sandhu.
Analyzing DNS Activities of Bot Processes. Proceedings of the 4th
International Conference on Malicious and Unwanted Software (Malware
- Q. Ni, S. Xu, E. Bertino, R.
Sandhu and W. Han. An Access Control
Language for a General Provenance Model. Proc. 6th VLDB Workshop on Secure
Data Management (SDM'09).
Xu, R. Sandhu, and E. Bertino. TIUPAM: A Framework for
Trustworthiness-Centric Information Sharing. Invited paper in Proc.
3rd IFIP WG 11.11 International Conference on Trust Management, 2009.
- S. Xu, Q. Ni, E. Bertino and
R. Sandhu. A Characterization of the
Problem of Secure Provenance Management. Proc. Workshop on Assured
Information Sharing at the IEEE International Conference on Intelligence
and Security Informatics (ISI'09).
Xu and M. Yung. Expecting the Unexpected: Towards Robust Credential
Leonard, S. Xu, and R. Sandhu. A First Step Towards
Characterizing Stealthy Botnets. To appear in the Proceedings of The
Fourth International Conference on Availability, Reliability and Security
(ARES'09), IEEE press, pp ???-???.
Leonard, S. Xu, and R. Sandhu. A Framework for Understanding Botnets. To
appear in the Proceedings of the Third International Workshop on Advances
in Information Security (WAIS'09), IEEE press, pp ???-???.
Xu. Collaborative Attack vs. Collaborative Defense. Invited Paper
in the Proceedings of The 4th International Conference on Collaborative
Computing: Networking, Applications and Worksharing
(CollaborativeCom'08), pp ???-???,
Nov. 13-16, 2008.
Xu. (How) Can We Manage the Trustworthiness of Security Infrastructures
and Services. Abstract of Keynote address
in the Proceedings of The 3rd Asia-Pacific Trusted Infrastructure
Technologies Conference (APTC'08), IEEE press, pp ???-???, Oct. 14-17, 2008.
Ding, G. Tsudik, and S. Xu. Leak-free Mediated
Group Signatures. Journal of Computer Security, Volume 17, Number 4, 2009,
- This is the full version of the ICDCS paper
Kiayias, S. Xu, and M. Yung. Privacy Preserving
Data Mining within Anonymous Credential Systems. SCN'08.
Xu and S. Capkun. Distributed and Secure
Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM
Transactions on Information and Systems Security (ACM TISSEC), 12(1),
Li, P. Parker, and S. Xu. A Probabilistic Characterization of A Fault-Tolerant Gossiping Algorithm. Journal of
Systems Science and Complexity, Springer, Accepted.
Walleck, Y. Li, and S. Xu. An Empirical Analysis
of Certificate Revocation Lists. IFIP DBSec'08.
Xu, X. Li, and P. Parker. Exploiting Social Networks for Thresholding Signing: Attack-resilience vs.
Kartaltepe, P. Parker, and S. Xu. How to Secure
Your Email Address Book and Beyond. CANS'07.
Li, P. Parker, and S. Xu. A Stochastic Characterization of a
Fault-tolerant Gossip Algorithm. HASE'07.
Harrison and S. Xu. Protecting Cryptographic Keys from
Memory Disclosure Attacks. DSN-DCCS'07. (Preliminary full version with
source code is here; a
significantly enriched full version will become available some time soon.)
Sharkey, H. Tian, W. Zhang, and S. Xu. Privacy-Preserving Data Mining
Through Knowledge Model Sharing. PinKDD'07.
Li, P. Parker, and S. Xu. Towards an Analytic Model
of Epidemic Spreading in Heterogeneous Systems. Qshine'07.
Xu and K. Han. Envisioning Stealthy Botnet C&C and Graph-based Detection
Metrics (Abstract). DSN'07 fast abstract track.
Xu and R. Sandhu. A Scalable and Secure
Cryptographic Service. IFIP DBSec'07. Preliminary full version is here.
Li, P. Parker, and S. Xu. Towards Quantifying the (In)Security of Networked Systems. IEEE AINA'07.
Xu and Moti Yung. K-anonymous Multi-party Secret
Handshakes. Financial Cryptography and Data Security 2007 (FC'07).
Xu. On the security of group communication schemes.
Journal of Computer Security, Volume 15, Number 1, 2007, pp. 129 - 169.
is the full version of the SASN'05 paper below.
- S. Zhu, S. Setia, S. Xu, and
S. Jajodia. GKMPAN:
An efficient group rekeying scheme for secure multicast in ad-hoc networks.
Journal of Computer Security, Volume 14, Number 4, 2006, pp. 301 - 325.
- This is the full version of the Mobiquitous'04
- S. Zhu, S. Xu, S. Setia,
and S. Jajodia. LHAP: A Lightweight Network Access Control Protocol
for Ad-Hoc Networks. Elsevier Ad Hoc Networks Journal, Volume 4, Issue
5, Sept. 2006, pp 567-585.
- This is the full version of the MWN'03 paper
Parker and S. Xu. Towards Understanding the (In)security of Networked Systems under Topology-directed
Stealthy Attacks. Proceedings of the 2nd IEEE International Symposium
on Dependable, Autonomic and Secure Computing (DASC'06), pp ???-???.
Tsudik and S. Xu. A Flexible
Framework for Secret Handshakes. In Proceedings of the 6th Workshop on
Privacy Enhancing Technologies (PET'06).
- This is an extended version of the PODC'05 brief
Dowd, S. Xu, and W. Zhang. Privacy-Preserving
Decision Tree Mining Based on Random Substitutions. In the Proceedings
of the 2006 International Conference on Emerging Trends in Information and
Communication Security (ETRICS'06), LNCS 3995, pp 145-159.
- E. Kartaltepe and S. Xu. Towards Blocking Outgoing
Malicious Impostor Emails. In the Proceedings of the 2nd International
Workshop on Trust, Security and Privacy for Ubiquitous Computing. IEEE
Press, pp 657-661.
Xu. On the Security of Group Communication Schemes
based on Symmetric Key Cryptosystems. In the Proceedings of ACM
Workshop on Security of Ad hoc and Sensor Network 2005 (ACM SASN'05), ACM
press, pp 22-31.
- The full version is invited to submit to a
special issue of Journal of Computer Security.
- E. Kartaltepe and S. Xu. On Automatically Detecting
Malicious Imposter Emails. In Proceedings of International Workshop on
Applied PKI 2005 (IWAP'05), IOS Press, pp ??-??.
Tsudik and S. Xu. Brief
Announcement: A Flexible Framework for Secret Handshakes. In
Proceedings of ACM Symposium on Princples of
Distributed Computing 2005 (ACM PODC'05), ACM Press, pp 39.
Xu and W. Zhang. Knowledge as a Service and Knowledge
Breaching. In the Proceedings of IEEE International Conference on
Service Computing (IEEE SCC'05), IEEE Press, pp 87-94.
Xu and M. Yung. K-Anonymous Secret Handshakes with
Reusable Credentials. ACM CCS'04. (full version not available yet)
Xu and W. Zhang. PBKM: A Secure Knowledge Management
Framework. NSF/NSA/AFRL Workshop on Secure Knowledge Management'04.
Xu and M. Yung. Accountable
Ring Signatures: A Smart Card Approach. IFIP CARDIS'04.
- S. Zhu, S. Setia, S. Xu,
and S. Jajodia. GKMPAN: An Efficient Group Rekeying Scheme for
Secure Multicast in Ad-Hoc Networks. Mobiquitous'04.
Xu, W. Nelson Jr. and R. Sandhu. Enhancing
Anonymity via Market Competition. Information Assurance and Security
-- IEEE ITCC'04.
Xu and R. Sandhu. Applying OM-AM to Analyze Digital
Rights Management. 7th International Conference on E-Commerce
Ding, G. Tsudik, and S. Xu. Leak-free
Group Signatures with Immediate Revocation. ICDCS'04.
Tsudik and S. Xu. Accumulating
Composites and Improved Group Signing. Asiacrypt'03; an extended
preliminary version is here.
(This paper is under substantial revision; the revisited version will
be posted when it is available.)
- S. Zhu, S. Xu, S. Setia,
and S. Jajodia. Establishing
Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A
Probabilistic Approach. ICNP'03.
Bagchi, A. Chaudhary,
M. Goodrich, and S. Xu. Constructing Dijoint Paths for Secure Communication. DISC'03.
- S. Zhu, S. Xu, S. Setia,
and S. Jajodia. LHAP:
A Light-weight Hop-by-hop Authentication Protocol For Ad-Hoc Networks.
Workshop on Mobile and Wireless Networks (MWN'03, affiliated with
Xu and M. Yung. Retrofitting Fairness on the Original
RSA-Based E-Cash. Financial Cryptography'03.
Xu and R. Sandhu. Two Efficient and Provably Secure
Schemes for Server-Assisted Threshold Signatures. RSA-CT'03.
- Y. Dodis, J. Katz, S. Xu,
and M. Yung. Strong
Key-Insulated Signature Schemes. PKC'03.
- Y. Dodis, J. Katz, S. Xu,
and M. Yung. Key-Insulated
Public Key Cryptosystems. Eurocrypt'02.
Xu and M. Yung. The Dark Side of Threshold Cryptography.
Xu and R. Sandhu. Authenticated Multicast Immune to
Denial-of-Service Attacks. ACM SAC'02.
Xu, M. Yung, and G. Zhang. Friendly Observers Ease
Off-Line E-Cash. CARDIS'00.
Xu, M. Yung, and G. Zhang. Scalable, Tax-Evasion
Free, Anonymous Investing. IFIP SEC'00.
- S. Xu, M. Yung, G. Zhang,
and H. Zhu. Money
Conservation via Atomicity in Fair Off-Line E-Cash. ISW'99, LNCS 1729.
Xu, G. Zhang, and H. Zhu. Securing Systems Using E-Cash. InfoSecu'99.
Xu, G. Zhang, and H. Zhu. Two Digital Signature Schemes Based on Graph
3-Colorability Problem. ICYCS'99.
- S. Xu, H. Zhu, and G. Zhang.
Digital Signature Schemes Based on
Graph Isomorphism and Graph 3-Colorability Problems. CrypTEC'99.
Xu, G. Zhang, and H. Zhu. On the Security of Three-Party Cryptogrpahic Protocols. ACM Operating Systems Review,
Vol. 32, No. 3, July 1998, pp 7-20.
Xu, G. Zhang, and H. Zhu. On the Security of Cryptogrpahic
Protocols (Extended Abstract). ChinaCrypt'98.
Xu, G. Zhang, and H. Zhu. On the Properties of Cryptogrpahic
Protocols and the Weaknesses of BAN-Like Logics. ACM Operating Systems
Review, Vol. 31, No. 4, October 1997, pp 12-23.
- S. Xu, G. Zhang, H. Zhu et
al. A General Solution to the
Security Problems on the Internet/Intranet Platform. Proceedings of the
Sixth Chinese Symposium on Security and Privacy, 1997.
Publications (in Chinese):
Xu. Studies in Digital Currency. PhD Thesis, Dec. 1999, Department of
Computer Science, Fudan University, Shanghai,
Xu, G. Zhang, and H. Zhu. A Self-Delegation System and the Knowledge
Complexity of Problems. Journal of Software, Vol. 10, No. 2, February
1999, pp 170-174.
Xu and G. Zhang. Encryption Mechanism for Routing Information Based on the
Internet Protocol. Computer Research and Development, Vol. 35, No. 8,
August 1998, 753-759
Xu, G. Zhang, and H. Zhu. Recent Advances in Modern Cryptography.
Xu and M. Hu. Security Strategy for Oracle-Based Application Systems.
Computer Engineering and Design, Vol. 18, No. 4, April 1997, pp 43-38.
Xu and M. Hu. Prospects on Database Security. Computer Engineering, Vol.
23, No. 3, March 1997, pp 50-53.
Xu and M. Hu. The Storage and Retrieve Techniques for Object-Oriented
Multimedia DataBase Systems. Computer
Engineering, Vol. 22, No. 5, May 1996, pp 14-17.
Xu and M. Hu. Database Based on Spatial Algebra. Software, Vol. 4, No. 3,
March 1996, pp 20-23.