What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sushil Jajodia
Google Scholar
126
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
DARD: Deceptive Approaches for Robust Defense Against IP Theft.
Alberto Maria Mongardini
Massimo La Morgia
Sushil Jajodia
Luigi Vincenzo Mancini
Alessandro Mei
2023
journals/compsec
Distributed query execution under access restrictions.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Giovanni Livraga
Stefano Paraboschi
Pierangela Samarati
2023
conf/sp
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Shu Wang
Xinda Wang
Kun Sun
Sushil Jajodia
Haining Wang
Qi Li
2021
conf/dsn
PatchDB: A Large-Scale Security Patch Dataset.
Xinda Wang
Shu Wang
Pengbin Feng
Kun Sun
Sushil Jajodia
2020
journals/tifs
Understanding the Manipulation on Recommender Systems through Web Injection.
Yubao Zhang
Jidong Xiao
Shuai Hao
Haining Wang
Sencun Zhu
Sushil Jajodia
2020
conf/cns
A Machine Learning Approach to Classify Security Patches into Vulnerability Types.
Xinda Wang
Shu Wang
Kun Sun
Archer L. Batcheller
Sushil Jajodia
2019
journals/tifs
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC.
Ankit Shah
Rajesh Ganesan
Sushil Jajodia
Hasan Cam
2019
journals/tifs
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
Ankit Shah
Rajesh Ganesan
Sushil Jajodia
Hasan Cam
2019
conf/dsn
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Xinda Wang
Kun Sun
Archer L. Batcheller
Sushil Jajodia
2018
journals/tifs
Memory Forensic Challenges Under Misused Architectural Features.
Ning Zhang
Ruide Zhang
Kun Sun
Wenjing Lou
Y. Thomas Hou
Sushil Jajodia
2017
journals/tifs
A Probabilistic Logic of Cyber Deception.
Sushil Jajodia
Noseong Park
Fabio Pierazzi
Andrea Pugliese
Edoardo Serra
Gerardo I. Simari
V. S. Subrahmanian
2017
conf/ccs
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Sridhar Venkatesan
Massimiliano Albanese
Ankit Shah
Rajesh Ganesan
Sushil Jajodia
2016
journals/tifs
Profiling Online Social Behaviors for Compromised Account Detection.
Xin Ruan
Zhenyu Wu
Haining Wang
Sushil Jajodia
2016
journals/tifs
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
Mengyuan Zhang
Lingyu Wang
Sushil Jajodia
Anoop Singhal
Massimiliano Albanese
2016
conf/ccs
A Moving Target Defense Approach to Disrupting Stealthy Botnets.
Sridhar Venkatesan
Massimiliano Albanese
George Cybenko
Sushil Jajodia
2016
conf/cns
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Sridhar Venkatesan
Massimiliano Albanese
Kareem Amin
Sushil Jajodia
Mason Wright
2015
conf/ccs
Now You See Me: Hide and Seek in Physical Address Space.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
Sushil Jajodia
2015
conf/sec
Integrity for Approximate Joins on Untrusted Computational Servers.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2015
conf/cns
A deception based approach for defeating OS and service fingerprinting.
Massimiliano Albanese
Ermanno Battista
Sushil Jajodia
2015
conf/cns
Disrupting stealthy botnets through strategic placement of detectors.
Sridhar Venkatesan
Massimiliano Albanese
Sushil Jajodia
2014
journals/compsec
Consistency and enforcement of access rules in cooperative data sharing environment.
Meixing Le
Krishna Kant
Sushil Jajodia
2014
journals/tifs
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
Sankardas Roy
Mauro Conti
Sanjeev Setia
Sushil Jajodia
2014
conf/ccs
MTD 2014: First ACM Workshop on Moving Target Defense.
Sushil Jajodia
Kun Sun
2014
conf/iciss
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
George Cybenko
Sushil Jajodia
Michael P. Wellman
Peng Liu
2014
conf/esorics
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Lingyu Wang
Mengyuan Zhang
Sushil Jajodia
Anoop Singhal
Massimiliano Albanese
2014
conf/esorics
TrustDump: Reliable Memory Acquisition on Smartphones.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
Sushil Jajodia
2014
conf/cns
Self-healing wireless networks under insider jamming attacks.
Longquan Li
Sencun Zhu
Don J. Torrieri
Sushil Jajodia
2014
conf/cns
Integrity for distributed queries.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Giovanni Livraga
Stefano Paraboschi
Pierangela Samarati
2014
conf/cns
Manipulating the attacker's view of a system's attack surface.
Massimiliano Albanese
Ermanno Battista
Sushil Jajodia
Valentina Casola
2013
journals/compsec
Enforcing dynamic write privileges in data outsourcing.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Giovanni Livraga
Stefano Paraboschi
Pierangela Samarati
2013
conf/ccs
Verification of data redundancy in cloud storage.
Zhan Wang
Kun Sun
Jiwu Jing
Sushil Jajodia
2013
conf/cns
A moving target defense mechanism for MANETs based on identity virtualization.
Massimiliano Albanese
Alessandra De Benedictis
Sushil Jajodia
Kun Sun
2013
conf/cns
Welcome message.
Sushil Jajodia
Wenjing Lou
Wade Trappe
2013
conf/dsn
Reliable mission deployment in vulnerable distributed systems.
Massimiliano Albanese
Sushil Jajodia
Ravi Jhawar
Vincenzo Piuri
2012
journals/tifs
Secure Data Aggregation in Wireless Sensor Networks.
Sankardas Roy
Mauro Conti
Sanjeev Setia
Sushil Jajodia
2012
conf/sec
Support for Write Privileges on Outsourced Data.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2012
conf/esorics
A Probabilistic Framework for Localization of Attackers in MANETs.
Massimiliano Albanese
Alessandra De Benedictis
Sushil Jajodia
Paulo Shakarian
2012
conf/dsn
Time-efficient and cost-effective network hardening using attack graphs.
Massimiliano Albanese
Sushil Jajodia
Steven Noel
2011
conf/esorics
Scalable Analysis of Attack Scenarios.
Massimiliano Albanese
Sushil Jajodia
Andrea Pugliese
V. S. Subrahmanian
2010
journals/compsec
Access control for smarter healthcare using policy spaces.
Claudio A. Ardagna
Sabrina De Capitani di Vimercati
Sara Foresti
Tyrone Grandison
Sushil Jajodia
Pierangela Samarati
2010
journals/tifs
Providing witness anonymity under peer-to-peer settings.
Bo Zhu
Sanjeev Setia
Sushil Jajodia
Lingyu Wang
2010
conf/ccs
Restoring compromised privacy in micro-data disclosure.
Lei Zhang
Alexander Brodsky
Sushil Jajodia
2010
conf/esorics
-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Lingyu Wang
Sushil Jajodia
Anoop Singhal
Steven Noel
2010
conf/esorics
Providing Mobile Users' Anonymity in Hybrid Networks.
Claudio A. Ardagna
Sushil Jajodia
Pierangela Samarati
Angelos Stavrou
2010
conf/acsac
Who is tweeting on Twitter: human, bot, or cyborg?
Zi Chu
Steven Gianvecchio
Haining Wang
Sushil Jajodia
2009
conf/esorics
Keep a Few: Outsourcing Data While Maintaining Confidentiality.
Valentina Ciriani
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2009
conf/esorics
Privacy Preservation over Untrusted Mobile Networks.
Claudio A. Ardagna
Sushil Jajodia
Pierangela Samarati
Angelos Stavrou
2009
conf/esorics
Anonymity and Historical-Anonymity in Location-Based Services.
Claudio Bettini
Sergio Mascetti
Xiaoyang Sean Wang
Dario Freni
Sushil Jajodia
2008
conf/ccs
Assessing query privileges via safe and efficient permission composition.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2008
conf/ccs
Efficiently tracking application interactions using lightweight virtualization.
Yih Huang
Angelos Stavrou
Anup K. Ghosh
Sushil Jajodia
2008
conf/ccs
Measuring network security using dynamic bayesian network.
Marcel Frigault
Lingyu Wang
Anoop Singhal
Sushil Jajodia
2008
conf/esorics
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques.
Sergio Mascetti
Dario Freni
Claudio Bettini
Xiaoyang Sean Wang
Sushil Jajodia
2008
conf/esorics
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Claudio A. Ardagna
Angelos Stavrou
Sushil Jajodia
Pierangela Samarati
Rhandi Martin
2007
conf/ccs
Topological analysis of network attack vulnerability.
Sushil Jajodia
2007
conf/ccs
A data outsourcing architecture combining cryptography and access control.
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2007
conf/ccs
Information disclosure under realistic assumptions: privacy versus optimality.
Lei Zhang
Sushil Jajodia
Alexander Brodsky
2007
conf/ccs
Trust management services in relational databases.
Sabrina De Capitani di Vimercati
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2007
conf/ccs
Toward measuring network security using attack graphs.
Lingyu Wang
Anoop Singhal
Sushil Jajodia
2007
conf/sec
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2007
conf/sp
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.
Xinyuan Wang
Shiping Chen
Sushil Jajodia
2007
conf/esorics
Fragmentation and Encryption to Enforce Privacy in Data Storage.
Valentina Ciriani
Sabrina De Capitani di Vimercati
Sara Foresti
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2007
conf/acsac
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.
Bo Zhu
Venkata Gopala Krishna Addada
Sanjeev Setia
Sushil Jajodia
Sankardas Roy
2006
conf/ccs
A weakest-adversary security metric for network configuration security analysis.
Joseph Pamula
Sushil Jajodia
Paul Ammann
Vipin Swarup
2006
conf/ccs
Providing witness anonymity in peer-to-peer systems.
Bo Zhu
Sanjeev Setia
Sushil Jajodia
2006
conf/dsn
VoIP Intrusion Detection Through Interacting Protocol State Machines.
Hemant Sengar
Duminda Wijesekera
Haining Wang
Sushil Jajodia
2006
conf/acsac
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System.
Shiping Chen
Dongyu Liu
Songqing Chen
Sushil Jajodia
2005
conf/ccs
Tracking anonymous peer-to-peer VoIP calls on the internet.
Xinyuan Wang
Shiping Chen
Sushil Jajodia
2005
conf/acns
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
Sencun Zhu
Chao Yao
Donggang Liu
Sanjeev Setia
Sushil Jajodia
2005
conf/esorics
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Lingyu Wang
Anyi Liu
Sushil Jajodia
2005
conf/acsac
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices.
Steven Noel
Sushil Jajodia
2004
conf/ccs
A logic-based framework for attribute based access control.
Lingyu Wang
Duminda Wijesekera
Sushil Jajodia
2004
conf/sp
Securing OLAP Data Cubes Against Privacy Breaches.
Lingyu Wang
Sushil Jajodia
Duminda Wijesekera
2004
conf/sp
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Sencun Zhu
Sanjeev Setia
Sushil Jajodia
Peng Ning
2004
conf/esorics
Incorporating Dynamic Constraints in the Flexible Authorization Framework.
Shiping Chen
Duminda Wijesekera
Sushil Jajodia
2004
conf/acsac
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances.
Steven Noel
Eric Robertson
Sushil Jajodia
2003
conf/ccs
Balancing confidentiality and efficiency in untrusted relational DBMSs.
Ernesto Damiani
Sabrina De Capitani di Vimercati
Sushil Jajodia
Stefano Paraboschi
Pierangela Samarati
2003
conf/ccs
LEAP: efficient security mechanisms for large-scale distributed sensor networks.
Sencun Zhu
Sanjeev Setia
Sushil Jajodia
2003
conf/sec
A User Friendly Guard with Mobile Post-Release Access Control Policy.
Douglas E. Williams
Amgad Fayad
Sushil Jajodia
Daniel Calle
2003
conf/esorics
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Lingyu Wang
Yingjiu Li
Duminda Wijesekera
Sushil Jajodia
2003
conf/acsac
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs.
Steven Noel
Sushil Jajodia
Brian O'Berry
Michael Jacobs
2002
conf/ccs
Policy algebras for access control the predicate case.
Duminda Wijesekera
Sushil Jajodia
2002
conf/sec
Secure Selective Exclusion in Ad Hoc Wireless Network.
Roberto Di Pietro
Luigi V. Mancini
Sushil Jajodia
2002
conf/sec
Propagating Modifications to Mobile Policies.
Kenneth P. Smith
Donald B. Faatz
Amgad Fayad
Sushil Jajodia
2002
conf/esorics
Cardinality-Based Inference Control in Sum-Only Data Cubes.
Lingyu Wang
Duminda Wijesekera
Sushil Jajodia
2001
journals/istr
Security in Federated Database Systems.
Sushil Jajodia
Duminda Wijesekera
2001
conf/ccs
Policy algebras for access control: the propositional case.
Duminda Wijesekera
Sushil Jajodia
2001
conf/sec
Going Beyond MAC and DAC Using Mobile Policies.
Amgad Fayad
Sushil Jajodia
Donald B. Faatz
Vinti Doshi
2000
conf/sec
CARDS: A Distributed System for Detecting Coordinated Attacks.
Jiahai Yang
Peng Ning
Xiaoyang Sean Wang
Sushil Jajodia
2000
conf/sp
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast.
Sanjeev Setia
Samir Koussih
Sushil Jajodia
Eric Harder
2000
conf/dsn
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Peng Liu
Peng Ning
Sushil Jajodia
2000
conf/acsac
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications.
Vinti Doshi
Amgad Fayad
Sushil Jajodia
Roswitha MacLean
1999
conf/ih
Recovery of Watermarks from Distorted Images.
Neil F. Johnson
Zoran Duric
Sushil Jajodia
1999
conf/icics
Protecting Critical Information Systems (Abstract).
Sushil Jajodia
1999
conf/acsac
Application-Level Isolation Using Data Inconsistency Detection.
Amgad Fayad
Sushil Jajodia
Catherine D. McCollum
1998
conf/ih
Steganalysis of Images Created Using Current Steganography Software.
Neil F. Johnson
Sushil Jajodia
1998
conf/acsac
Application-Level Isolation to Cope with Malicious Database Users.
Sushil Jajodia
Peng Liu
Catherine D. McCollum
1997
conf/sp
A Logical Language for Expressing Authorizations.
Sushil Jajodia
Pierangela Samarati
V. S. Subrahmanian
1997
conf/sp
Providing flexibility in information flow control for object oriented systems.
Elena Ferrari
Pierangela Samarati
Elisa Bertino
Sushil Jajodia
1997
conf/sp
Surviving information warfare attacks on databases.
Paul Ammann
Sushil Jajodia
Catherine D. McCollum
Barbara T. Blaustein
1996
conf/ccs
An Advanced Commit Protocol for MLS Distributed Database Systems.
Indrajit Ray
Elisa Bertino
Sushil Jajodia
Luigi V. Mancini
1996
conf/ccs
A Non-Timestamped Authorization Model for Data Management Systems.
Elisa Bertino
Sushil Jajodia
Pierangela Samarati
1996
conf/sp
Supporting Multiple Access Control Policies in Database Systems.
Elisa Bertino
Sushil Jajodia
Pierangela Samarati
1996
conf/sp
Ensuring Atomicity of Multilevel Transactions.
Paul Ammann
Sushil Jajodia
Indrakshi Ray
1996
conf/esorics
Enhancing the Controlled Disclosure of Sensitive Information.
Donald G. Marks
Amihai Motro
Sushil Jajodia
1994
conf/ccs
Propagation of Authorizations in Distributed Database Systems.
Pierangela Samarati
Paul Ammann
Sushil Jajodia
1994
conf/ccs
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
Paul Ammann
Sushil Jajodia
1994
conf/sp
Collecting garbage in multilevel secure object stores.
Elisa Bertino
Luigi V. Mancini
Sushil Jajodia
1994
conf/esorics
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information.
Amihai Motro
Donald G. Marks
Sushil Jajodia
1994
conf/acsac
Benchmarking multilevel secure database systems using the MITRE benchmark.
Vinti Doshi
William R. Herndon
Sushil Jajodia
Catherine D. McCollum
1993
conf/ccs
Authorizations in Relational Database Management Systems.
Elisa Bertino
Pierangela Samarati
Sushil Jajodia
1993
conf/ccs
High Assurance Discretionary Access Control for Object Bases.
Elisa Bertino
Pierangela Samarati
Sushil Jajodia
1993
conf/sp
Achieving stricter correctness requirements in multilevel secure databases.
Vijayalakshmi Atluri
Elisa Bertino
Sushil Jajodia
1993
conf/sp
A model of atomicity for multilevel transactions.
Barbara T. Blaustein
Sushil Jajodia
Catherine D. McCollum
LouAnna Notargiacomo
1992
journals/compsec
Eliminating polyinstantiation securely.
Ravi S. Sandhu
Sushil Jajodia
1992
conf/sec
Referential Integrity in Multilevel Secure Database Management Systems.
Vinti Doshi
Sushil Jajodia
1992
conf/sp
A two snapshot algorithm for concurrency control in multi-level secure databases.
Paul Ammann
Frank Jaeckle
Sushil Jajodia
1992
conf/sp
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
Sushil Jajodia
Vijayalakshmi Atluri
1992
conf/esorics
Polyinstantation for Cover Stories.
Ravi S. Sandhu
Sushil Jajodia
1991
journals/compsec
Integrity principles and mechanisms in database management systems.
Ravi S. Sandhu
Sushil Jajodia
1991
conf/sp
A Novel Decomposition of Multilevel Relations into Single-Level Relations.
Sushil Jajodia
Ravi S. Sandhu
1991
conf/acsac
An audit model for object-oriented databases.
Boris Y. Kogan
Sushil Jajodia
1991
conf/acsac
A single-level scheduler for the replicated architecture for multilevel-secure databases.
John P. McDermott
Sushil Jajodia
Ravi S. Sandhu
1990
conf/sp
Integrating an Object-Oriented Data Model with Multilevel Security.
Sushil Jajodia
Boris Kogan
1990
conf/sp
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture.
Sushil Jajodia
Boris Kogan
1990
conf/sp
Polyinstantiation Integrity in Multilevel Relations.
Sushil Jajodia
Ravi S. Sandhu
1990
conf/acsac
Update semantics for multilevel relations.
Sushil Jajodia
Ravi S. Sandhu
Edgar H. Sibley
Coauthors
Alberto Maria Mongardini
(1)
Alessandra De Benedictis
(2)
Alessandro Mei
(1)
Alexander Brodsky
(2)
Amgad Fayad
(5)
Amihai Motro
(2)
Andrea Pugliese
(2)
Angelos Stavrou
(4)
Ankit Shah
(3)
Anoop Singhal
(5)
Anup K. Ghosh
(1)
Anyi Liu
(1)
Archer L. Batcheller
(2)
Barbara T. Blaustein
(2)
Bo Zhu
(3)
Boris Kogan
(2)
Boris Y. Kogan
(1)
Brian O'Berry
(1)
Catherine D. McCollum
(5)
Chao Yao
(1)
Claudio A. Ardagna
(4)
Claudio Bettini
(2)
Daniel Calle
(1)
Dario Freni
(2)
Don J. Torrieri
(1)
Donald B. Faatz
(2)
Donald G. Marks
(2)
Donggang Liu
(1)
Dongyu Liu
(1)
Douglas E. Williams
(1)
Duminda Wijesekera
(9)
Edgar H. Sibley
(1)
Edoardo Serra
(1)
Elena Ferrari
(1)
Elisa Bertino
(8)
Eric Harder
(1)
Eric Robertson
(1)
Ermanno Battista
(2)
Ernesto Damiani
(2)
Fabio Pierazzi
(1)
Frank Jaeckle
(1)
George Cybenko
(2)
Gerardo I. Simari
(1)
Giovanni Livraga
(3)
Haining Wang
(5)
Hasan Cam
(2)
He Sun
(1)
Hemant Sengar
(1)
Indrajit Ray
(1)
Indrakshi Ray
(1)
Jiahai Yang
(1)
Jidong Xiao
(1)
Jiwu Jing
(2)
John P. McDermott
(1)
Joseph Pamula
(1)
Kareem Amin
(1)
Kenneth P. Smith
(1)
Krishna Kant
(1)
Kun Sun
(10)
Lei Zhang
(2)
Lingyu Wang
(11)
Longquan Li
(1)
LouAnna Notargiacomo
(1)
Luigi V. Mancini
(3)
Luigi Vincenzo Mancini
(1)
Marcel Frigault
(1)
Mason Wright
(1)
Massimiliano Albanese
(13)
Massimo La Morgia
(1)
Mauro Conti
(2)
Meixing Le
(1)
Mengyuan Zhang
(2)
Michael Jacobs
(1)
Michael P. Wellman
(1)
Neil F. Johnson
(2)
Ning Zhang
(2)
Noseong Park
(1)
Paul Ammann
(6)
Paulo Shakarian
(1)
Peng Liu
(3)
Peng Ning
(3)
Pengbin Feng
(1)
Pierangela Samarati
(23)
Qi Li
(1)
Rajesh Ganesan
(3)
Ravi Jhawar
(1)
Ravi S. Sandhu
(7)
Rhandi Martin
(1)
Roberto Di Pietro
(1)
Roswitha MacLean
(1)
Ruide Zhang
(1)
Sabrina De Capitani di Vimercati
(13)
Samir Koussih
(1)
Sanjeev Setia
(9)
Sankardas Roy
(3)
Sara Foresti
(11)
Sencun Zhu
(5)
Sergio Mascetti
(2)
Shiping Chen
(4)
Shu Wang
(3)
Shuai Hao
(1)
Songqing Chen
(1)
Sridhar Venkatesan
(4)
Stefano Paraboschi
(12)
Steven Gianvecchio
(1)
Steven Noel
(5)
Sushil Jajodia
(126)
Tyrone Grandison
(1)
V. S. Subrahmanian
(3)
Valentina Casola
(1)
Valentina Ciriani
(2)
Venkata Gopala Krishna Addada
(1)
Vijayalakshmi Atluri
(2)
Vincenzo Piuri
(1)
Vinti Doshi
(4)
Vipin Swarup
(1)
Wade Trappe
(1)
Wenjing Lou
(3)
William R. Herndon
(1)
Xiaoyang Sean Wang
(3)
Xin Ruan
(1)
Xinda Wang
(4)
Xinyuan Wang
(2)
Y. Thomas Hou
(1)
Yih Huang
(1)
Yingjiu Li
(1)
Yiwei Thomas Hou
(1)
Yubao Zhang
(1)
Yuewu Wang
(1)
Zhan Wang
(1)
Zhenyu Wu
(1)
Zi Chu
(1)
Zoran Duric
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to