Di Ma
A new approach to secure logging
D Ma, G Tsudik
ACM Transactions on Storage (TOS) 5 (1), 1-21, 2009
WLC05-3: Medium access control for multi-channel parallel transmission in cognitive radio networks
T Shu, S Cui, M Krunz
IEEE Globecom 2006, 1-5, 2006
Forward-secure sequential aggregate authentication
D Ma, G Tsudik
2007 IEEE Symposium on Security and Privacy (SP'07), 86-91, 2007
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, N Saxena, T Xiang, Y Zhu
IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012
Security and privacy in emerging wireless networks
D Ma, G Tsudik
IEEE Wireless Communications 17 (5), 12-21, 2010
Rapid prototyping applications in medicine. Part 1: NURBS-based volume modelling
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18 (2), 103-117, 2001
${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
B Zhang, Q Zhan, S Chen, M Li, K Ren, C Wang, D Ma
IEEE internet of things journal 1 (1), 33-45, 2014
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
Rapid prototyping applications in medicine. Part 2: STL file generation and case studies
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18 (2), 118-127, 2001
The role of FOXO and PPAR transcription factors in diet-mediated inhibition of PDC activation and carbohydrate oxidation during exercise in humans and the role of …
D Constantin-Teodosiu, D Constantin, F Stephens, D Laithwaite, ...
Diabetes 61 (5), 1017-1024, 2012
Dish: Distributed self-healing
D Ma, G Tsudik
Symposium on Self-Stabilizing Systems, 47-62, 2008
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
Practical forward secure sequential aggregate signatures
D Ma
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Risk assessment for cooperative automated driving
D Dominic, S Chhawri, RM Eustice, D Ma, A Weimerskirch
Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016
Privacy leakage via de-anonymization and aggregation in heterogeneous social networks
H Li, Q Chen, H Zhu, D Ma, H Wen, XS Shen
IEEE Transactions on Dependable and Secure Computing 17 (2), 350-362, 2017
Enabling secure location-based services in mobile cloud computing
Y Zhu, D Ma, D Huang, C Hu
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 27-32, 2013
How to use attribute-based encryption to implement role-based access control in the cloud
Y Zhu, D Ma, CJ Hu, D Huang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20