50 Publications (Page 2 of 2)
2014
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication MethodSui, Yan⋅Zou, Xukai⋅Du, Eliza Y and Li, FengIEEE Transactions on Computers, vol. 63, (no. 4), pp. 916, 2014-April.
| Journal Article
2012
A Key Distribution Scheme for Distributed Group with Authentication CapabilityAdusumilli, Pratima⋅Sui, Yan⋅Zou, Xukai⋅Ramamurthy, Byrav and Li, FengInternational Journal of Performability Engineering, vol. 8, (no. 2), pp. 199, 2012.
| Journal Article
Climatic Characters over China in 2011Li, Ying⋅Gao, Ge⋅Ye, Dianxiu⋅Chen, Yu⋅Zou, Xukai⋅Ai, Wanxiu⋅Zhang, Peiqun and Wang, PenglingQi xiang, vol. 38, (no. 4), pp. 471, 20120401.
| Journal Article
2011
New threats to health data privacyLi, F.⋅Li, Fengjun⋅Zou, X.⋅Zou, Xukai⋅Liu, Peng⋅Liu, P.⋅Chen, J.Y. and Chen, Jake YBMC Bioinformatics, vol. 12, (no. Suppl 12), pp. S7, 2011.
| Journal Article
New threats to health data privacy.Li, Fengjun⋅Zou, Xukai⋅Liu, Peng and Chen, Jake YBMC bioinformatics, vol. 12 Suppl 12, pp. S7, 2011.
| Journal Article
2010
An efficient scheme for removing compromised sensor nodes from wireless sensor networksWang, Yong⋅Ramamurthy, Byrav⋅Zou, Xukai and Xue, YuyanSecurity and Communication Networks, vol. 3, (no. 4), pp. 320-333, 2010.
| Journal Article
A new approach for cancelable iris recognitionYang, Kai⋅Yang, Kai⋅Sui, Yan⋅Sui, Yan⋅Zhou, Zhi⋅Zhou, Zhi⋅Du, Yingzi⋅Du, Yingzi⋅Zou, Xukai and Zou, XukaiProceedings of SPIE, vol. 7708, (no. 1), pp. 77080A-8, 2010-01-01.
| Journal Article
A novel key management scheme using biometricsSui, Yan⋅Sui, Yan⋅Yang, Kai⋅Yang, Kai⋅Du, Yingzi⋅Du, Yingzi⋅Orr, Scott⋅Orr, Scott⋅Zou, Xukai and Zou, XukaiProceedings of SPIE, vol. 7708, (no. 1), pp. 77080C-10, 2010-01-01.
| Journal Article
Characteristics of Sand and Dust Weather in China and Cause Analysis in the Spring of 2006Zhang, Jinyan⋅Li, Yong⋅Cai, Xiangning⋅Zou, Xukai and Qiao, LinQi xiang, vol. 36, (no. 1), pp. 65, 20100101.
| Journal Article
2009
A Proactive Secret Sharing Scheme in matrix projection methodBai, Li and Zou, XukaiInternational Journal of Security and Networks, vol. 4, (no. 4), pp. 201-209, 2009.
| Journal Article
Rebound Wall: A Novel Technology against DoS AttacksDai, Yuan-Shun⋅Dai, Y.-S.⋅Li, X.⋅Li, Xueping⋅Zou, X.⋅Zou, Xukai⋅Xing, Liudong and Xing, L.International journal of performability engineering, vol. 5, (no. 1), pp. 55, 20090101.
| Journal Article
Temporal Change of Warm Winter Events over the Last 56 Years in ChinaChen, Yu⋅Ren, Guoyu⋅Wang, Ling⋅Zou, Xukai and Zhang, QiangYing yong qi xiang xue bao = Quarterly journal of applied meteorology, vol. 20, (no. 5), pp. 545, 20091001.
| Journal Article
2008
An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networksBalachandran, Ravi K⋅Zou, Xukai⋅Ramamurthy, Byrav⋅Thukral, Amandeep and Variyam, Vinodchandran NWireless Communications and Mobile Computing, vol. 8, (no. 10), pp. 1297-1312, 2008.
| Journal Article
A NEW CLASS OF KEY MANAGEMENT SCHEME FOR ACCESS CONTROL IN DYNAMIC HIERARCHIESZou, Xukai and Bai, LiInternational Journal of Computers & Applications, vol. 30, (no. 4), pp. 331-337, 2008.
| Journal Article
A novel Conference Key Management solution for Secure Dynamic ConferencingZou, Xukai and Karandikar, YogeshInternational Journal of Security and Networks, vol. 3, (no. 1), pp. 53, 20080101.
| Journal Article
2007
A dynamic key management solution to access hierarchyZou, Xukai⋅Karandikar, Yogesh and Bertino, ElisaInternational Journal Network Management, vol. 17, (no. 6), pp. 437-450, 2007.
| Journal Article
A Hierarchical Modeling and Analysis for Grid Service ReliabilityDai, Y-H⋅Pan, Yi and Zou, XukaiIEEE Transactions on Computers, vol. 56, (no. 5), pp. 681-691, 2007.
| Journal Article
Dependability and Security in Medical Information SystemZou, Xukai⋅Dai, Yuan-Shun⋅Doebbeling, Bradley and Qi, MingruiHuman-Computer Interaction. HCI Applications and Services, vol. 4553, pp. 558, 2007.
| Journal Article
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groupsZou, Xukai⋅Dai, Yuan-Shun and Ran, XiangFuture Generation Computer Systems, vol. 23, (no. 6), pp. 786, 2007.
| Journal Article
2006
An Effective Key Management Approach to Differential Access Control in Dynamic EnvironmentsKarandikar, Yogesh⋅Zou, Xukai and Dai, YuanshunJournal of Computer Science, vol. 2, (no. 6), pp. 549, 2006-06-01.
| Journal Article
2005
An effective method for 3D geological modeling with multi-source data integrationWu, Qiang⋅Xu, Hua and Zou, XukaiComputers and Geosciences, vol. 31, (no. 1), pp. 43, 2005.
| Journal Article
2004
A Block-free TGDH Key Agreement Protocol for Secure Group CommunicationsZou, Xukai and Ramamurthy, ByravParallel and Distributed Computing and Networks: Proceedings of the 22nd IASTED International Multi-Conference, 2004.
| Journal Article
Relationship between vegetation coverage and spring dust storms over northern ChinaZou, Xukai K. and Zhai, Panmao M.Journal of Geophysical Research - Atmospheres, vol. 109, (no. D3), pp. n/a, 16 February 2004.
| Journal Article
2003
Algorithms for unified hierarchy based access control.Zou, Xukai⋅Ramamurthy, Byrav⋅Vinodchandran, N. V and Balachandran, R. KSecond IASTED International Conference on Communications, Internet, and Information Technology; Scottsdale, AZ; USA; 17-19 Nov. 2003. 2003.
| Conference Proceeding
2000
Secure group communications and hierarchical access control (Dissertation)Zou, Xukai (2000).