50 Publications (Page 2 of 2)
2014
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method
Sui, YanZou, XukaiDu, Eliza Y and Li, Feng
IEEE Transactions on Computers, vol. 63, (no. 4), pp. 916, 2014-April. | Journal Article
2012
A Key Distribution Scheme for Distributed Group with Authentication Capability
Adusumilli, PratimaSui, YanZou, XukaiRamamurthy, Byrav and Li, Feng
International Journal of Performability Engineering, vol. 8, (no. 2), pp. 199, 2012. | Journal Article
 
Climatic Characters over China in 2011
Li, YingGao, GeYe, DianxiuChen, YuZou, XukaiAi, WanxiuZhang, Peiqun and Wang, Pengling
Qi xiang, vol. 38, (no. 4), pp. 471, 20120401. | Journal Article
2011
New threats to health data privacy
Li, F.Li, FengjunZou, X.Zou, XukaiLiu, PengLiu, P.Chen, J.Y. and Chen, Jake Y
BMC Bioinformatics, vol. 12, (no. Suppl 12), pp. S7, 2011. | Journal Article
 
New threats to health data privacy.
Li, FengjunZou, XukaiLiu, Peng and Chen, Jake Y
BMC bioinformatics, vol. 12 Suppl 12, pp. S7, 2011. | Journal Article
2010
An efficient scheme for removing compromised sensor nodes from wireless sensor networks
Wang, YongRamamurthy, ByravZou, Xukai and Xue, Yuyan
Security and Communication Networks, vol. 3, (no. 4), pp. 320-333, 2010. | Journal Article
 
A new approach for cancelable iris recognition
Yang, KaiYang, KaiSui, YanSui, YanZhou, ZhiZhou, ZhiDu, YingziDu, YingziZou, Xukai and Zou, Xukai
Proceedings of SPIE, vol. 7708, (no. 1), pp. 77080A-8, 2010-01-01. | Journal Article
 
A novel key management scheme using biometrics
Sui, YanSui, YanYang, KaiYang, KaiDu, YingziDu, YingziOrr, ScottOrr, ScottZou, Xukai and Zou, Xukai
Proceedings of SPIE, vol. 7708, (no. 1), pp. 77080C-10, 2010-01-01. | Journal Article
 
Characteristics of Sand and Dust Weather in China and Cause Analysis in the Spring of 2006
Zhang, JinyanLi, YongCai, XiangningZou, Xukai and Qiao, Lin
Qi xiang, vol. 36, (no. 1), pp. 65, 20100101. | Journal Article
2009
A Proactive Secret Sharing Scheme in matrix projection method
Bai, Li and Zou, Xukai
International Journal of Security and Networks, vol. 4, (no. 4), pp. 201-209, 2009. | Journal Article
 
Rebound Wall: A Novel Technology against DoS Attacks
Dai, Yuan-ShunDai, Y.-S.Li, X.Li, XuepingZou, X.Zou, XukaiXing, Liudong and Xing, L.
International journal of performability engineering, vol. 5, (no. 1), pp. 55, 20090101. | Journal Article
 
Temporal Change of Warm Winter Events over the Last 56 Years in China
Chen, YuRen, GuoyuWang, LingZou, Xukai and Zhang, Qiang
Ying yong qi xiang xue bao = Quarterly journal of applied meteorology, vol. 20, (no. 5), pp. 545, 20091001. | Journal Article
2008
An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks
Balachandran, Ravi KZou, XukaiRamamurthy, ByravThukral, Amandeep and Variyam, Vinodchandran N
Wireless Communications and Mobile Computing, vol. 8, (no. 10), pp. 1297-1312, 2008. | Journal Article
 
A NEW CLASS OF KEY MANAGEMENT SCHEME FOR ACCESS CONTROL IN DYNAMIC HIERARCHIES
Zou, Xukai and Bai, Li
International Journal of Computers & Applications, vol. 30, (no. 4), pp. 331-337, 2008. | Journal Article
 
A novel Conference Key Management solution for Secure Dynamic Conferencing
Zou, Xukai and Karandikar, Yogesh
International Journal of Security and Networks, vol. 3, (no. 1), pp. 53, 20080101. | Journal Article
2007
A dynamic key management solution to access hierarchy
Zou, XukaiKarandikar, Yogesh and Bertino, Elisa
International Journal Network Management, vol. 17, (no. 6), pp. 437-450, 2007. | Journal Article
 
A Hierarchical Modeling and Analysis for Grid Service Reliability
Dai, Y-HPan, Yi and Zou, Xukai
IEEE Transactions on Computers, vol. 56, (no. 5), pp. 681-691, 2007. | Journal Article
 
Dependability and Security in Medical Information System
Zou, XukaiDai, Yuan-ShunDoebbeling, Bradley and Qi, Mingrui
Human-Computer Interaction. HCI Applications and Services, vol. 4553, pp. 558, 2007. | Journal Article
 
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Zou, XukaiDai, Yuan-Shun and Ran, Xiang
Future Generation Computer Systems, vol. 23, (no. 6), pp. 786, 2007. | Journal Article
2006
An Effective Key Management Approach to Differential Access Control in Dynamic Environments
Karandikar, YogeshZou, Xukai and Dai, Yuanshun
Journal of Computer Science, vol. 2, (no. 6), pp. 549, 2006-06-01. | Journal Article
2005
An effective method for 3D geological modeling with multi-source data integration
Wu, QiangXu, Hua and Zou, Xukai
Computers and Geosciences, vol. 31, (no. 1), pp. 43, 2005. | Journal Article
2004
A Block-free TGDH Key Agreement Protocol for Secure Group Communications
Zou, Xukai and Ramamurthy, Byrav
Parallel and Distributed Computing and Networks: Proceedings of the 22nd IASTED International Multi-Conference, 2004. | Journal Article
 
Relationship between vegetation coverage and spring dust storms over northern China
Zou, Xukai K. and Zhai, Panmao M.
Journal of Geophysical Research - Atmospheres, vol. 109, (no. D3), pp. n/a, 16 February 2004. | Journal Article
2003
Algorithms for unified hierarchy based access control.
Zou, XukaiRamamurthy, ByravVinodchandran, N. V and Balachandran, R. K
Second IASTED International Conference on Communications, Internet, and Information Technology; Scottsdale, AZ; USA; 17-19 Nov. 2003. 2003. | Conference Proceeding
2000
Secure group communications and hierarchical access control (Dissertation)
Zou, Xukai (2000).