Di Ma
TitleCited byYear
A new approach to secure logging
D Ma, G Tsudik
ACM Transactions on Storage (TOS) 5 (1), 2, 2009
1782009
WLC05-3: Medium access control for multi-channel parallel transmission in cognitive radio networks
T Shu, S Cui, M Krunz
IEEE Globecom 2006, 1-5, 2006
178*2006
Forward-secure sequential aggregate authentication
D Ma, G Tsudik
2007 IEEE Symposium on Security and Privacy (SP'07), 86-91, 2007
1032007
Secure proximity detection for NFC devices based on ambient sensor data
T Halevi, D Ma, N Saxena, T Xiang
European Symposium on Research in Computer Security, 379-396, 2012
972012
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
R Di Pietro, D Ma, C Soriente, G Tsudik
2008 Symposium on Reliable Distributed Systems, 185-194, 2008
842008
Rapid prototyping applications in medicine. Part 1: NURBS-based volume modelling
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18 (2), 103-117, 2001
792001
Security and privacy in emerging wireless networks
D Ma, G Tsudik
IEEE Wireless Communications 17 (5), 12-21, 2010
712010
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, N Saxena, T Xiang, Y Zhu
IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012
702012
Dish: Distributed self-healing
D Ma, G Tsudik
Symposium on Self-Stabilizing Systems, 47-62, 2008
592008
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
592004
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
572004
Rapid prototyping applications in medicine. Part 2: STL file generation and case studies
D Ma, F Lin, CK Chua
The International Journal of Advanced Manufacturing Technology 18 (2), 118-127, 2001
572001
New adversary and new threats: security in unattended sensor networks
D Ma, C Soriente, G Tsudik
IEEE network 23 (2), 43-48, 2009
502009
${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
B Zhang, Q Zhan, S Chen, M Li, K Ren, C Wang, D Ma
IEEE internet of things journal 1 (1), 33-45, 2014
482014
Practical forward secure sequential aggregate signatures
D Ma
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
482008
The role of FOXO and PPAR transcription factors in diet-mediated inhibition of PDC activation and carbohydrate oxidation during exercise in humans and the role of …
D Constantin-Teodosiu, D Constantin, F Stephens, D Laithwaite, ...
Diabetes 61 (5), 1017-1024, 2012
462012
Enabling secure location-based services in mobile cloud computing
Y Zhu, D Ma, D Huang, C Hu
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 27-32, 2013
352013
How to use attribute-based encryption to implement role-based access control in the cloud
Y Zhu, D Ma, CJ Hu, D Huang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
292013
Risk assessment for cooperative automated driving
D Dominic, S Chhawri, RM Eustice, D Ma, A Weimerskirch
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and …, 2016
282016
Authenticating query results in data publishing
D Ma, RH Deng, H Pang, J Zhou
International conference on information and communications security, 376-388, 2005
272005
The system can't perform the operation now. Try again later.
Articles 1–20