HomepagePublicationsTeachingAdvisingUPECoolCode

Recent Publications

  • R. Tindell, A. Mitchell, N. Sprague, and X. Wang. An empirical study of two Bitcoin artifacts through deep learning. In the Proceedings of the 26th International Conference on Financial Cryptography and Data Security (FC’22). May 2022
  • X. Wang and B. Huson. Robust distributed symmetric-key encryption. Cryptology ePrint Archive: Report 2020/1001
  • X. Wang, B. Tjaden, and R. Mata-Toledo. Cryptocurrencies. In AccessScience. McGraw-Hill Education. http://dx.doi.org/10.1036/1097-8542.170500. 2016
  • X. Wang, B. Tjaden, and M. H. Heydari. Bitcoin for E-Commerce: Principles and Applications. In In Lee, Editor, Encyclopedia of E-Commerce Development, Implementation, and Management, Vol II, Chap 72, pages 1013-1030. IGI Global. 2016.
  • Ben Rodes and X. Wang. Security analysis of a Fingerprint-protected USB Drive. In Proceedings of the 2010 Annual Computer Security Applications Conference (ACSAC). Pages 89-96. Austin, TX, USA. December 6~10, 2010.
  • Xunhua Wang and Hua Lin. Cryptography-based authentication for protecting cyber systems. In Hamid R. Nemati and Li Yang, editors, Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, chapter 2, pages 32-50. Information Science Reference, 2010.
  • Xunhua Wang, Ralph Grove, and M. Hossain Heydari. Secure electronic voting with cryptography. In Hamid R Nemati and Li Yang, editors, Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, chapter 12, pages 271-288. Information Science Reference, 2010.
  • X. Wang and H. Lin. PAKE on the Web. International Journal of Information Security and Privacy, 3(4):29-42, December 2009
  • X. Wang, P. Huff, and B. Tjaden. Improving the Efficiency of Capture-resistant Biometric Authentication based on Set Intersection. Proceedings the 24th Annual Computer Security Applications Conference (ACSAC). Page 140-149. Anaheim, California, USA. December 8-12, 2008.
  • X. Wang and D. Rine. “Secure Online DNS Dynamic Updates: architecture and implementation.” International Journal of Information Technology and Web Engineering. 2(3), 17-36. July-September, 2007.
  • X. Wang and A. Wright. “Encryption-With-Redundancy for SCADA Message Authentication.” Proceedings of the Third International Conference on Applied Cryptography and Network Security (ACNS 2005), Industrial and Short-Papers Track. Pages 80-93. June, 2005.
  • X. Wang and S. Redwine. “Role Sharing in Password-Enabled PKI”. Proceedings of the Third PKI Research & Development Workshop. Pages 3-15. National Institute of Standards and Technology. April, 2004.
  • X. Wang, M. H. Hossain and H. Lin. “An Intrusion-Tolerant Password Authentication System”. Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC). Pages 110-118. December, 2003.
  • X. Wang and S. Redwine. “An Efficient Threshold Password-Authenticated Key Exchange Protocol”. Presented on the 3rd International Workshop on Cryptology and Network Security. September, 2003. In Proceedings of the Ninth International Conference on Distributed Multimedia Systems (DMS'2003), pages 714--717, Miami, Florida, USA
  • X. Wang. “Intrusion Tolerant Password-Enabled PKI”. Proceedings of the 2nd Annual PKI Research Workshop, Pages 58-67. April, 2003.
  • With Y. Huang and D. Rine. “A JCA-based Implementation Framework for Threshold Cryptography”. Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC). Pages 85-91. December, 2001. New Orleans, LA, USA. IEEE CS Press
  • With Y. Huang and D. Rine. “Towards Mission Tamper-Resistant Mobile Agent-based Electronic Commerce”. Presented at the First Asia Mobile Computing Conference, Malasia, November 1- 5, 2000.
  • With Y. Huang, Y. Desmedt and D. Rine. “Enabling Secure On-line DNS Dynamic Update”. Proceeding of the 16th Annual Computer Security Applications Conference, P52-58. December 12-15, 2000. New Orleans, LA, USA. IEEE CS Press.

Xunhua (Steve) Wang 2022-07-26