





Recent Publications
- R.
Tindell, A. Mitchell, N. Sprague, and X. Wang. An empirical study of
two Bitcoin artifacts through deep learning. To appear in the
Proceedings of the 26th International Conference on Financial
Cryptography and Data Security (FC’22). Feb. 2022
- X. Wang
and B. Huson. Robust distributed symmetric-key
encryption. Cryptology ePrint Archive:
Report 2020/1001
- X. Wang, B. Tjaden, and R. Mata-Toledo. Cryptocurrencies. In AccessScience. McGraw-Hill Education.
http://dx.doi.org/10.1036/1097-8542.170500. 2016
- X. Wang, B. Tjaden, and M. H. Heydari.
Bitcoin for E-Commerce: Principles and Applications. In In Lee, Editor,
Encyclopedia of E-Commerce Development, Implementation, and Management,
Vol II, Chap 72, pages 1013-1030. IGI Global. 2016.
- Ben Rodes
and X. Wang. Security
analysis of a Fingerprint-protected USB Drive. In Proceedings of the 2010 Annual Computer Security Applications
Conference (ACSAC). Pages 89-96. Austin, TX, USA. December 6~10, 2010.
- Xunhua Wang and Hua Lin.
Cryptography-based authentication for protecting cyber systems. In Hamid
R. Nemati and Li Yang, editors, Applied
Cryptography for Cyber Security and Defense: Information Encryption and
Cyphering, chapter 2, pages 32-50. Information Science Reference,
2010.
- Xunhua Wang, Ralph Grove, and
M. Hossain Heydari. Secure electronic voting
with cryptography. In Hamid R Nemati and Li Yang, editors, Applied Cryptography for Cyber Security
and Defense: Information Encryption and Cyphering, chapter 12, pages
271-288. Information Science Reference, 2010.
- X. Wang and H. Lin. PAKE on the Web. International
Journal of Information Security and Privacy, 3(4):29-42, December 2009
- X. Wang, P. Huff, and B. Tjaden. Improving
the Efficiency of Capture-resistant Biometric Authentication based on Set
Intersection. Proceedings the 24th Annual Computer Security
Applications Conference (ACSAC). Page 140-149. Anaheim, California, USA.
December 8-12, 2008.
- X. Wang and D. Rine. “Secure
Online DNS Dynamic Updates: architecture and implementation.”
International Journal of Information Technology and Web Engineering. 2(3),
17-36. July-September, 2007.
- X. Wang and A. Wright. “Encryption-With-Redundancy for SCADA
Message Authentication.” Proceedings of the Third International
Conference on Applied Cryptography and Network Security (ACNS 2005),
Industrial and Short-Papers Track. Pages 80-93. June, 2005.
- X. Wang and S. Redwine. “Role
Sharing in Password-Enabled PKI”. Proceedings of the Third PKI
Research & Development Workshop. Pages 3-15. National Institute of Standards and Technology. April,
2004.
- X. Wang, M. H. Hossain and H.
Lin. “An Intrusion-Tolerant Password Authentication System”.
Proceedings of the 19th Annual Computer Security Applications Conference
(ACSAC). Pages 110-118. December, 2003.
- X. Wang and S. Redwine. “An
Efficient Threshold Password-Authenticated Key Exchange Protocol”.
Presented on the 3rd International Workshop on Cryptology and Network
Security. September, 2003. In Proceedings of the Ninth International
Conference on Distributed Multimedia Systems (DMS'2003), pages 714--717, Miami, Florida,
USA
- X. Wang. “Intrusion
Tolerant Password-Enabled PKI”. Proceedings of the 2nd Annual PKI
Research Workshop, Pages 58-67. April, 2003.
- With Y. Huang and D. Rine. “A
JCA-based Implementation Framework for Threshold Cryptography”.
Proceedings of the 17th Annual Computer Security Applications Conference
(ACSAC). Pages 85-91. December, 2001. New Orleans, LA, USA. IEEE CS Press
- With Y. Huang and D. Rine. “Towards
Mission Tamper-Resistant Mobile Agent-based Electronic Commerce”.
Presented at the First Asia Mobile Computing Conference, Malasia, November 1- 5, 2000.
- With Y. Huang, Y. Desmedt and D. Rine. “Enabling Secure On-line DNS
Dynamic Update”. Proceeding of the 16th Annual Computer Security
Applications Conference, P52-58. December 12-15, 2000. New Orleans, LA, USA. IEEE CS Press.
Xunhua
(Steve) Wang 2021-12-28