Recent Publications
- R.
Tindell, A. Mitchell, N. Sprague, and X. Wang. An empirical study of
two Bitcoin artifacts through deep learning. In the Proceedings of the
26th International Conference on Financial Cryptography and
Data Security (FC’22). May 2022
- X. Wang
and B. Huson. Robust
distributed symmetric-key encryption. Cryptology ePrint Archive:
Report 2020/1001
- X. Wang, B. Tjaden, and
R. Mata-Toledo. Cryptocurrencies. In AccessScience. McGraw-Hill Education.
http://dx.doi.org/10.1036/1097-8542.170500. 2016
- X. Wang, B. Tjaden, and M. H.
Heydari. Bitcoin for E-Commerce: Principles and Applications. In In Lee,
Editor, Encyclopedia of E-Commerce Development, Implementation, and
Management, Vol II, Chap 72, pages 1013-1030. IGI Global. 2016.
- Ben Rodes and X. Wang. Security
analysis of a Fingerprint-protected USB Drive. In Proceedings of the 2010 Annual Computer Security Applications
Conference (ACSAC). Pages 89-96. Austin, TX, USA. December 6~10, 2010.
- Xunhua Wang and Hua Lin.
Cryptography-based authentication for protecting cyber systems. In Hamid
R. Nemati and Li Yang, editors, Applied
Cryptography for Cyber Security and Defense: Information Encryption and
Cyphering, chapter 2, pages 32-50. Information Science Reference,
2010.
- Xunhua Wang, Ralph Grove, and
M. Hossain Heydari. Secure electronic voting with cryptography. In Hamid R
Nemati and Li Yang, editors, Applied
Cryptography for Cyber Security and Defense: Information Encryption and
Cyphering, chapter 12, pages 271-288. Information Science Reference,
2010.
- X. Wang and H. Lin. PAKE on the Web. International
Journal of Information Security and Privacy, 3(4):29-42, December 2009
- X. Wang, P. Huff, and B.
Tjaden. Improving the Efficiency of
Capture-resistant Biometric Authentication based on Set Intersection.
Proceedings the 24th Annual Computer Security Applications
Conference (ACSAC). Page 140-149. Anaheim, California, USA. December 8-12,
2008.
- X. Wang and D. Rine. “Secure Online DNS Dynamic Updates:
architecture and implementation.” International Journal of Information
Technology and Web Engineering. 2(3), 17-36. July-September, 2007.
- X. Wang and A. Wright. “Encryption-With-Redundancy for SCADA
Message Authentication.” Proceedings of the Third International
Conference on Applied Cryptography and Network Security (ACNS 2005),
Industrial and Short-Papers Track. Pages 80-93. June, 2005.
- X. Wang and S. Redwine. “Role
Sharing in Password-Enabled PKI”. Proceedings of the Third PKI
Research & Development Workshop. Pages 3-15. National Institute of Standards and Technology. April,
2004.
- X. Wang, M. H. Hossain and H.
Lin. “An Intrusion-Tolerant Password Authentication System”.
Proceedings of the 19th Annual Computer Security Applications Conference
(ACSAC). Pages 110-118. December, 2003.
- X. Wang and S. Redwine. “An
Efficient Threshold Password-Authenticated Key Exchange Protocol”.
Presented on the 3rd International Workshop on Cryptology and Network Security.
September, 2003. In Proceedings of the Ninth International Conference on
Distributed Multimedia Systems (DMS'2003), pages 714--717, Miami, Florida,
USA
- X. Wang. “Intrusion
Tolerant Password-Enabled PKI”. Proceedings of the 2nd Annual PKI
Research Workshop, Pages 58-67. April, 2003.
- With Y. Huang and D. Rine. “A
JCA-based Implementation Framework for Threshold Cryptography”.
Proceedings of the 17th Annual Computer Security Applications Conference
(ACSAC). Pages 85-91. December, 2001. New Orleans, LA, USA. IEEE CS Press
- With Y. Huang and D. Rine. “Towards
Mission Tamper-Resistant Mobile Agent-based Electronic Commerce”.
Presented at the First Asia Mobile Computing Conference, Malasia, November
1- 5, 2000.
- With Y. Huang, Y. Desmedt and
D. Rine. “Enabling Secure On-line DNS Dynamic Update”. Proceeding
of the 16th Annual Computer Security Applications Conference, P52-58.
December 12-15, 2000. New Orleans,
LA, USA.
IEEE CS Press.
Xunhua
(Steve) Wang 2022-07-26