[ Peer-Reviewed Conferences | Journals and Book Chapters | Patents]

JOURNALS (We are grateful for VT's open access fund.)

  1. Ke Tian, Danfeng Yao, Barbara Ryder, Gang Tan, and Guojun Peng.
    Code-heterogeneity Aware Detection for Repackaged Malware.
    IEEE Transactions on Dependable and Secure Computing (TDSC).
    Forthcoming. Jul. 2017.

  2. Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan, and Trent Jaeger
    Long-Span Program Behavior Modeling and Attack Detection
    ACM Transactions on Privacy and Security (TOPS). May 2017.

  3. Long Cheng, Fang Liu, and Danfeng Yao.
    Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions
    WIREs Data Mining and Knowledge Discovery. Wiley. 2017. Invited Review Paper

  4. Sazzadur Rahaman, Long Cheng, Danfeng Yao, He Li, and Jung-Min Park.
    Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
    Proceedings on Privacy Enhancing Technologies (PoPETs). De Gruyter Open. Accepted. (Journal paper of the hybrid venue PoPETs/PETS 2017).

  5. Hao Zhang, Danfeng Yao, Naren Ramakrishnan, and Zhibin Zhang.
    Causality Reasoning about Network Events for Detecting Stealthy Malware Activities.
    Computers & Security (C&S). 58: 180-198. Elsevier. 2016. (Patent Pending)

  6. Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng.
    Fast Detection of Transformed Data Leaks.
    IEEE Transactions on Information Forensics & Security (TIFS). 11(3): 528-542. 2016.

  7. Hussain Almohri, Layne T. Watson, Danfeng Yao, and Xinming Ou.
    Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming.
    IEEE Transactions on Secure and Dependable Computing (TDSC). 13(4): 474-487. 2016.

  8. Xiaokui Shu, Danfeng Yao, and Elisa Bertino.
    Privacy-Preserving Detection of Sensitive Data Exposure with Applications to Data-Leak Detection as a Service.
    IEEE Transactions on Information Forensics & Security (TIFS). 10(5). 1092-1103. May 2015.

  9. Karim O. Elish, Xiaokui Shu, Danfeng Yao, Barbara Ryder, and Xuxian Jiang.
    Profiling User-Trigger Dependence for Android Malware Detection.
    Computers & Security (C&S) . 49, 255--273. March 2015.

  10. Hussain M.J. Almohri, Danfeng (Daphne) Yao, and Dennis Kafura.
    Process Authentication for High System Assurance.
    IEEE Transactions on Dependable and Secure Computing (TDSC). 11(2), 168-180. March/April 2014.

  11. Kui Xu, Patrick Butler, Sudip Saha, and Danfeng (Daphne) Yao.
    DNS for Massive-Scale Command and Control.
    IEEE Transactions on Dependable and Secure Computing (TDSC). 10(3), 143-153. May/June 2013.

  12. Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, and Danfeng Yao.
    Data-Provenance Verification For Secure Hosts.
    IEEE Transactions on Dependable and Secure Computing (TDSC). 9(2), 173-183. March/April 2012.

  13. Deian Stefan, Xiaokui Shu, and Danfeng Yao.
    Robustness of Keystroke-Dynamics Based Biometrics Against Synthetic Forgeries.
    Computers & Security (C&S). 31. 109-121. 2012. Elsevier.

  14. Qian Yang, Danfeng Yao, Kaitlyn Muller, and James Garnett.
    Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises.
    Journal of Contingencies and Crisis Management.
    18(4), 231-241. 2010. Wiley-Blackwell.

  15. Jerry Rick Ramstetter, Yaling Yang, and Danfeng Yao.
    Applications and Security of Next-Generation User-Centric Wireless Systems.
    Future Internet, Special Issue on Security for Next Generation Wireless and Decentralized Systems. Editors: Ralf Steinmetz and Andre Koenig. 2010.
    (Invited Paper)

  16. Independently-Verifiable Decentralized Role-Based Delegation.
    Roberto Tamassia, Danfeng Yao, and William H. Winsborough.
    IEEE Transactions on Systems, Man, and Cybernetics (SMC), Part A. 40(6), 1206-1219. Nov. 2010.

  17. Notarized Federated ID Management and Authentication
    Michael T. Goodrich, Roberto Tamassia, and Danfeng Yao.
    Journal of Computer Security (JCS), 16(4): 399-418. 2008.

  18. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries.
    Yunhua Koglin, Danfeng Yao, and Elisa Bertino.
    IEEE Transactions on Parallel and Distributed Systems (TPDS). 19(5): 615-626. 2008.

  19. Compact and Anonymous Role-Based Authorization Chain.
    Danfeng Yao and Roberto Tamassia.
    ACM Transactions on Information and System Security (TISSEC). 12(3). Mar. 2009.

  20. Private Information: To Reveal or Not To Reveal.
    Danfeng Yao, Keith Frikken, Mike Atallah, Roberto Tamassia.
    ACM Transactions on Information and System Security (TISSEC). 12(1). Feb. 2008.

    BOOK CHAPTERS

  21. Xiaokui Shu, Fang Liu, and Danfeng Yao.
    Rapid Screening of Big Data Against Inadvertent Leaks. (Book Chapter)
    In Big Data: Theories, Applications and Concepts. Editors: Shui Yu and Song Guo. Springer. Forthcoming.

  22. Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes.
    Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, and Anna Lysyanskaya.
    InCryptology and Information Security Series on Identity-Based Cryptography.Editors: Marc Joye and Greg Nevens. IOS Press.

    REFEREED CONFERENCES AND WORKSHOPS (BY YEAR)

    2017

  23. Long Cheng, Ke Tian, and Danfeng Yao.
    Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
    In Proceedings of Annual Computer Security Applications Conference (ACSAC). Puerto Rico, US. Dec. 2017.
    (Acceptance rate: 19.7%)

  24. Sazzadur Rahaman and Danfeng (Daphne) Yao
    Program Analysis of Cryptography Implementations for Security
    In Proceedings of IEEE Secure Development Conference (SecDev)
    Cambridge, MA. Sep., 2017.

  25. Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, and Gang Wang.
    Measuring the Insecurity of Mobile Deep Links of Android.
    In Proceedings of the 26th USENIX Security Symposium. Vancouver, Canada. Aug. 2017. (Acceptance rate: 16.3%)

  26. Sazzadur Rahaman, Long Cheng, Danfeng Yao, He Li, and Jung-Min Park.
    Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
    The 17th Privacy Enhancing Technologies Symposium (PETS). Minneapolis, MN. Jul. 2017. (Acceptance rate: 21.7%)

  27. Hussain Almohri, Long Cheng, Danfeng Yao, and Homa Alemzadeh.
    On Threat Modeling and Mitigation of Medical Cyber-Physical Systems.
    In Proceedings of IEEE International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT), in conjunction with the IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). Philadelphia, PA. Jul. 2017. (Invited paper)

  28. Danfeng Yao.
    Cloud Data Analytics for Security: Applications, Challenges, and Opportunities
    In Proceedings of Security in Cloud Computing (SCC) Workshop, in conjunction with ASIACCS. Abu Dhabi, UAE. Apr., 2017.
    Keynote speech SLIDES are here.

  29. Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish and Barbara G. Ryder.
    MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks.
    In Proceedings of Mobile Security Technologies (MoST) Workshop, in conjunction with the IEEE Symposium on Security and Privacy. San Jose, CA. May 2017. (Acceptance rate: 33%)

  30. Amiangshu Bosu, Fang Liu, Danfeng Yao, and Gang Wang.
    Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
    In Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS). Apr. 2017. (Acceptance rate: 20%)

    DIALDroid SLIDES HERE

    2016

  31. Hao Zhang, Danfeng Yao, and Naren Ramakrishnan.
    Causality-based Sensemaking of Network Traffic for Android Application Security.
    In Proceedings of 9th ACM Workshop on Artificial Intelligence and Security (AISec), co-located with the 23nd ACM Conference on Computer and Communications (CCS). October 28, 2016, Hofburg Palace, Vienna, Austria. (Acceptance rate: 32%)

  32. Ke Tian, Danfeng Yao, Barbara Ryder, and Gang Tan.
    Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware.
    In Proceedings of Mobile Security Technologies (MoST), in conjunction with the IEEE Symposium on Security and Privacy. San Jose, CA. May 2016. (Acceptance rate: 29%)

  33. Kui Xu, Ke Tian, Danfeng Yao, and Barbara Ryder.
    A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity.
    In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Toulouse, France. Jun., 2016. (Acceptance rate: 22%)

  34. Xiaodong Yu, Wu-chun Feng, Danfeng Yao, and Michela Becchi.
    O3FA: A Scalable, Finite Automata-based, Pattern-Matching Engine for Out-of-Order Packet Inspection in IDS.
    In Proceedings of The 12th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), co-located with the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI). Santa Clara, CA. Mar. 2016. (Acceptance rate: 21%).

  35. Xiaokui Shu, Nikolay Laptev, and Danfeng Yao.
    DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution.
    In Proceedings of 19th International Conference on Extending Database Technology (EDBT), co-located with International Conference on Database Theory (ICDT). Mar., 2016. Bordeaux, France.
    (with Yahoo! Lab)

    2015

  36. Xiaokui Shu, Danfeng Yao, and Barbara Ryder.
    A Formal Framework for Program Anomaly Detection.
    In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
    Kyoto, Japan. Nov. 2015. (Acceptance rate: 23.5%.)
    RAID SLIDES

  37. Xiaokui Shu, Danfeng Yao, and Naren Ramakrishnan.
    Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
    In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS).
    Denver, Colorado. Oct. 2015. (Acceptance rate: 19.8%.)
    (Featured in Communications of ACM)
    CCS SLIDES

  38. Kui Xu, Danfeng Yao, Barbara Ryder, and Ke Tian.
    Probabilistic Program Modeling for High-Precision Anomaly Classification.
    In Proceedings of the 2015 IEEE Computer Security Foundations Symposium (CSF). Verona, Italy. Jul. 2015. (Acceptance rate: 35%.)

  39. Karim Elish, Danfeng Yao, and Barbara Ryder.
    On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions
    In Proceedings of Mobile Security Technologies (MoST), in conjunction with the IEEE Symposium on Security and Privacy. San Jose, CA. May 2015. (Acceptance rate: 30%)

  40. Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng.
    Rapid and Parallel Content Screening for Detecting Transformed Data Exposure.
    In Proceedings of the International Workshop on Security and Privacy in Big Data (BigSecurity), co-located with IEEE INFOCOM. Hong Kong. April, 2015. (Acceptance rate: 26%)

  41. Hao Zhang, Maoyuan Sun, Danfeng Yao, and Chris North.
    Visualizing Traffic Causality for Analyzing Network Anomalies
    In Proceedings of International Workshop on Security and Privacy Analytics (SPA), co-located with ACM CODASPY. San Antonio, TX. Mar. 2015.

  42. Fang Liu, Xiaokui Shu, Danfeng Yao, and Ali Butt.
    Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce.
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Mar. 2015. (Acceptance rate: 21%)
    (Featured by S2ERC, an NSF I/UCRC on software security)

  43. Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng.
    Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing.
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Mar. 2015. Extended abstract. (Best Poster Award)

  44. Yanzhi Dou, Kexiong (Curtis) Zeng, Yaling Yang, and Danfeng Yao.
    MadeCR: Correlation-based Malware Detection for Cognitive Radio.
    In Proceedings of IEEE Conference on Computer Communications (INFOCOM). Hong Kong. Apr. 2015. (Acceptance rate: 19%).

    2014

  45. Britton Wolfe, Karim Elish, and Danfeng Yao.
    High Precision Screening for Android Malware with Dimensionality Reduction.
    In Proceedings of the 13th International Conference on Machine Learning and Applications (ICMLA). Detroit, MI. Dec. 2014. (Acceptance rate: 35%)

  46. Kui Xu, Danfeng Yao, Manuel A. Perez-Quinones, Casey Link, and E. Scott Geller.
    Role-Playing Game for Studying User Behaviors in Security: A Case Study on Email Secrecy.
    In Proceedings of the IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Miami, FL. Oct. 2014. (Acceptance rate: 20%).

  47. Britton Wolfe, Karim Elish, and Danfeng Yao.
    Comprehensive Behavior Profiling for Proactive Android Malware Detection.
    In Proceedings of the 7th International Conference on Information Security (ISC). Hong Kong. Oct. 2014. (Acceptance rate: 19%).

  48. Hao Zhang, Danfeng Yao and Naren Ramakrishnan.
    Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery.
    In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). Kyoto, Japan. Jun. 2014. (Acceptance rate: 20%).

  49. Hussain Almohri, Danfeng Yao, and Dennis Kafura.
    DroidBarrier: Know What is Executing on Your Android.
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Mar. 2014. (Acceptance rate: 23.5%).

    2013

  50. Xiaokui Shu, John Smiy, Danfeng Yao, and Heshan Lin.
    Massive Distributed and Parallel Log Analysis For Organizational Security.
    In Proceedings of the First International Workshop on Security and Privacy in Big Data (BigSecurity), in conjunct with Globecom. Atlanta, GA. Dec. 2013. (Acceptance rate: 35%).

  51. Huijun Xiong, Qingji Zheng, Xinwen Zhang, and Danfeng Yao.
    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud.
    In Proceedings of the first IEEE Conference on Communications and Network Security (CNS).
    Washington, D. C. Oct. 2013. (Acceptance rate: 28%).

  52. Device-Based Isolation for Securing Cryptographic Keys
    Karim Elish, Yipan Deng, Danfeng Yao and Dennis Kafura.
    In Proceedings of the 3rd International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT).
    Halifax, Canada. Jun. 2013.

    2012

  53. A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols.
    Yipeng Wang, Xiaochun Yun, M. Zubair Shafiq, Alex X. Liu, Zhibin Zhang, Liyan Wang, Danfeng Yao, Yongzheng Zhang, and Li Guo.
    In 20th IEEE International Conference on Network Protocols (ICNP). Austin, TX. Oct. 2012. (Acceptance rate: 23%). (Best Paper Award)

  54. Xiaokui Shu and Danfeng Yao.
    Data Leak Detection As a Service.
    In Proceedings of the 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM). Padua, Italy. Sep. 2012.
    (Acceptance rate: 29%).

    Online demo can be found at HERE.

    SECURECOMM slides on privacy-preserving data leak detection.

  55. Hao Zhang, William Banick, Danfeng Yao and Naren Ramakrishnan.
    User Intention-Based Traffic Dependence Analysis For Anomaly Detection. In Proceedings of Workshop on Semantics and Security (WSCS), in conjunction with the IEEE Symposium on Security and Privacy. San Francisco, CA. May 2012.

    The submitted journal version manuscript of our traffic dependency analysis work and CR-Miner prototype can be found HERE.

  56. Karim O. Elish, Danfeng Yao, and Barbara G. Ryder.
    User-Centric Dependence Analysis For Identifying Malicious Mobile Apps. In Proceedings of the Workshop on Mobile Security Technologies (MoST), in conjunction with the IEEE Symposium on Security and Privacy. San Francisco, CA. May 2012.

    Full version technical report can be found HERE.

  57. Hussain M. J. Almohri, Danfeng Yao, and Dennis Kafura.
    Identifying Native Applications with High Assurance
    In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY) . San Antonio, TX, USA. Feb. 2012. (Acceptance rate: 25%).

    The submitted journal version manuscript of our process authentication work and A2 prototype system can be found HERE.

  58. Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, and Yonggang Wen.
    Towards End-to-End Secure Content Storage and Delivery with Public Cloud.
    In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX, USA. Feb. 2012. (Acceptance rate: 25%).

    2011

  59. Kui Xu, Danfeng Yao, Qiang Ma, and Alex Crowell.
    Detecting Infection Onset With Behavior-Based Policies.
    In Proceedings of the Fifth International Conference on Network and System Security (NSS). Milan, Italy. Sep. 2011. (Acceptance rate: 22%).

  60. Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy.
    K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access.
    In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). Lecture Notes in Computer Science (LNCS). Sep. 2011. London, UK. (Acceptance rate: 24%).

  61. Huijun Xiong, Xinwen Zhang, Wei Zhu and Danfeng Yao.
    CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services.
    In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). Lecture Notes in Computer Science (LNCS). Sep. 2011. London, UK.

  62. Patrick Butler, Kui Xu, and Danfeng Yao.
    Quantitatively Analyzing Stealthy Communication Channels.
    In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS). Lecture Notes in Computer Science. Jun. 2011 (LNCS). Acceptance rate: 18% (31/172).

    The submitted journal version manuscript of our DNS-based botnet command and control work can be found HERE.

  63. Yipeng Wang, Zhibin Zhang, Danfeng Yao, Buyun Qu, and Li Guo.
    Inferring Protocol-State Machine from Network Traces: A Probabilistic Description Method.
    In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS). Lecture Notes in Computer Science (LNCS). Jun. 2011. Acceptance rate: 18% (31/172).

    2010

  64. Deian Stefan and Danfeng Yao.
    Keystroke-Dynamics Authentication Against Synthetic Forgeries. (Best Paper Award)
    In Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Chicago, IL. Nov. 2010.

  65. Deian Stefan, Chehau Wu, Danfeng Yao, and Gang Xu.
    Knowing Where Your Input is From: Kernel-Level Provenance Verification.
    In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS). Pages 71-87. June, 2010. Beijing, China. (Patented)

  66. Chih-Cheng Chang, Brian Thompson, Hui Wang, and Danfeng Yao.
    Towards Publishing Recommendation Data With Predictive Anonymization .
    In Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS). Apr. 2010.

    2009

  67. Huijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, and Danfeng Yao.
    User-Assisted Host-Based Detection of Outbound Malware Traffic.
    In Proceedings of International Conference on Information and Communications Security (ICICS). Beijing, P.R. China. Dec. 2009.

  68. Nitya H. Vyas, Anna Squicciarini, Chih-Cheng Chang, and Danfeng Yao.
    Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations.
    In Proceedings of International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Washington DC. Nov. 2009.

  69. Anitra Babic, Huijun Xiong, Danfeng Yao, and Liviu Iftode.
    Building Robust Authentication Systems With Activity-Based Personal Questions. ( Featured in NSF News)
    In Proceedings of ACM Workshop on Assurable & Usable Security Configuration (SafeConfig). Collocated with the ACM Conference on Computer and Communications Security (CCS). Chicago, IL. Nov. 2009.

  70. Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy.
    Privacy-aware Identity Management for Client-side Mashup Applications.
    In Proceedings of the Fifth ACM Workshop on Digital Identity Management (DIM). Collocated with ACM Conference on Computer and Communications Security (CCS). Chicago, IL. Nov. 2009.

  71. Brian Thompson, Danfeng Yao, Stuart Haber, William G. Horne, and Tomas Sander.
    Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.
    In Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS). Seattle, WA. Aug. 2009.

  72. Tzvika Chumash and Danfeng Yao.
    Detection and Prevention of Insider Threats in Database Driven Web Services
    In Proceedings of The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM). Pages 117-132. Jun. 2009. West Lafayette, IN.

  73. Brian Thompson and Danfeng Yao.
    Union-Split Clustering Algorithm and Social Network Anonymization.
    In Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS). Mar. 2009. Sydney, Australia.

    2008

  74. Tuan Phan and Danfeng Yao.
    Select Audit: A Secure and Efficient Audit Framework for Networked Virtual Environments.
    Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Nov. 2008. Orlando, FL.

  75. Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy
    Design and Implementation of an Open Framework for Secure Communication in Mashup Applications
    Annual Computer Security Applications Conference (ACSAC). December 8-12, 2008, Anaheim, California, USA.

  76. Securing Geographic Routing in Mobile Ad-hoc Networks.
    Vivek Pathak, Danfeng Yao, and Liviu Iftode
    International Conference on Vehicular Electronics and Safety (ICVES). September 22-24, 2008. Columbus, Ohio.

  77. Improving Email Trustworthiness through Social-Group Key Authentication
    Vivek Pathak, Danfeng Yao, and Liviu Iftode
    Fifth Conference on Email and Anti-Spam (CEAS). Aug. 21-22, 2008. Microsoft Research Silicon Valley, Mountain View, California.

  78. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
    Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander , Satoru Tezuka, Danfeng Yao.
    ACM Symposium on Information, Computer & Communication Security (ASIACCS) 2008.

    2007

  79. Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust.
    Danfeng Yao, Roberto Tamassia, and Seth Proctor.
    In Proceedings Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM). Moncton, New Brunswick, Canada. Jul. 2007.

  80. Privacy-Preserving Schema Matching Using Mutual Information.
    Isabel F. Cruz, Roberto Tamassia, and Danfeng Yao.
    Extended Abstract. In Proceedings of the 21th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec) . Redondo Beach, CA. Jul. 2007. Extended Abstract.
    Slides (.ppt).

  81. Decentralized Authorization and Data Security in Web Content Delivery.
    Danfeng Yao, Yunhua Koglin, Elisa Bertino, and Roberto Tamassia.
    In Proceedings of the 22nd ACM Symposium on Applied Computing (SAC). Seoul, Korea. March, 2007.
    Slides (.ppt).

    2006

  82. Point-Based Trust: Define How Much Privacy Is Worth. (Best Student Paper Award)
    Danfeng Yao, Keith Frikken, Mike Atallah, Roberto Tamassia.
    In Proceedings of the Eighth International Conference on Information and Communications Security (ICICS). Lecture Notes in Computer Science (LNCS). Volume 4307, pages 190 - 209. Ning, Qing, and Li (Eds). Springer. Raleigh, North Carolina, USA. December, 2006.
    Full version.
    Slides (.ppt).
    (Best Student Paper Award)

  83. Cascaded Authorization with Anonymous-Signer Aggregate Signatures.
    Danfeng Yao and Roberto Tamassia.
    In Proceedings of the Seventh Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop (IAW). West Point, New York. June 2006.
    Full version.
    Slides (.ppt)

  84. Notarized Federated Identity Management for Increased Trust in Web Services.
    Michael T. Goodrich, Roberto Tamassia, and Danfeng Yao.
    In Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec). Sophia Antipolis, France. July 2006.
    Full version.
    Slides (.ppt)

    2005

  85. Visualization of Automated Trust Negotiation.
    Danfeng Yao, Michael Shin, Roberto Tamassia, and William H. Winsborough.
    In Proceedings of the Workshop on Visualization for Computer Security (VizSEC), in conjunction with Vis 2005 and InfoVis 2005. Pages 65-74. IEEE Press. Minneapolis, MN. October 2005.
    Slides (.ppt)

  86. On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing.
    Danfeng Yao, Roberto Tamassia, and Seth Proctor.
    In Proceedings of the First Annual IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm). Pages 157-168. IEEE Press. Athens, Greece. September 2005.
    Slides (.ppt)

  87. Accredited DomainKeys: A Service Architecture for Improved Email Validation.
    Michael T. Goodrich, Roberto Tamassia, and Danfeng Yao.
    In the Second Conference on Email and Anti-Spam (CEAS). Stanford University, CA. July 2005.
    Slides (.ppt)

    2004

  88. Role-Based Cascaded Delegation.
    Roberto Tamassia, Danfeng Yao, and William H. Winsborough.
    In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT). Pages: 146 - 155. ACM Press. Yorktown Heights, NY, June 2004.
    Slides (.ppt)

  89. ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
    Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, and Anna Lysyanskaya.
    In Proceeding of the ACM Conference on Computer and Communications Security (CCS). Pages: 354 - 363. ACM Press. Washington DC, 2004.
    Full version
    Slides (.ppt)