Huijun Xiong
Huijun Xiong
Samsung Research America
Verified email at
Cited by
Cited by
Towards name-based trust and security for content-centric network
X Zhang, K Chang, H Xiong, Y Wen, G Shi, G Wang
2011 19th IEEE International Conference on Network Protocols, 1-6, 2011
Towards end-to-end secure content storage and delivery with public cloud
H Xiong, X Zhang, D Yao, X Wu, Y Wen
Proceedings of the second ACM conference on Data and Application Security …, 2012
Cloudseal: End-to-end content protection in cloud-based storage and delivery services
H Xiong, X Zhang, W Zhu, D Yao
International Conference on Security and Privacy in Communication Systems …, 2011
Data-provenance verification for secure hosts
K Xu, H Xiong, C Wu, D Stefan, D Yao
IEEE Transactions on Dependable and Secure Computing 9 (2), 173-183, 2011
User-assisted host-based detection of outbound malware traffic
H Xiong, P Malhotra, D Stefan, C Wu, D Yao
International Conference on Information and Communications Security, 293-307, 2009
Building robust authentication systems with activity-based personal questions
A Babic, H Xiong, D Yao, L Iftode
Proceedings of the 2nd ACM workshop on Assurable and usable security …, 2009
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems
J Fu, H Xiong, Z Li, H Zhang
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
Cloudsafe: Securing data processing within vulnerable virtualization environments in the cloud
H Xiong, Q Zheng, X Zhang, D Yao
2013 IEEE Conference on Communications and Network Security (CNS), 172-180, 2013
Strategy optimization for p2p security using bloomfilter
J Fu, Y Xu, H Xiong, W Wu
2009 International Conference on Multimedia Information Networking and …, 2009
Personal Anomaly Detection and Smart-Phone Security
H Xiong, DD Yao
20th Virginia Tech Symposium on Wireless Personal Communications, 2010
Secure Data Service Outsourcing with Untrusted Cloud
H Xiong
Virginia Polytechnic Institute and State University, 2013
Storytelling Security: User-Intention Based Traffic Sanitization
H Xiong, DD Yao, Z Zhang
Computer Science Technical Reports, 2010
The system can't perform the operation now. Try again later.
Articles 1–12