Publications [back ]

     

    2016

  1. D. Dominic, S. Chhawri, R. Eustice, D. Ma, and A. Weimerskirch
    Risk accessment for cooperative automated driving
    ACM CCS Workshop CPS-SPC, October 2016.

  2. J. Liu, D. Ma, A. Weimerskirch, and H. Zhu
    Secure and Safe Automated Vehicle Platooning.
    IEEE Reliability, August 2016.

  3. J. Liu, H. Li, H. Zhu, N. Ruan, and D. Ma
    Who moved my cheese: Towards automatic and fine-grained classification and modelling Ad network.
    GlobeCom., October 2016.

  4. Y. Fu and D. Ma
    Mobile computing and security laboratory development.
    ASEE Conference, June 2016..

  5. S. Chhawri, D. Dominic, R. Eustic, D. Ma, and A. Weimerskirch
    Threat analysis for cooperative automated driving.
    4th escar USA, June 2016.

  6. H. Li, Z. Xu, H. Zhu, D. Ma, S. Li, and K. Xing
    Demographics inference through Wi-Fi network traffic analysis
    Infocom, April 2016.

  7. 2015

  8. H. Li, D. Ma, N. Saxena, B. Shrestha, and Yan Zhu
    Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures.
    IEEE Trans. on Information Forensics and Security (TIFS), Vol. 10, May 2015.

  9. Y. Zhu, D. Ma, C. Hu, G. Ahn, and H. Hu
    SecureSnaps: A new forward secrecy cryptosystem for self-destructing messages in mobile services.
    IEEE Conference in Mobile Services, June 2015.

  10. Y. Zhu, X. Wang, D. Ma, R. Guo
    Identity-set-based broadcast encryption supporting cut-or-select with short ciphertext.
    ACM AsiaCCS, Apr. 2015.

  11. 2014

  12. K. Ren, Q. Wang, D. Ma, X. Jia
    Securing Emerging Short Range Wireless Communications: the State of the Art.
    IEEE Wireless Communications, December 2014.

  13. Y. Zhu, D. Ma, C. Hu, G. Ahn, and H. Hu
    Secure and Efficient Random Functions with Variable-Length Output.
    Journal of Network and Computer Applications, Vol. 45, Oct. 2014..

  14. B. Zhang, Q. Zhan, S. Chen, M. Li, K. Ren, C. Wang and D. Ma
    PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
    IEEE Internet of Things Journal (IoT), Vol. 1, Issu. 1, January 2014.

    2013

  15. T. Halevi, H. Li, D. Ma, N. Saxena, J. Voris, and T. Xiang
    Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
    IEEE Transactions on Emerging Topics in Computing (TETC), Vol. 1, Issu. 2, December 2013..

  16. Y. Zhu, G. Ahn, H. Hu, D. Ma, and S. Wang.
    Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy.
    IEEE Trans. on Information Forensics and Security (TIFS), Vol. 8, Issu. 12, December 2013.

  17. Y. Zhu, D. Ma, and S. Wang.
    Enabling secure location-based services in mobile cloud computing.
    Mobile Cloud Computing Workshop (MCC), Aug. 2013.

  18. Y. Zhu, D. Ma, and S. Wang.
    Efficient identity-based encryption without pairings and key escrow for mobile devices.
    International Conference on Wireless Algorithms, Systems, and Applications (WASA), Aug. 2013.

  19. Y. Zhu, D. Ma, C. Hu, and D. Huang.
    How to use attribute-based encryption to implement role-based access control in the cloud.
    ACM Workshop on Security in Cloud Computing (SCC), May 2013.

  20. D. Ma, Y. Zhu, and M. Yu.
    End-to-end aggregate authentication of time-series data. 
    ACM Workshop on Asia Public-Key Cryptography (AsiaPKC), May 2013.

  21. H. Li, D. Ma, N. Saxena, B. Shrestha, and Y. Zhu
    Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures.
    ACM Conference on Wireless Network Security (WiSec), Apr. 2013.

  22. D. Ma, Nitesh Saxena, T. Xiang, and Y. Zhu
    Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
    IEEE Transactions on Distributed and Secure Computing (TDSC), Vol. 10, Issu. 2, March-April 2013.

    2012

  23. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
    Self-healing in Unattended Wireless Sensor Networks.
    ACM Transactions on Sensor Networks (ToSN), Vol. 9, No. 1, Nov. 2012

  24. Y. Zhu, S. Wang, H. Hu, G. Ahn, and D. Ma.
    Secure collaborative integrity verification for hybrid cloud environments.
    International Journal of Cooperative Information Systems (IJCIS), Vol. 21, No. 3, 2012.

  25. Y. Zhu, S. Wang, D. Ma, H. Hu and G. Ahn.
    Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices.
    IEEE Global Communications Conference, Exhibition and Industry Forum (GlobeCom), Dec. 2012.

  26. T. Halevi, D. Ma, N. Saxena and T. Xiang.
    Secure Proximity Detection for NFC Devices based on Ambient Sensor Data.
    European Symposium on Research in Computer Security (ESORICS), Sept. 2012.

  27. Y. Zhu, D. Ma, and S. Wang.
    Secure Data Retrieval of Outsourced Data with Complex Query Support.
    ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), Jun. 2012.

  28. D. Ma, A. K. Prasad, N. Saxena, and T. Xiang.
    Location-Aware and Safe Card: Enhancing RFID Security and Privacy via Location Sensing.
    ACM Conference on Wireless Network Security (WiSec), Apr. 2012.

  29. T. Halevi, S. Lin, D. Ma, A. K. Prasad, N. Saxena, J. Voris, and T. Xiang.
    Sensing-enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model.
    International Conference on Pervasive Computing and Communications (PerCom), Mar. 2012.

  30. D. Ma and N. Saxena.
    Towards Sensing-enabled RFID Security and Privacy.
    Book Chapter, Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID. IGI Global, Aug. 2012.

    2011

  31. D. Ma and N. Saxena.
    A Context-Aware Approach to Defend Against Unauthorized Reading and Relay Attacks in RFID Systems.
    Security and Communication Networks (SCN), Dec. 2011.

  32. D. Ma and C. Soriente.
    Building Trust for k-congenial Secret Groups.
    6th International Conference on Broadband and Wireless Computing, Communication and Applications. Oct. 2011.

  33. D. Ma and A. K Prasad.
    A Context-aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems.
    ICCCN Workshop on Wireless Mesh and Ad Hoc Networks (ICCCN-WiMAN), Aug. 2011

  34. D. Ma and H. Jin
    Content Usage Tracking in Superdistribution,
    IEEE Consumer Communications and Networking Conference (CCNC), Jan. 2011.

    2010

  35. D. Ma and G. Tsudik
    Security and Privacy in Emerging Wireless Networks,
    IEEE Wireless Communications, Vol. 17, Issue 5, 2010.

  36. D. Ma and G. Tsudik
    IRRES: Intrusion Resilient Remote Email Storage,
    ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), 2010.

    2009

  37. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    ACM Transactions on Storage, Vol. 5, No. 1, 2009.

  38. D. Ma, C. Soriente and G. Tsudik
    New Adversary and New Threats in Unattended Sensors Networks,
    IEEE Network, Vol. 23, No. 2, 2009.

  39. D. Ma
    Intrusion Resilience for Unattended Devices,
    PhD Dissertation, University of California, Irvine, 2009.

  40. R. Chen, D. Ma, and A. Regan
    TARI: Meeting Delay Requirements in VANETs with Efficient Authentication and Revocation,
    International Conference on Wireless Access in Vehicular Environments (WAVE), 2009.

    2008:

  41. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.

  42. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
    POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.

  43. D. Ma and G. Tsudik
    DISH: Distributed Self-Healing (in Unattended Sensor Networks)
    Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.

  44. D. Ma, C. Soriente and G. Tsudik
    Self-defense in Unattended Wireless Sensor Networks,
    Poster, Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2008.

  45. D. Ma
    Practical Forward Secure Sequential Aggregate Signatures,
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008.

    2007:

  46. D. Ma and G. Tsudik
    Forward-Secure Aggregate Authentication,
    IEEE Symposium on Research in Security and Privacy (S&P), 2007.

  47. Yongdong Wu, Di Ma and Robert H. Deng
    Flexible Access Control to JPEG2000 Image Code-streams,
    IEEE Trans. on Multimedia, vol. 9, no. 6, 2007.

  48. F. Lin, H.S. Seah, Z. Wu and D. Ma
    Voxelization and Fabrication of Freeform Models, 
    Virtual and Physical Prototyping, vol. 2, no. 2, 2007.

  49. D. Ma
    Securing Feedback Service for Wireless Sensor Networks,
    Information Security Practice and Experience Conference (ISPEC), 2007.

    2005:

  50. D. Ma, R. H. Deng, H. Pang and J. Zhou
    Authenticating Query Results in Data Publishing, 
    International Conference on Information and Communications Security (ICICS), 2005.

  51. R. H. Deng, D. Ma, W. Shao and Y. Wu
    Scalable Trusted Online Dissemination of JPEG2000 Images,
    ACM/Springer Multimedia Systems, vol. 11, 2005.

  52. R. H. Deng, Y. Wu, D. Ma
    Securing JPEG2000 Code-Streams,
    Book Chapter, Computer Security in the 21st Century (ISBN: 0-387-24005-5). Springer, 2005.

    2004:

  53. D. Ma, R. H. Deng, Y. Wu and T. Li
    Dynamic Access Control for Multi-privileged Group Communications,
    International Conference on Information and Communications Security (ICICS), 2004.

  54. T. Li, Y. Wu, D. Ma, H. Zhu and R. H. Deng, 
    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN,
    International Conference on Information and Communications Security (ICICS), 2004.

  55. Y. Wu, D. Ma, T. Li and R. H. Deng
    Classify Encrypted Data in Wireless Sensor Networks,
    IEEE Vehicular Technology Conference (VTC), 2004.

     

  56. Y. Wu, D. Ma and R. H. Deng
    Progressive Protection of JPEG2000 Code-streams, 
    IEEE International Conference on Image Processing (ICIP), 2004.

  57. H. Wu and D. Ma
    Efficient and Secure Encryption Schemes for JPEG2000,
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2004

    2003:

  58. R. H. Deng, Y. Wu and D. Ma
    Securing JPEG2000 Code-streams,
    International Workshop on Advanced Developments in Software and Systems Security, 2003.

  59. Y. Wu, D. Ma and C. Xu
    Efficient Object-based Stream Authentication, 
    International Conference on Cryptology in India (IndoCrypto), 2003.

    Before 2003:

  60. D. Ma, F. Lin and C. K. Chua
    Rapid Prototyping Applications in Medicine, Part 1: NURBS-based Volume Modeling,
    International Journal of Advanced Manufacturing Technology, vol. 18, 2001.

  61. D. Ma, F. Lin and C. K. Chua
    Rapid Prototyping Applications in Medicine, Part 2: STL Generation through Volume Modeling and Iso-surface Extraction,
    International Journal of Advanced Manufacturing Technology, vol. 18, 2001.

     

  62. D. Ma, F. Lin and C. K. Chua,
    Volume Modeling for Rapid Prototyping,
    10th Annual Solid Freeform Fabrication Conference, 1999.