Two secret sharing schemes based on Boolean operations D Wang, L Zhang, N Ma, X Li Pattern Recognition 40 (10), 2776-2785, 2007 | 338 | 2007 |
Information disclosure under realistic assumptions: Privacy versus optimality L Zhang, S Jajodia, A Brodsky Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 95 | 2007 |
Toward information sharing: Benefit and risk access control (barac) L Zhang, A Brodsky, S Jajodia Seventh IEEE International Workshop on Policies for Distributed Systems and …, 2006 | 82 | 2006 |
Privacy‐preserving robust data aggregation in wireless sensor networks M Conti, L Zhang, S Roy, R Di Pietro, S Jajodia, LV Mancini Security and Communication Networks 2 (2), 195-213, 2009 | 76* | 2009 |
Preserving privacy against external and internal threats in WSN data aggregation L Zhang, H Zhang, M Conti, R Di Pietro, S Jajodia, LV Mancini Telecommunication Systems 52, 2163-2176, 2013 | 39 | 2013 |
Event Driven Email Revocation A Stavrou, S Jajodia, L Zhang US Patent App. 20,100/057,869, 2009 | 13 | 2009 |
L-cover: Preserving diversity by anonymity L Zhang, L Wang, S Jajodia, A Brodsky Secure Data Management: 6th VLDB Workshop, SDM 2009, Lyon, France, August 28 …, 2009 | 6 | 2009 |
Exclusive strategy for generalization algorithms in micro-data disclosure L Zhang, L Wang, S Jajodia, A Brodsky Data and Applications Security XXII, 190-204, 2008 | 6 | 2008 |
Secret color images sharing schemes based on XOR operation DS Wang, L Zhang, N Ma, LS Huang Cryptology ePrint Archive, 2005 | 5 | 2005 |
Reverse tree-based key routing: Robust data aggregation in wireless sensor networks L Zhang, H Zhang, M Conti, R Di Pietro, S Jajodia, LV Mancini 2010 10th IEEE International Conference on Computer and Information …, 2010 | 4 | 2010 |
Simulatable binding: beyond simulatable auditing L Zhang, S Jajodia, A Brodsky Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008 | 4 | 2008 |
k-Jump strategy for preserving privacy in micro-data disclosure WM Liu, L Wang, L Zhang Proceedings of the 13th International Conference on Database Theory, 104-115, 2010 | 3 | 2010 |
A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling L Zhang, A Brodsky, V Swarup, S Jajodia 2008 IEEE Workshop on Policies for Distributed Systems and Networks, 181-188, 2008 | 3 | 2008 |
Evaluation based on invisible watermarking system D Wang, J Liang, L Zhang, Y Dai Multimedia Systems and Applications VI 5241, 202-210, 2003 | 3 | 2003 |
Restoring compromised privacy in micro-data disclosure L Zhang, A Brodsky, S Jajodia Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 1 | 2010 |
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations W Li, L Wang, B Zhu, L Zhang Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 1 | 2008 |
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure WM Liu, L Wang, L Zhang, S Zhu Journal of Computer Security 23 (2), 131-165, 2015 | | 2015 |
Securing the information disclosure process L Zhang George Mason University, 2010 | | 2010 |
Answering queries based on imprecision and uncertainty trade-offs in numeric databases A Brodsky, L Zhang, S Jajodia Workshop on Secure Data Management, 81-95, 2007 | | 2007 |