H. Li, D. Ma, N. Saxena, B. Shrestha, and Y. Zhu
Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures. (Extended Technical Report: PDF).
ACM Conference on Wireless Network Security (WiSec), Apr. 2013.
D. Ma, Nitesh Saxena, T. Xiang, and Y. Zhu
Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
IEEE Transactions on Distributed and Secure Computing (TDSC), accepted, to appear.
R. Di Pietro, D. Ma, C.
Soriente and G. Tsudik
Self-healing in Unattended Wireless Sensor Networks.
ACM Transactions on Sensor Networks (ToSN), Vol. 9, No. 1, Nov. 2012
Y. Zhu, S. Wang, H. Hu, G. Ahn, and D. Ma.
Secure collaborative integrity verification for hybrid cloud environments.
International Journal of Cooperative Information Systems (IJCIS), Vol. 21, No. 3, 2012.
Y. Zhu, S. Wang, D. Ma, H. Hu and G. Ahn.
Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices.
IEEE Global Communications Conference, Exhibition and Industry Forum (GlobeCom), Dec. 2012.
T. Halevi, D. Ma, N. Saxena and T. Xiang.
Secure Proximity Detection for NFC Devices based on Ambient Sensor Data.
European Symposium on Research in Computer Security (ESORICS), Sept. 2012.
Y. Zhu, D. Ma, and S. Wang.
Secure Data Retrieval of Outsourced Data with Complex Query Support.
ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), Jun. 2012.
D. Ma, A. K. Prasad, N. Saxena, and T. Xiang.
Location-Aware and Safe Card: Enhancing RFID Security and Privacy via Location Sensing.
ACM Conference on Wireless Network Security (WiSec), Apr. 2012.
T. Halevi, S. Lin, D. Ma, A. K. Prasad, N. Saxena,
J. Voris, and T. Xiang.
Sensing-enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model.
International Conference on Pervasive Computing and Communications (PerCom), Mar. 2012.
D. Ma and N. Saxena.
Towards Sensing-enabled RFID Security and Privacy.
Book Chapter, Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID. IGI Global, Aug. 2012.
D. Ma and N. Saxena.
A Context-Aware Approach to Defend Against Unauthorized Reading and Relay Attacks in RFID Systems.
Security and Communication Networks (SCN), Dec. 2011.
D. Ma and C. Soriente.
Building Trust for k-congenial Secret Groups.
6th International Conference on Broadband and Wireless Computing, Communication and Applications. Oct. 2011.
D. Ma and A. K Prasad.
A Context-aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems.
ICCCN Workshop on Wireless Mesh and Ad Hoc Networks (ICCCN-WiMAN), Aug. 2011