Improved proxy re-encryption schemes with applications to secure distributed storage G Ateniese, K Fu, M Green, S Hohenberger ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006 | 1746 | 2006 |
Plutus: Scalable Secure File Sharing on Untrusted Storage. M Kallahalla, E Riedel, R Swaminathan, Q Wang, K Fu Fast 3, 29-42, 2003 | 1060 | 2003 |
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ... 2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008 | 868 | 2008 |
Power-up SRAM state as an identifying fingerprint and source of true random numbers DE Holcomb, WP Burleson, K Fu IEEE Transactions on Computers 58 (9), 1198-1210, 2008 | 745 | 2008 |
Private memoirs of a smart meter A Molina-Markham, P Shenoy, K Fu, E Cecchet, D Irwin Proceedings of the 2nd ACM workshop on embedded sensing systems for energy …, 2010 | 530 | 2010 |
Security and privacy for implantable medical devices D Halperin, TS Heydt-Benjamin, K Fu, T Kohno, WH Maisel IEEE pervasive computing 7 (1), 30-39, 2008 | 491 | 2008 |
They can hear your heartbeats: non-invasive security for implantable medical devices S Gollakota, H Hassanieh, B Ransford, D Katabi, K Fu Proceedings of the ACM SIGCOMM 2011 conference, 2-13, 2011 | 425 | 2011 |
Fast and secure distributed read-only file system K Fu, MF Kaashoek, D Mazieres ACM Transactions on Computer Systems (TOCS) 20 (1), 1-24, 2002 | 413 | 2002 |
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags DE Holcomb, WP Burleson, K Fu Proceedings of the Conference on RFID Security 7 (2), 01, 2007 | 376 | 2007 |
Ghost talk: Mitigating EMI signal injection attacks against analog sensors DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu 2013 IEEE Symposium on Security and Privacy, 145-159, 2013 | 352 | 2013 |
Mementos: System support for long-running computation on RFID-scale devices B Ransford, J Sorber, K Fu Proceedings of the sixteenth international conference on Architectural …, 2011 | 288 | 2011 |
The Dos and Don'ts of Client Authentication on the Web. K Fu, E Sit, K Smith, N Feamster USENIX Security Symposium, 251-268, 2001 | 251 | 2001 |
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. T Denning, K Fu, T Kohno HotSec, 2008 | 180 | 2008 |
Group sharing and random access in cryptographic storage file systems KE Fu Massachusetts Institute of Technology, 1999 | 177 | 1999 |
Group sharing and random access in cryptographic storage file systems KE Fu Massachusetts Institute of Technology, 1999 | 177 | 1999 |
Vulnerabilities in first-generation RFID-enabled credit cards TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, T O’hare International Conference on Financial Cryptography and Data Security, 2-14, 2007 | 154 | 2007 |
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks T Trippel, O Weisse, W Xu, P Honeyman, K Fu 2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017 | 141 | 2017 |
Design challenges for secure implantable medical devices W Burleson, SS Clark, B Ransford, K Fu DAC Design Automation Conference 2012, 12-17, 2012 | 141 | 2012 |
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu 2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13), 2013 | 130 | 2013 |
Secure Software Updates: Disappointments and New Challenges. A Bellissimo, J Burgess, K Fu HotSec, 2006 | 128 | 2006 |