Kevin Fu
Kevin Fu
Associate Professor, University of Michigan EECS
Verifierad e-postadress på umich.edu - Startsida
TitelCiteras avÅr
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
16002006
Plutus: Scalable Secure File Sharing on Untrusted Storage.
M Kallahalla, E Riedel, R Swaminathan, Q Wang, K Fu
Fast 3, 29-42, 2003
9982003
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008
755*2008
Power-up SRAM state as an identifying fingerprint and source of true random numbers
DE Holcomb, WP Burleson, K Fu
IEEE Transactions on Computers 58 (9), 1198-1210, 2008
6222008
Private memoirs of a smart meter
A Molina-Markham, P Shenoy, K Fu, E Cecchet, D Irwin
Proceedings of the 2nd ACM workshop on embedded sensing systems for energy …, 2010
4662010
Security and privacy for implantable medical devices
D Halperin, TS Heydt-Benjamin, K Fu, T Kohno, WH Maisel
IEEE pervasive computing 7 (1), 30-39, 2008
4502008
Fast and secure distributed read-only file system
K Fu, MF Kaashoek, D Mazieres
ACM Transactions on Computer Systems (TOCS) 20 (1), 1-24, 2002
3972002
They can hear your heartbeats: non-invasive security for implantable medical devices
S Gollakota, H Hassanieh, B Ransford, D Katabi, K Fu
ACM SIGCOMM Computer Communication Review 41 (4), 2-13, 2011
3702011
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
3472013
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
DE Holcomb, WP Burleson, K Fu
Proceedings of the Conference on RFID Security 7 (2), 01, 2007
3322007
The Dos and Don'ts of Client Authentication on the Web.
K Fu, E Sit, K Smith, N Feamster
USENIX Security Symposium, 251-268, 2001
2432001
Mementos: system support for long-running computation on RFID-scale devices
B Ransford, J Sorber, K Fu
ACM SIGARCH Computer Architecture News 39 (1), 159-170, 2011
2262011
Group sharing and random access in cryptographic storage file systems
KE Fu
Massachusetts Institute of Technology, 1999
1561999
Group sharing and random access in cryptographic storage file systems
KE Fu
Massachusetts Institute of Technology, 1999
1561999
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
T Denning, K Fu, T Kohno
HotSec, 2008
1552008
Vulnerabilities in first-generation RFID-enabled credit cards
TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, T O’hare
International Conference on Financial Cryptography and Data Security, 2-14, 2007
1352007
Design challenges for secure implantable medical devices
W Burleson, SS Clark, B Ransford, K Fu
Proceedings of the 49th Annual Design Automation Conference, 12-17, 2012
1242012
Secure Software Updates: Disappointments and New Challenges.
A Bellissimo, J Burgess, K Fu
HotSec, 2006
1162006
Maximalist cryptography and computation on the WISP UHF RFID tag
HJ Chae, M Salajegheh, DJ Yeager, JR Smith, K Fu
Wirelessly Powered Sensor Networks and Computational RFID, 175-187, 2013
1152013
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
Presented as part of the 2013 {USENIX} Workshop on Health Information …, 2013
1022013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20