minus plus magnify speech newspaper atomic biology chemistry computer-science earth-science forensic-services globe info math matrix molecule neuroscience pencil physics pin psychology email share atsign clock double-left-chevron double-right-chevron envelope fax phone tumblr googleplus pinterest twitter facebook feed linkedin youtube flickr instagram
Xukai Zou, Associate Professor

Education

B.S., Computer Science Zhengzhou University, 1983
M.S., Computer Science Huazhong University of Science and Technology, 1986
Ph.D., Computer Science University of Nebraska Lincoln, 2000

Courses Taught / Teaching

CSCI 55500 Cryptography (& Network Security) (Fall 2017)

CSCI 30000 System Programming (Spring 2018)

CSCI 59000 Topics in Computer Science: Advanced Information Assurance (Spring 2018)

Research

Research

  • Research Interests Cryptography, Communication networks and security, Biometrics and authentication, Security and reliability for Grid/Cloud/Fog Computing, Security in wireless, delay tolerant, and mobile networks, Secret sharing, Health and personal genomic security and privacy, Design & analysis of algorithms, Image and data compression.
  • Current Research Topics
    • Secure electronic voting
      1. X. Zou, H. Li, Y. Sui, W. Peng, and F. Li Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties, INFOCOM'2014, pp. 136--144.
      2. H. Li, Y. Sui, W. Peng, X. Zou, and F. Li, A Viewable E-voting Scheme for Environments with Conflict of Interest, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
      3. H. Li, A. R. Kankanala, X. Zou, A Taxonomy and Comparison of Remote Voting Schemes, ICCCN'2014, pp. 666--673.
      4. K. Butterfield and X. Zou, Analysis and Implementation of Internet Based Remote Voting, Proceedings of First National Workshop for REU Research in Networking and Systems 2014.
    • Biometrics and authentication
      1. Y. Sui, X. Zou, Y. Du, and F. Li, Design and Analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method, IEEE Transactions on Computers, 63(4), pp. 902--916, 2014.
      2. Y. Sui$^*$, X. Zou and Y. Du, Cancellable Biometrics, (book chapter), pp. 233--252, in Biometrics: from Fiction to Practice, Pan Stanford Publishing Pte. Ltd.,2013.
      3. Y. Sui, X. Zou, Y. Du and F. Li, Secure and Privacy-preserving Biometrics based Active Authentication, The 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), pp.1291 - 1296.
      4. Y. Sui, X. Zou, F. Li and E. Y. Du, Active User Authentication for Mobile Devices,The 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012), pp. 540 - 548.
      5. Y. Sui, X. Zou, and Y. Du, Biometrics-based Authentication: a New Approach, ICCCN 2011, July 31 - August 4, Hawaii, USA.
    • Mobile, Social, delay tolerant, and mobile security
      1. W. Peng, F. Li, X. Zou, and J. Wu, Behavioral Malware Detection in Delay Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, 25 (1), pp. 53--63, 2014.
      2. W. Peng, F. Li, X. Zou, and J. Wu, A Two-stage Deanonymization Attack Against Anonymized Social Networks, IEEE Transactions on Computers, 63(2), pp. 290--303, 2014.
      3. M. Rangwala, P. Zhang, X. Zou and F. Li, A Taxonomy of Privilege Escalation Attacks in Android Applications, International Journal of Security and Networks, 9(1), pp. 40--55, 2014.
      4. W. Peng, F. Li, X. Zou, J. Wu, Offloading Topical Cellular Content through Opportunistic Links, The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013) , October 14-16, in HangZhou, 2013, ZheJiang Province, P.R.China.
      5. W. Peng, F. Li, K. J. Han, X. Zou, and J.Wu, T -dominance: Prioritized Defense Deployment for BYOD Security, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
      6. Feng Li, Wei Peng, Chin-Tser Huang, and Xukai Zou, Smartphone Strategic Sampling in Defending Enterprise Network Security, ICC 2013.
      7. F. Li, Y. Yang, J.Wu and X. Zou, Fuzzy Closeness-based Delegation Forwarding in Delay Tolerant Networks, Proceedings of the 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010).
    • Moving target defense and Secure Digital Provenance
      1. M. Rangwala, Z. Liang, W. Peng, X. Zou and F. Li, A Signature based Mutual Agreement Scheme for Secure Data Provenance, ICCCN'2014. pp. 726--733.
      2. W. Peng, F. Li, K. Hand and X. Zou, Moving-target Defense for Cloud Infrastructure: Lessons from Botnets, High performance semantic cloud auditing and applications, New York: Springer Verlag, Book chapter, (accepted).
      3. W. Peng, F. Li, C. T. Huang, X. Zou A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces, ICC'2014 (Accepted)
      4. Y. Dai, X. Li, X. Zou, and L. Xing, Rebound Wall: A Novel Technology against DoS Attacks, Special Issue on System Survivability and Defense against External Impacts, International Journal of Performability Engineering, Vol. 5, No. 1, pp. 55-70, January 2009.
    • Secure Group Communication (SGC).
      1. X. Zou, Y. Dai and E. Bertino A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. IEEE INFOCOM'08, April 2008, pp. 1211--1219.
      2. G. Hao@, N. V. Vinodchandran, B. Ramamurthy and X. Zou, A Balanced Key Tree Approach for Dynamic Secure Group Communication, Accepted by ICCCN 2005 FOURTEENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, October 17-19, 2005, CA, USA.
      3. P. Adusumilli@, X. Zou and B. Ramamurthy, DGKD: Distributed Group Key Distribution with Authentication Capability, Proceedings of the 2005 IEEE Workshop on Information Assurance (IAW), United States Military Academy, West Point, NY, 15-17 June 2005, pp. 286--293.
      4. X. Zou and A. Thukral, Key management, The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief, to be published by John Wiley \& Sons, Inc, October 2005.
      5. X. Zou, A. Thukral, and Y. Karandikar Secure Group Communication, Parallel and Distributed Computing: Evaluation, Improvement and Applications, Editors, Y. Dai, Y. Pan, and R. Raje, to be published by Nova Science Publishers, Sept., 2005.
      6. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182 (Go to Springer for more information).
      7. X. Zou and B. Ramamurthy, A simple group Diffie-Hellman key agreement protocol without member serialization, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Vol. 3314 (2004), pp. \ 725-731.
      8. X. Zou, B. Ramamurthy, and S. S. Magliveras, A GCD attack resistant CRTHACS for secure group communications, Proceedings of International Conference on Information Technology, ITCC 2004 (Poster), April 5 -7, 2004, Las Vegas, NV, USA, pp. \ 153--154.
      9. X. Zou and B. Ramamurthy, A block-free tree based group Diffie-Hellman key agreement protocol for secure group communication, Proceedings of International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Austria, February 17-19, 2004, pp. \ 288--293.
      10. X. Zou, B. Ramamurthy and S. Magliveras, Efficient key management for secure group communication with bursty behavior, Proceedings of International Conference on Communication, Internet, and Information Technology, Virgin Islands, USA, November 2002, pp.\ 148--153.
    • Secure Dynamic Conferencing (SDC).
      1. X. Zou and Y. Karandikar A Novel Conference Key Management Solution for Secure Dynamic Conferencing, International Journal of Security and Networks, 3(1), 2008, pp. 47--53.
      2. P. Adusumilli and X. Zou, Symmetric Polynomial based Hierarchical Conference Key Management, Submitted to International Conference on Information and Communication Security (ICICS'05).
      3. P. Adusumilli@ and X. Zou, KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing, Proceedings of THE TENTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), Cartagena, Spain, June 27-30, 2005, pp. 476--481.
      4. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182 (Go to Springer for more information).
      5. X. Zou, S. Magliveras and B. Ramamurthy, Key Tree based Scalable Secure Dynamic Conferencing Schemes, Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), MIT Cambridge, MA, USA, November 2004, pp. \ 61--65.
      6. X. Zou, S. Magliveras and B. Ramamurthy, A dynamic conference scheme extension with efficient burst operation, Congressus Numerantium, Vol. 158, 2002, pp.\ 83--92.
    • Cryptography based Access Control.
      1. Y. Karandikar@, X. Zou and Y. Dai, An Effective Key Management Approach to Differential Access Control in Dynamic Environments, Journal of Computer Science, 2(6):542--549, 2006.
      2. Y. Karandikar@, X. Zou and Y. Dai, Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments, Accepted by The 1st IEEE Workshop on Reliability and Autonomic Management In Parallel and Distributed Systems (RAMPDS-2005), 2005.
      3. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182 (Go to Springer for more information).
      4. X. Zou, B. Ramamurthy, V. Variyam and R. K. Balachandran@, Algorithms for unified hierarchy based access control, Proceedings of International Conference on Communications, Internet, \& Information Technology (CIIT 2003), Scottsdale, AZ, USA, November 17-19, 2003, pp.\ 31--36.
      5. X. Zou, B. Ramamurthy and S. Magliveras, Chinese Remainder Theorem based hierarchical access control for secure group communications, Lecture Notes in Computer Science (LNCS), Springer-Verlag, vol. 2229 (2001), pp.\ 381--385.
      6. J.-C. Birget, X. Zou, G. Noubir and B. Ramamurthy, Hierarchy-based access control in distributed environments, Proceedings of IEEE International Conference on Communications, June 2001, Helsinki, Finland, pp.\ 229--233.
    • SGC in wireless/mobile ad hoc networks (MANET).
      1. R. K. Balachandran@, B. Ramamurthy, X. Zou, and N. V. Vinodchandran, CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad-Hoc Networks, Accepted by IEEE International Conference on Communication (ICC) 2005.
      2. X. Zou, A. Thukral, and B. Ramamurthy, An authenticated key management scheme for mobile ad hoc networks, Accepted by MSN'06.
      3. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182 (Go to Springer for more information).
    • Trusted Collaborative Computing (TCC) and Health/Medical Information System.
      1. X. Zou, Y. Dai and E. Bertino A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. IEEE INFOCOM'08, April 2008, pp. 1211--1219.
      2. X. Zou, Y. Dai and Y. Pan, Trust and Security in Collaborative Computing, World Scientific, ISBN-13 978-981-270-368-2, ISBN-10 981-270-368-3 (Go to World Scientific for more information).
      3. X. Zou and Y. Dai, Secure Medical Data Repository and Regional Health Information Exchange Networks. In collaboration with Indiana University Medical School and VA Medical Center.
      4. Amandeep Thukral@ and Xukai Zou, Secure Group Instant Messaging based on Cryptographic Primitives, To appear in Lecture Notes in Computer Science (LNCS), Springer-Verlag, (2005).

Publications & Professional Activities

Selected Publications
Following papers contain most of my research contibutions. Since the copyrights of papers appeared in conference proceedings or journals usually belong to the publishers, the papers may be downloaded for research purposes only.

  • Monographs
    1. X. Zou, Y. Dai and Y. Pan, Trust and Security in Collaborative Computing, World Scientific, ISBN-13 978-981-270-368-2, ISBN-10 981-270-368-3 (Go to World Scientific for more information).
    2. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1, October 2004, pages 182 (Go to Springer for more information).
    3. X. Zou, C. Yang, H. Li and F. Liang, Intranet technologies and applications, ISBN 7-5606-0613-X, Xian Electronic Science and Technology University Publishing Press, August 1998.
  • Book Chapters
    1. X. Zou, Public Key Standards: SSH (Secure Shell), The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief, to be published by John Wiley \& Sons, Inc, February 2005.
    2. X. Zou and A. Thukral@, Key management, The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief, to be published by John Wiley \& Sons, Inc, February 2005.
    3. X. Zou, A. Thukral@, and Y. Karandikar@, Security Issues and Techniques in Trusted Collaborative Computing (TCC), Parallel and Distributed Computing: Evaluation, Improvement and Applications, Editors, Y. Dai, Y. Pan, and R. Raje, Nova Science Publishers, 2006, ISBN: 1-60021-202-6, pp. 31--54.
    4. Y. Sui, X. Zou and Y. Du, Cancellable Biometrics, (book chapter), pp. 233--252, in Biometrics: from Fiction to Practice, Pan Stanford Publishing Pte. Ltd.,2013.
    5. W. Peng, F. Li, K. Hand and X. Zou, Moving-target Defense for Cloud Infrastructure: Lessons from Botnets, High performance semantic cloud auditing and applications, New York: Springer Verlag, Book chapter, (accepted).
  • Journal Articles
    1. Y. Sui, X. Zou, Y. Du, and F. Li, Design and Analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method, IEEE Transactions on Computers, 63(4), pp. 902--916, 2014.
    2. W. Peng, F. Li, X. Zou, and J. Wu, Behavioral Malware Detection in Delay Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, 25 (1), pp. 53--63, 2014.
    3. W. Peng, F. Li, X. Zou, and J. Wu, A Two-stage Deanonymization Attack Against Anonymized Social Networks, IEEE Transactions on Computers, 63(2), pp. 290--303, 2014.
    4. M. Rangwala, P. Zhang, X. Zou and F. Li, A Taxonomy of Privilege Escalation Attacks in Android Applications, International Journal of Security and Networks, (Accepted).
    5. Y. Dai, X. Li, X. Zou, and L. Xing, Rebound Wall: A Novel Technology against DoS Attacks, Special Issue on System Survivability and Defense against External Impacts, International Journal of Performability Engineering, Vol. 5, No. 1, pp. 55-70, January 2009.
    6. P. Adusumilli, Y. Sui, X. Zou, B. Ramamurthy, and F. Li, A Key Distribution Scheme for Distributed Group with Authentication Capability, International Journal of Performability Engineering (In Press).
    7. F. Li, X. Zou, P. Liu, and J. Chen, New threats to health data privacy, BioMed Central (In press).
    8. L. Bai and X. Zou, A Proactive Secret Sharing Scheme in Matrix Projection Method, International Journal of Security and Networks, 4(4), 2009, pp. 201-209.
    9. Y. Wang, B. Ramamurthy, X. Zou, and Y. Xue, An efficient scheme for removing compromised sensor nodes from wireless sensor networks , Security and Communication Networks, (In Press).
    10. X. Zou and L. Bai, A New Class of Key Management Scheme for Access Control in Dynamic Hierarchies, International Journal of Computers and Applications, 30(4), 2008, pp. 331-337.
    11. R. K. Balachandran@, X. Zou, B. Ramamurthy, A. Thukral@, and N.V. Vinodchandran, An Efficient and Attack-resistant Key Agreement Scheme for Secure Group Communications in Mobile Ad-Hoc Networks, Wireless Communication and Mobile Computing, 8(10), 2008, pp. 1297-1312.
    12. X. Zou, Y. karandikar@, and E. Bertino, A Dynamic Key Management Solution to Access Hierarchy, International Journal of Network Management, Wiley, 17(6), Nov./Dec. 2007, pp. 437--450.
    13. X. Zou and Y. Karandikar@, A Novel Conference Key Management Solution for Secure Dynamic Conferencing, International Journal of Security and Networks, 3(1), 2008, pp. 47--53.
    14. X. Zou, Y. Dai, and X. Ran@, Dual-Level Key Management for Secure Grid Communication in Dynamic and Hierarchical Groups, Future Generation of Computer Systems (Elsiver), 23(6), July 2007, pp. 776--786.
    15. Y. Dai, Y. Pan, and X. Zou, A Hierarchical Modeling and Analysis for Grid Service Reliability, IEEE Transaction on Computers, vol. 56, no. 5, 2007, pp. 681--691.
    16. Y. Dai, X. Zou, and Y. Guo@, Novel Grid Services for Data Access with High Performance, Fault Tolerance and Self-Healing, International Journal of High Performance Computing and Networking (In Press).
    17. O. Tilak@, R. Raje, and X. Zou, Composing Access Control Policies of Distributed Components, Journal of Autonomic and Trusted Computing (In Press).
    18. X. Fu, W. Yu@, X. Zou, K. Strevie@, and S. Graham, On Recognizing Virtual Honeypots and Counter-measures, Journal of Autonomic and Trusted Computing (In Press).
    19. Y. Karandikar@, X. Zou and Y. Dai, An Effective Key Management Approach to Differential Access Control in Dynamic Environments, Journal of Computer Science, 2(6):542--549, 2006.
    20. Q. Wu, Hua Xu, and X. Zou, An effective method for 3D geological modeling with multi-source data integration, Computers & Geosciences, 31(1) , February 2005, pp. 35-43.
    21. X. Zou, S. Magliveras and B. Ramamurthy, A dynamic conference scheme extension with efficient burst operation, Congressus Numerantium, Vol. 158, 2002, pp.\ 83--92.
    22. X. Zou, An efficient approach to compute the edit distance and edit path for char/(Chinese character) string. Computer Research and Development, 33 (8), 1996, pp 574--581.
    23. X. Zou, An efficient edit distance and edit path computation approach. Mini-Micro Systems, 17(7), 1996, pp 72--76.
    24. X. Zou, An efficient parallel approximate approach to char/(Chinese characters) string pattern matching. Journal of Advanced Software Research, 2(2), 1995, pp 198--203.
    25. X. Zou, A fast approach to char/(Chinese characters) string pattern matching allowing errors. Journal of Advanced Software Research, 2(2), 1995, pp 147--152.
    26. X. Zou, An approach for parallel string pattern matching allowing errors. Computer Research and Development, 32(2), 1995, pp 34--38.
    27. X. Zou, An efficient parallel approximate approach to char/(Chinese characters) string pattern matching. Journal of Software, 6(8), 1995, pp 463--468.
    28. X. Zou, An optimal parallel Chinese character/char string searching approach. Journal of Chinese Information. 1, 1995.
    29. X. Zou, An efficient approach to automatic checking and correction of spelling errors in compilation. Journal of Zhengzhou University, 27(1), 1995.
    30. X. Zou and S. Wang, A fast approach to char/(Chinese characters) string pattern matching allowing errors. Journal of Software, 5(10), 1994, pp 55--59.
    31. X. Zou, An optimal parallel string searching approach. Journal of Zhengzhou University, 26(1), 1994, pp 41--45.
    32. X. Zou, An fast pattern matching approach with scaling. Journal of Zhengzhou University, 26(3), 1994,
    33. X. Zou, String searching: theory and practice. in Proceedings of the Fourth young computer scientist annual conference, China, 12, 1994.
    34. X. Zou, A fast approach to char/(Chinese character) string pattern matching. Mini-Micro Systems. 14(11), 1993, pp 49--53.
    35. X. Zou and Y. Guo, A reliable microcomputer communication approach. Journal of Zhengzhou University, 25(3), 1993, pp24--28.
    36. X. Zou, Notes on McCabe approach measuring program complexity. Henan Electronics Technology, 4(1), 1993.
    37. X. Zou, An efficient parallel approximate approach to char/Chinese character string searching, Journal of Advanced Software Research, 2(2), 1995, pp.\ 198--203.
    38. X. Zou, A fast approach to char/Chinese characters text searching allowing errors, Journal of Advanced Software Research, 2(2), 1995, pp.\ 147--152.
  • Peer-reviewed Conference Proceeding Papers
    1. H. Li, A. R. Kankanala, X. Zou, A Taxonomy and Comparison of Remote Voting Schemes, ICCCN'2014, pp. 666--673.
    2. K. Butterfield and X. Zou, Analysis and Implementation of Internet Based Remote Voting, Proceedings of First National Workshop for REU Research in Networking and Systems 2014.
    3. M. Rangwala, Z. Liang, W. Peng, X. Zou and F. Li, A Signature based Mutual Agreement Scheme for Secure Data Provenance, ICCCN'2014. pp. 726--733.
    4. X. Zou, H. Li, Y. Sui, W. Peng, and F. Li Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties, INFOCOM'2014, pp. 136--144.
    5. W. Peng, F. Li, C. T. Huang, X. Zou A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces, ICC'2014 (Accepted)
    6. W. Peng, F. Li, X. Zou, J. Wu, Offloading Topical Cellular Content through Opportunistic Links, The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013) , October 14-16, in HangZhou, 2013, ZheJiang Province, P.R.China.
    7. H. Li, Y. Sui, W. Peng, X. Zou, and F. Li, A Viewable E-voting Scheme for Environments with Conflict of Interest, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
    8. W. Peng, F. Li, K. J. Han, X. Zou, and J.Wu, T -dominance: Prioritized Defense Deployment for BYOD Security, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
    9. Feng Li, Wei Peng, Chin-Tser Huang, and Xukai Zou, Smartphone Strategic Sampling in Defending Enterprise Network Security, ICC 2013.
    10. Y. Sui, X. Zou, Y. Du and F. Li, Secure and Privacy-preserving Biometrics based Active Authentication, The 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), pp.1291 - 1296.
    11. Y. Sui, X. Zou, F. Li and E. Y. Du, Active User Authentication for Mobile Devices, WASA 2012,
    12. W. Peng, F. Li, X. Zou, and J. Wu, Seed and Grow: An Attack Against Anonymized Social Networks, IEEE International Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'12),
    13. W. Peng, F. Li, X. Zou, and J. Wu, A Privacy-Preserving Social-Aware Incentive System for Word-of-Mouth Advertisement Dissemination on Smart Mobile Devices, IEEE International Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'12).
    14. W. Peng, F. Li, X. Zou and J. Wu, Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks, MASS 2011, Pages 411-420.
    15. Y. Sui, X. Zou and Y. Du, Biometrics-based Authentication: a New Approach, ICCCN'2011, Maui, Hawaii, July 31 -- August 4, 2011.
    16. X. Zou, F. Maino, E. Bertino, Y. Sui, K. Wang, and F. Li, A New Approach to Weighted Multi-Secret Sharing, ICCCN'2011, Maui, Hawaii, July 31 -- August 4, 2011.
    17. X. Zou, M. Qi, Y. Sui, and F. Li, A New Scheme for Anonymous Secure Group Communication, 44th Hawaii International Conference on System Sciences (HICSS-44), January 4--7, 2011.
    18. F. Li, Y. Chen, X. Zou and P. Liu, New Privacy Threats in Healthcare Informatics: When Medical Records Join the Web, Proceedings of BIOKDD 2010, Washington DC, USA.
    19. F. Li, Y. Yang, J.Wu and X. Zou, Fuzzy Closeness-based Delegation Forwarding in Delay Tolerant Networks, Proceedings of the 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010).
    20. Y. Sui, K. Yang, Y. Du, S. Orr, and X. Zou, A novel key management scheme using bio- metrics, Proceedings of Mobile Multimedia/Image Processing, Security, and Applications 2010 conference, 5--9 April 2010, Orlando, Florida, USA, Vol. 7708, 77080C (2010).
    21. K. Yang, Y. Sui, Z. Zhou, Y. Du, and X. Zou, A new approach for cancelable iris recogni- tion, Proceedings of Mobile Multimedia/Image Processing, Security, and Applications 2010 conference, 5--9 April 2010, Orlando, Florida, USA, Vol. 7708, 77080A (2010).
    22. Y. Sui, F. Mabio, Y. Guo, K. Wang and X. Zou, An Efficient Time-bound Access Control Scheme for Dynamic Access Hierarchy, in Proceedings of The Fifth International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2009), 14-16 December 2009, Wu Yi Mountain, China, pp.279 - 286.
    23. K. Wang, X. Zou, and Y. Sui, A Multiple Secret Sharing Scheme based on Matrix Projection. COMPSAC'09, Seattle, WA, USA, July 20 -- 24, 2009, pp. 400-405.
    24. X. Zou, Y. Dai and E. Bertino A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. IEEE INFOCOM'08, April 2008, pp. 1211--1219.
    25. X. Zou, Y.S. Dai, B. Doebbeling, M. Qi@, Dependability and security in medical information system, Lecture Notes of Computer Science (LNCS), vol. 4553, pp. 316-326.
    26. Y. Wang@, B. Ramamurthy, and X. Zou, KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, Proceedings of IEEE ICC'07, 24-27 June 2007, Glasgow, Scotland, pp.1260 - 1265.
    27. X. Zou, A. Thukral@, and B. Ramamurthy, An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks, LNCS, Springer, Vol. 4325, pp. 509--520.
    28. X. Zou and Y. Dai, A Robust and Stateless Self-Healing Group Key Management Scheme, Proceedings of The 2006 IEEE International Conference on Communication Technology, Guilin, China, Nov. 28--30, 2006, pp. 455--459.
    29. O. Tilak@, R. Raje, and X. Zou, Composing Access Control in Distributed Systems, The 2nd IEEE International Symposium on Dependable, Autonomic, and Secure Computing (DASC), Indianapolis, IN, USA, Sept. 29 - Oct. 1, 2006, pp. 301--307.
    30. Y. Wang@, B. Ramamurthy, and X. Zou, The Performance of Elliptic Curve Based Group Diffe-Hellman Protocols for Secure Group Communication over Ad Hoc Networks, the Proceedings of IEEE ICC 2006, 11-15 June 2006, Istanbul, TURKEY, Vol.5, pp.2243 - 2248.
    31. S. Deshpande@, A. Todimala@, R. K Balachandran@, B. Ramamurthy, X. Zou, and N. V. Vinodchandran, A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks, the Proceedings of IEEE ICC 2006, 11-15 June 2006, Istanbul, TURKEY, vol. 5, pp.2310 - 2315.
    32. A. Thukral@ and X. Zou, Secure Group Instant Messaging based on Cryptographic Primitives, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Vol. 3619, pp. 1002-1011, August, 2005.
    33. Y. Dai, X. Zou and Y. Guo@, Grid-Based Information System with Fault Tolerance, Self-Healing and High-Performance, the Proceedings of 10th Annual International Conference on Industrial Engineering Theory, Applications and Practice, Florida, December 4-7, 2005, pp. 455-460.
    34. G. Hao@, N. V. Vinodchandran, B. Ramamurthy and X. Zou, A Balanced Key Tree Approach for Dynamic Secure Group Communication, Proceedings of ICCCN 2005 Fourteenth International Conference on Computer Communications and Networks (ICCCN), October 17-19, 2005, CA, USA, pp.345--350.
    35. P. Adusumilli@, X. Zou and B. Ramamurthy, DGKD: Distributed Group Key Distribution with Authentication Capability, Proceedings of the 2005 IEEE Workshop on Information Assurance (IAW), United States Military Academy, West Point, NY, 15-17 June 2005, pp. 286--293.
    36. Y. Karandikar@, X. Zou and Y. Dai, Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments, The 1st IEEE Workshop on Reliability and Autonomic Management In Parallel and Distributed Systems (RAMPDS-2005), 2005, pp. 448--453.
    37. P. Adusumilli@ and X. Zou, KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing, Proceedings of THE TENTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), Cartagena, Spain, June 27-30, 2005, pp. 476--481.
    38. R. K. Balachandran@, B. Ramamurthy, X. Zou, and N. V. Vinodchandran, CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad-Hoc Networks, Proceedings of IEEE International Conference on Communication (ICC) 2005, pp. 1123--1127.
    39. X. Zou and B. Ramamurthy, A simple group Diffie-Hellman key agreement protocol without member serialization, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Vol. 3314, pp. 725-731, December 2004.
    40. X. Zou, S. Magliveras and B. Ramamurthy, Key Tree based Scalable Secure Dynamic Conferencing Schemes, Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), MIT Cambridge, MA, USA, November 2004, pp. 61--65.
    41. X. Zou, B. Ramamurthy, and S. S. Magliveras, A GCD attack resistant CRTHACS for secure group communications, Proceedings of International Conference on Information Technology, ITCC 2004 (Poster), April 5 -7, 2004, Las Vegas, NV, USA, pp. 153--154.
    42. X. Zou and B. Ramamurthy, A block-free tree based group Diffie-Hellman key agreement protocol for secure group communication, Proceedings of International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Austria, February 17-19, 2004, pp. 288--293.
    43. X. Zou, B. Ramamurthy, V. Variyam and R. K. Balachandran@, Algorithms for unied hierarchy based access control, Proceedings of International Conference on Communications, Internet, & Information Technology (CIIT 2003), Scottsdale, AZ, USA, November 17-19, 2003, pp. 31--36.
    44. X. Zou, B. Ramamurthy and S. Magliveras, Efficient key management for secure group communication with bursty behavior, Proceedings of International Conference on Communication, Internet, and Information Technology, Virgin Islands, USA, November 2002, pp. 148--153.
    45. X. Zou, B. Ramamurthy and S. Magliveras, Chinese Remainder Theorem based hierarchical access control for secure group communications, Lecture Notes in Computer Science (LNCS), Springer-Verlag, vol. 2229 (2001), pp. 381--385.

Honors, Awards and Grants

 Recognitions and Awards

* Trustees Teaching Award, IUPUI, 2013.

* Featured on Fox News 59 for a security breach at Anthem, the insurance company based in Indianapolis. The interview video can be found at http://www.fox59.com/news/wxinanthem-letters-062510,0,1566956.story.

* Fellow of Indiana University' Center for Applied Cybersecurity Research (CACR), 2010.

* Fellow of Indiana University' Center for Applied Cybersecurity Research (CACR), 2009.

* Trustees Teaching Award, IUPUI, 2008.

* Featured by news "IUPUI Computer Scientists Develop Revolutionary Medical Information System" at http://www.iupui.edu/news/releases/060222 med info system.htm, 2006.

* National scientific and technological achievement, awarded by Chinese Science and Technology Committee, 1996.

* Excellent author of scientific and technical articles, by Science and Technology Committee of Henan Province in 1996 and 1998.

* Outstanding teaching achievement award, 1994 and Outstanding young researcher, 1996, by Zhengzhou University.

* Outstanding teaching achievement award, by Zhengzhou University in 1994.

* Outstanding graduate, by Zhengzhou University, 1983.