Dijiang Huang

Orcid: 0000-0003-3257-6349

According to our database1, Dijiang Huang authored at least 175 papers between 2003 and 2024.

Collaborative distances:

Timeline

2005
2010
2015
2020
0
5
10
15
20
25
1
1
6
1
2
9
5
2
5
3
3
4
3
3
2
4
3
1
1
1
2
1
12
13
10
6
6
8
11
9
1
14
6
3
2
3
6
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Unraveled - A semi-synthetic dataset for Advanced Persistent Threats.
Comput. Networks, May, 2023

Semantic Privacy-Preserving for Video Surveillance Services on the Edge.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023

2022
Intent-Driven Security Policy Management for Software-Defined Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022

LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning.
IEEE Trans. Netw. Serv. Manag., 2022

SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services.
ACM Trans. Internet Things, 2022

Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC).
IEEE Trans. Dependable Secur. Comput., 2022

Toward scalable graph-based security analysis for cloud networks.
Comput. Networks, 2022

SmartDefense: A distributed deep defense against DDoS attacks with edge computing.
Comput. Networks, 2022

2021
NeoCyberKG: Enhancing Cybersecurity Laboratories with a Machine Learning-enabled Knowledge Graph.
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.1, Virtual Event, Germany, June 26, 2021

Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Survey of Moving Target Defenses for Network Security.
IEEE Commun. Surv. Tutorials, 2020

Autonomous Security Analysis and Penetration Testing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments.
IEEE Trans. Dependable Secur. Comput., 2019

A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities.
IEEE Commun. Surv. Tutorials, 2019

Partially Overlapped Channel Detection in Heterogeneous Cognitive Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Adaptive MTD Security using Markov Game Modeling.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

SDN based Network Function Parallelism in Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

SUPC: SDN enabled Universal Policy Checking in Cloud Network.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

FMHash: Deep Hashing of In-Air-Handwriting for User Identification.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

TRUFL: Distributed Trust Management Framework in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs.
Proceedings of the ACM Conference on Global Computing Education, 2019

Smart CCR IoT: Internet of Things Testbed.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

SDNSOC: Object Oriented SDN Framework.
Proceedings of the SDN-NFV@CODASPY 2019, 2019

2018
Attribute-based Access Control for ICN Naming Scheme.
IEEE Trans. Dependable Secur. Comput., 2018

PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud.
IEEE Trans. Cloud Comput., 2018

Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks.
CoRR, 2018

SDFW: SDN-based Stateful Distributed Firewall.
CoRR, 2018

FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface.
CoRR, 2018

FMHash: Deep Hashing of In-Air-Handwriting for User Identification.
CoRR, 2018

The Future of CISE Distributed Research Infrastructure.
CoRR, 2018

Dual-mode broadcast encryption.
Sci. China Inf. Sci., 2018

Privacy-preserving mobile crowd sensing in ad hoc networks.
Ad Hoc Networks, 2018

Conceptualizing Student Engagement in Virtual Hands-on Lab: Preliminary Findings from a Computer Network Security Course (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment.
Proceedings of the 39th IEEE Sarnoff Symposium 2018, Newark, NJ, USA, 2018

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Fault Tolerant Controller Placement in Distributed SDN Environments.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Multifactor User Authentication with In-Air-Handwriting and Hand Geometry.
Proceedings of the 2018 International Conference on Biometrics, 2018

Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation.
Proceedings of the IEEE Global Communications Conference, 2018

Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Improving student learning performance in a virtual hands-on lab system in cybersecurity education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

MTD Analysis and evaluation framework in Software Defined Network (MASON).
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication.
IACR Cryptol. ePrint Arch., 2017

ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing.
IACR Cryptol. ePrint Arch., 2017

iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization.
Future Gener. Comput. Syst., 2017

A survey on the usability and practical applications of Graphical Security Models.
Comput. Sci. Rev., 2017

Platooning as a service of autonomous vehicles.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

A Secure Microservice Framework for IoT.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Science DMZ: SDN based secured cloud testbed.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

A Defense System for Defeating DDoS Attacks in SDN based Networks.
Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017

Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A data driven in-air-handwriting biometric authentication system.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs.
IEEE Trans. Dependable Secur. Comput., 2016

A Survey of Mobile VPN Technologies.
IEEE Commun. Surv. Tutorials, 2016

VC-bots: a vehicular cloud computing testbed with mobile robots.
Proceedings of the First International Workshop on Internet of Vehicles and Vehicles of Internet, 2016

MobiVPN: A mobile VPN providing persistency to applications.
Proceedings of the 2016 International Conference on Computing, 2016

Short term traffic flow prediction based on on-line sequential extreme learning machine.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

Security policy checking in distributed SDN based clouds.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

SDN based Scalable MTD solution in Cloud Network.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Software Defined Stochastic Model for Moving Target Defense.
Proceedings of the Third International Afro-European Conference for Industrial Advancement, 2016

2015
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services.
IEEE Trans. Serv. Comput., 2015

Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption.
IEEE Trans. Computers, 2015

Efficient Attribute-Based Comparable Data Access Control.
IEEE Trans. Computers, 2015

Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications.
Mob. Networks Appl., 2015

Mobile cloud computing [Guest Edotorial].
IEEE Commun. Mag., 2015

POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

MoSeC: Mobile-Cloud Service Composition.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Demo: LIVES: Learning through Interactive Video and Emotion-aware System.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

MTD 2015: Second ACM Workshop on Moving Target Defense.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Cloud-Based Virtual Laboratory for Network Security Education.
IEEE Trans. Educ., 2014

STARS: A Statistical Traffic Pattern Discovery System for MANETs.
IEEE Trans. Dependable Secur. Comput., 2014

SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet.
Comput. Networks, 2014

A database oriented management for asynchronous and consistent reconfiguration in Software-Defined Networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Towards Anonymous Group Setup across Multiple Domains.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Refining Traffic Information for Analysis Using Evidence Theory.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Towards distributed privacy-preserving mobile access control.
Proceedings of the IEEE Global Communications Conference, 2014

QoS-constrained sensing task assignment for mobile crowd sensing.
Proceedings of the IEEE Global Communications Conference, 2014

SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Modeling multi-factor multi-site risk-based offloading for mobile cloud computing.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Attribute-based access control for ICN naming scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
IEEE Trans. Dependable Secur. Comput., 2013

Mobile cloud computing service models: a user-centric approach.
IEEE Netw., 2013

Adaptive Computing Resource Allocation for Mobile Cloud Computing.
Int. J. Distributed Sens. Networks, 2013

A cloud based dual-root trust model for secure mobile online transactions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Secure Web Referral Services for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Enabling secure location-based services in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Modeling Anonymous MANET Communications Using Super-Nodes.
Proceedings of the 32th IEEE Military Communications Conference, 2013

MCC-OSGi: An OSGi-based mobile cloud service model.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

A behavior based policy management for adaptive trustworthiness assignment in future network.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

An Efficient and Anonymous Attribute-Based group setup scheme.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Making offloading decisions resistant to network unavailability for mobile cloud collaboration.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks.
IEEE Trans. Veh. Technol., 2012

Cloud Computing, Networking, and Services.
J. Netw. Syst. Manag., 2012

Gradual identity exposure using attribute-based encryption.
Int. J. Inf. Priv. Secur. Integr., 2012

V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses.
Int. J. Cyber Behav. Psychol. Learn., 2012

Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Cheater Detection in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

V-lab: a cloud-based virtual laboratory platform for hands-on networking courses.
Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Secure web referral service.
Proceedings of the 2012 International Conference on Information Networking, 2012

Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE).
Proceedings of IEEE International Conference on Communications, 2012

MobiCloud: A geo-distributed mobile cloud computing platform.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs.
IEEE Trans. Intell. Transp. Syst., 2011

Policy Management for Secure Data Access Control in Vehicular Networks.
J. Netw. Syst. Manag., 2011

Efficient and Secure Data Storage Operations for Mobile Cloud Computing.
IACR Cryptol. ePrint Arch., 2011

Least Squares Disclosure Attack in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Low-latency Mix Using Split and Merge Operations.
J. Netw. Syst. Manag., 2010

On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2010

Situation-aware trust architecture for vehicular networks.
IEEE Commun. Mag., 2010

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Gradual Identity Exposure Using Attribute-Based Encryption.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Email-based Social Network Trust.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic highway congestion detection and prediction based on shock waves.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

On Economic Mobile Cloud Computing Model.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

An Optimal Key Distribution Scheme for Secure Multicast Group Communication.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Establishing Secure Virtual Trust Routing and Provisioning Domains for Future Internet.
Proceedings of the Global Communications Conference, 2010

On Measuring Email-Based Social Network Trust.
Proceedings of the Global Communications Conference, 2010

Anonymous Certification Services.
Proceedings of the Global Communications Conference, 2010

On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Using Power Hopping to Counter MAC Spoof Attacks in WLAN.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

IEEE 802.11 Wireless LAN Control Frame Protection.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Establishing Email-Based Social Network Trust for Vehicular Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Optimal Multicast Group Communication.
IACR Cryptol. ePrint Arch., 2009

ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks.
Ad Hoc Networks, 2009

Towards Lightweight Secure Communication Protocols for Passive RFIDs.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

On an information theoretic approach to model anonymous MANET communications.
Proceedings of the IEEE International Symposium on Information Theory, 2009

SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID Tags.
Proceedings of IEEE International Conference on Communications, 2009

Secret-Sharing Based Secure Communication Protocols for Passive RFIDs.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Distributed Data-Theft Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SeGCom: Secure Group Communication in VANETs.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Unlinkability Measure for IEEE 802.11 Based MANETs.
IEEE Trans. Wirel. Commun., 2008

Computing cryptographic pairing in sensors.
SIGBED Rev., 2008

FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field.
J. Syst. Archit., 2008

A secure group key management scheme for hierarchical mobile ad hoc networks.
Ad Hoc Networks, 2008

Privacy preservation services: challenges and solutions.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

C-Mix: A Lightweight Anonymous Routing Approach.
Proceedings of the Information Hiding, 10th International Workshop, 2008

SRK: A Distributed RFID Data Access Control Mechanism.
Proceedings of IEEE International Conference on Communications, 2008

2007
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach.
ACM Trans. Sens. Networks, 2007

Modeling pairwise key establishment for random key predistribution in large-scale sensor networks.
IEEE/ACM Trans. Netw., 2007

Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks.
Int. J. Secur. Networks, 2007

RFID Keeper: An RFID Data Access Control Mechanism.
Proceedings of the Global Communications Conference, 2007

A Distributed ePedigree Architecture.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

2006
New architecture for intra-domain network security issues.
Commun. ACM, 2006

Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

On Measuring Anonymity For Wireless Mobile Ad-hoc Networks.
Proceedings of the LCN 2006, 2006

On providing confidentiality in link state routing protocol.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Using Delaunay triangulation to construct obstacle detour mobility model.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

A key distribution scheme for double authentication in link state routing protocol.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Source routing based pairwise key establishment protocol for sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Network protection design for MPLS networks.
Proceedings of the 5th International Workshop on Design of Reliable Communication Networks, 2005

2004
A key-chain-based keying scheme for many-to-many secure group communication.
ACM Trans. Inf. Syst. Secur., 2004

Location-aware key management scheme for wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

2003
A double authentication scheme to detect impersonation attack in link state routing protocols.
Proceedings of IEEE International Conference on Communications, 2003


  Loading...