Song Han
Affiliations:- Curtin University, School of Information Systems, Perth, Australia
- Peking University, Department of Mathematics, Beijing, China
According to our database1,
Song Han
authored at least 46 papers
between 2003 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
RFID mutual authentication protocols for tags and readers with and without a server.
Comput. Syst. Sci. Eng., 2013
2012
Comput. Commun., 2012
Comput. J., 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
J. Interconnect. Networks, 2011
J. Netw. Comput. Appl., 2011
J. Netw. Comput. Appl., 2011
Comput. J., 2011
Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Generalized hash-binary-tree based self-healing key distribution with implicit authentication.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the International Conference on Complex, 2011
2010
Proceedings of the iiWAS'2010, 2010
An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wirel. Commun., 2009
Secure web services using two-way authentication and three-party key establishment for service delivery.
J. Syst. Archit., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the MSN 2009, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Pairing-based public-key encryption schemes with backward-and-forward security.
Comput. Syst. Sci. Eng., 2008
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Proceedings of the NTMS 2008, 2008
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the E-Service Intelligence: Methodologies, Technologies and Applications, 2007
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.
Int. J. Inf. Secur. Priv., 2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.
Proceedings of the Computational Science and Its Applications, 2007
2006
Inf. Manag. Comput. Secur., 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006
Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Secure Electronic Commerce with Mobile Agents.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Practical Fair Anonymous Undeniable Signatures.
Proceedings of the International Conference on Computational Intelligence, 2004
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004
2003
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003