Song Han

Affiliations:
  • Curtin University, School of Information Systems, Perth, Australia
  • Peking University, Department of Mathematics, Beijing, China


According to our database1, Song Han authored at least 46 papers between 2003 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
RFID mutual authentication protocols for tags and readers with and without a server.
Comput. Syst. Sci. Eng., 2013

2012
Cognitive radio network security: A survey.
J. Netw. Comput. Appl., 2012

Towards enhanced key management in multi-phase ZigBee network architecture.
Comput. Commun., 2012

Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2012

A New Identity-Based Group Signature Scheme Based on Knapsack ECC.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Trust-Based Spectrum Sharing for Cognitive Radio Networks.
J. Interconnect. Networks, 2011

Anomaly detection in wireless sensor networks: A survey.
J. Netw. Comput. Appl., 2011

A mutual-healing key distribution scheme in wireless sensor networks.
J. Netw. Comput. Appl., 2011

Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2011

Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Generalized hash-binary-tree based self-healing key distribution with implicit authentication.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

A Combinational Approach for Trust Establishment in Cognitive Radio Networks.
Proceedings of the International Conference on Complex, 2011

2010
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
CoRR, 2010

Trust based security for cognitive radio networks.
Proceedings of the iiWAS'2010, 2010

An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Trust-Based Authentication for Secure Communication in Cognitive Radio Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

A Secure Key Management Model for Wireless Mesh Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wirel. Commun., 2009

Secure web services using two-way authentication and three-party key establishment for service delivery.
J. Syst. Archit., 2009

Security against DOS attack in mobile IP communication.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain.
Proceedings of the MSN 2009, 2009

An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Pairing-based public-key encryption schemes with backward-and-forward security.
Comput. Syst. Sci. Eng., 2008

A self-healing key distribution scheme based on vector space secret sharing and one way hash chains.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

An Efficient Self-Healing Key Distribution Scheme.
Proceedings of the NTMS 2008, 2008

A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy.
Proceedings of the E-Service Intelligence: Methodologies, Technologies and Applications, 2007

Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.
Int. J. Inf. Secur. Priv., 2007

Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.
Proceedings of the Computational Science and Its Applications, 2007

2006
An information privacy taxonomy for collaborative environments.
Inf. Manag. Comput. Secur., 2006

A framework of authentication and authorization for e-health services.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Evaluation of Stop Word Lists in Chinese Language.
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006

Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Improvement of a Convertible Undeniable Partially Blind Signature Scheme.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Secure Electronic Commerce with Mobile Agents.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

A Framework of Privacy Shield in Organizational Information Systems.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

A New Conceptual Framework Within Information Privacy: Meta Privacy.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Committal deniable signatures over elliptic curves.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Practical Fair Anonymous Undeniable Signatures.
Proceedings of the International Conference on Computational Intelligence, 2004

An Efficient Identity-Based Group Signature Scheme over Elliptic Curves.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004

2003
Identity-based confirmer signatures from pairings over elliptic curves.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

Revocable Anonymity of Undeniable Signature Scheme.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003


  Loading...