Xiaodong Lin

Orcid: 0000-0001-8916-6645

Affiliations:
  • University of Guelph, School of Computer Science, Canada
  • Wilfrid Laurier University, Waterloo, ON, Canada (2017 - 2018)
  • University of Ontario Institute of Technology, Oshawa, ON, Canada (2008 - 2017)
  • University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada (PhD 2008)


According to our database1, Xiaodong Lin authored at least 352 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective.
ACM Comput. Surv., March, 2025

2024
The Achilles' Heel of License Plate Recognition Parking Enforcement: Balancing Privacy Protection and Enforcement.
IEEE Internet Things J., October, 2024

Exposing Stealthy Wash Trading on Automated Market Maker Exchanges.
ACM Trans. Internet Techn., 2024

Decentralized Threshold Signatures With Dynamically Private Accountability.
IEEE Trans. Inf. Forensics Secur., 2024

PrivGrid: Privacy-Preserving Individual Load Forecasting Service for Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2024

Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2024

CODER: Protecting Privacy in Image Retrieval With Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2024

QP-LDP for Better Global Model Performance in Federated Learning.
IEEE Internet Things J., 2024

XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning.
Digit. Commun. Networks, 2024

PAGE: Equilibrate Personalization and Generalization in Federated Learning.
Proceedings of the ACM on Web Conference 2024, 2024

ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DeFiAligner: Leveraging Symbolic Analysis and Large Language Models for Inconsistency Detection in Decentralized Finance.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Blockchain-Based Fair and Fine-Grained Data Trading With Privacy Preservation.
IEEE Trans. Computers, September, 2023

Vehicular Networking: Ultra-Low Latency and Reliable Communications For Future Wireless Networks.
IEEE Commun. Stand. Mag., September, 2023

Blockchains for Artificial Intelligence of Things: A Comprehensive Survey.
IEEE Internet Things J., August, 2023

Dap-FL: Federated Learning Flourishes by Adaptive Tuning and Secure Aggregation.
IEEE Trans. Parallel Distributed Syst., June, 2023

Dual-Anonymous Off-Line Electronic Cash for Mobile Payment.
IEEE Trans. Mob. Comput., June, 2023

TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023

Patient-Centric Fine-Grained Access Control for Electronic Medical Record Sharing With Security via Dual-Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023

FedDual: Pair-Wise Gossip Helps Federated Learning in Large Decentralized Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment.
IEEE Trans. Dependable Secur. Comput., 2023

PPT: A privacy-preserving global model training protocol for federated learning in P2P networks.
Comput. Secur., 2023

RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Adversarial Example Attacks and Defenses in DNS Data Exfiltration.
Proceedings of the Emerging Information Security and Applications, 2023

Why Trick Me: The Honeypot Traps on Decentralized Exchanges.
Proceedings of the 2023 Workshop on Decentralized Finance and Security, 2023

Class Attention Transfer Based Knowledge Distillation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

Heterogeneous Computation and Resource Allocation for Wireless Powered Federated Edge Learning Systems.
IEEE Trans. Commun., 2022

DNA Similarity Search With Access Control Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Blockchain-Cloud Transparent Data Marketing: Consortium Management and Fairness.
IEEE Trans. Computers, 2022

Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction.
IEEE Internet Things J., 2022

DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022

Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing.
IEEE Internet Things J., 2022

Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.
IEEE Internet Things J., 2022

BlackFeather: A framework for background noise forensics.
Digit. Investig., 2022

Series Editorial: Vehicular Networking and 6G Data Taxonomy.
IEEE Commun. Stand. Mag., 2022

XMAM: X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning.
CoRR, 2022

Everything you control is not everything: Achieving intention-concealed visit on social networks.
Comput. Secur., 2022

LLDP: A Layer-wise Local Differential Privacy in Federated Learning.
Proceedings of the IEEE International Conference on Trust, 2022

QP-LDP for better global model performance in federated learning.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks.
Proceedings of the Information Security - 25th International Conference, 2022

ARCANE: An Efficient Architecture for Exact Machine Unlearning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Heterogeneous Feature Ensemble Learning based Deepfake Detection Method.
Proceedings of the IEEE International Conference on Communications, 2022

Understanding Flash-Loan-based Wash Trading.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

2021
Content Delivery Analysis in Cellular Networks With Aerial Caching and mmWAVE Backhaul.
IEEE Trans. Veh. Technol., 2021

Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing.
IEEE Trans. Veh. Technol., 2021

Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles.
IEEE Trans. Veh. Technol., 2021

Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing.
IEEE Trans. Serv. Comput., 2021

Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability.
IEEE Trans. Netw. Sci. Eng., 2021

Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services.
IEEE Trans. Dependable Secur. Comput., 2021

Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors.
IEEE Trans. Cloud Comput., 2021

Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services.
IEEE Trans. Computers, 2021

A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021

Application-Oriented Block Generation for Consortium Blockchain-Based IoT Systems With Dynamic Device Management.
IEEE Internet Things J., 2021

Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., 2021

Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems.
IEEE Internet Things J., 2021

Efficient and Privacy-Preserving Speaker Recognition for Cybertwin-Driven 6G.
IEEE Internet Things J., 2021

A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021

<i>CShield</i>: Enabling code privacy for Cyber-Physical systems.
Future Gener. Comput. Syst., 2021

Guest Editorial: Data Analytics Streamlines Autonomous Driving.
IEEE Commun. Stand. Mag., 2021

PPT: A Privacy-Preserving Global Model Training Protocol for Federated Learning in P2P Networks.
CoRR, 2021

Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Voxstructor: Voice Reconstruction from Voiceprint.
Proceedings of the Information Security - 24th International Conference, 2021

An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing.
Proceedings of the ICC 2021, 2021

Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Advances of Security and Privacy Techniques in Emerging Wireless Networks.
IEEE Wirel. Commun., 2020

Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain.
IEEE Trans. Veh. Technol., 2020

Transparent and Accountable Vehicular Local Advertising With Practical Blockchain Designs.
IEEE Trans. Veh. Technol., 2020

Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020

Understanding Ethereum via Graph Analysis.
ACM Trans. Internet Techn., 2020

Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Balancing Privacy and Accountability for Industrial Mortgage Management.
IEEE Trans. Ind. Informatics, 2020

VerifyNet: Secure and Verifiable Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2020

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2020

MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET.
IEEE Trans. Dependable Secur. Comput., 2020

The Security of Autonomous Driving: Threats, Defenses, and Future Directions.
Proc. IEEE, 2020

iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting.
IEEE J. Sel. Areas Commun., 2020

Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity.
J. Commun. Inf. Networks, 2020

Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach.
IEEE Internet Things J., 2020

BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptol. ePrint Arch., 2020

Guest Editorial: Centralized Management of Smart Transportation.
IEEE Commun. Stand. Mag., 2020

Reshaping Autonomous Driving for the 6G Era.
IEEE Commun. Stand. Mag., 2020

SODA: A Generic Online Detection Framework for Smart Contracts.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

On Dually-Polarized MIMO based NOMA: System Model and Polarization Resource Allocation.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Consent-based Privacy-preserving Decision Tree Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Ring Selection for Ring Signature-Based Privacy Protection in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation.
IEEE Trans. Veh. Technol., 2019

On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach.
IEEE Trans. Veh. Technol., 2019

Toward Privacy-Preserving Valet Parking in Autonomous Driving Era.
IEEE Trans. Veh. Technol., 2019

Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks.
IEEE Trans. Veh. Technol., 2019

Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors.
IEEE Trans. Smart Grid, 2019

Anonymous Reputation System for IIoT-Enabled Retail Marketing Atop PoS Blockchain.
IEEE Trans. Ind. Informatics, 2019

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2019

Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives.
IEEE Netw., 2019

Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet Things J., 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

Drones in the Era of V2X Communications.
IEEE Commun. Stand. Mag., 2019

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019

Towards Edge-assisted Internet of Things: From Security and Efficiency Perspectives.
CoRR, 2019

CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing.
Proceedings of the Security and Privacy in Communication Networks, 2019

Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Against Pilot Spoofing Attack with Double Channel Training in Massive MIMO NOMA Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Private and Efficient Ad Impression Aggregation in Mobile Advertising.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Secure and Fair IIoT-Enabled Supply Chain Management via Blockchain-Based Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Privacy-Enhancing Fog Computing and Its Applications
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-030-02112-2, 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Veh. Technol., 2018

Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2018

HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018

Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities.
IEEE Netw., 2018

Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View.
IEEE Netw., 2018

Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT.
IEEE J. Sel. Areas Commun., 2018

Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain.
J. Medical Syst., 2018

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications.
Internet Technol. Lett., 2018

Automated forensic analysis of mobile applications on Android devices.
Digit. Investig., 2018

Vehicular Networking: Protecting Vehicles from Imminent Cyber Threats.
IEEE Commun. Stand. Mag., 2018

Vehicular Networking Series Editorial.
IEEE Commun. Stand. Mag., 2018

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2018

Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Efficient Deduplicated Reporting in Fog-Assisted Vehicular Crowdsensing.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Privacy-Preserving Incentive Framework for the Vehicular Cloud.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Blockchain-Based Secure Data Provenance for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

EFRS: Enabling Efficient and Fine-Grained Range Search on Encrypted Spatial Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

Introductory Computer Forensics - A Hands-on Practical Approach
Springer, ISBN: 978-3-030-00580-1, 2018

2017
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017

Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017

Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems.
IEEE Trans. Inf. Forensics Secur., 2017

Security-Aware and Privacy-Preserving D2D Communications in 5G.
IEEE Netw., 2017

A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing.
IEEE Internet Things J., 2017

A Privacy-Preserving Data-Sharing Framework for Smart Grid.
IEEE Internet Things J., 2017

Vehicular Networking.
IEEE Commun. Stand. Mag., 2017

Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing.
IEEE Commun. Mag., 2017

Location privacy-aware task recommendation for spatial crowdsourcing.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Secure and privacy-preserving task announcement in vehicular cloud.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Cloud-based parallel concolic execution.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

Dual-anonymous reward distribution for mobile crowdsensing.
Proceedings of the IEEE International Conference on Communications, 2017

A privacy-preserving and truthful tendering framework for vehicle cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Android digital forensics: data, extraction and analysis.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2016

Consent-based access control for secure and privacy-preserving health information exchange.
Secur. Commun. Networks, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive Mob. Comput., 2016

Guest Editorial: Network Forensics and Surveillance for Emerging Networks.
IEEE Netw., 2016

Itrust: interpersonal trust measurements from social interactions.
IEEE Netw., 2016

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks.
KSII Trans. Internet Inf. Syst., 2016

Towards collusion-attack-resilient group key management using one-way function tree.
Comput. Networks, 2016

Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

SQLite Forensic Analysis Based on WAL.
Proceedings of the Security and Privacy in Communication Networks, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EDAT: Efficient data aggregation without TTP for privacy-assured smart metering.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Fairness-Aware and Privacy-Preserving Online Insurance Application System.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient and Privacy-Preserving Smart Grid Downlink Communication Using Identity Based Signcryption.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Proxy Re-encryption with Delegatable Verifiability.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wirel. Commun., 2015

User-provided networking for QoE provisioning in mobile networks.
IEEE Wirel. Commun., 2015

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distributed Syst., 2015

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2015

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015

User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices.
IEEE Trans. Emerg. Top. Comput., 2015

An effective behavior-based Android malware detection system.
Secur. Commun. Networks, 2015

Duth: a user-friendly dual-factor authentication for Android smartphone devices.
Secur. Commun. Networks, 2015

An empirical investigation into path divergences for concolic execution using CREST.
Secur. Commun. Networks, 2015

ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Secur. Commun. Networks, 2015

MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2015

Networking for big data: part 2 [Guest Editorial].
IEEE Netw., 2015

CHetNet: crowdsourcing to heterogeneous cellular networks.
IEEE Netw., 2015

PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems.
IEEE J. Sel. Top. Signal Process., 2015

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid.
KSII Trans. Internet Inf. Syst., 2015

Design and Implementation of Real-time Sobel Edge Detection on FPGA for Mobile Device Applications.
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015

Security and Privacy in Mobile Social Networks.
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015

TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fine-grained data sharing in cloud computing for mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

QoS oriented heterogeneous traffic scheduling in LTE downlink.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A uniform framework for network selection in Cognitive Radio Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Blurred License Plate Recognition based on single snapshot from drive recorder.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Achieving authorized and ranked multi-keyword search over encrypted cloud data.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Efficient e-health data release with consistency guarantee under differential privacy.
Proceedings of the 17th International Conference on E-health Networking, 2015

Effective Data Rate Based Rank Adaptive Receive Antenna Selection.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Security and privacy in mobile social networks: challenges and solutions.
IEEE Wirel. Commun., 2014

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014

Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation.
IEEE J. Biomed. Health Informatics, 2014

PPNA special issue on "the green, reliability and security of machine-to-machine communications".
Peer-to-Peer Netw. Appl., 2014

Networking for big data [Guest Editorial].
IEEE Netw., 2014

Socialized WBANs in mobile sensing environments.
IEEE Netw., 2014

Wireless Technology for Pervasive Healthcare.
Mob. Networks Appl., 2014

Radio Resource Management of CoMP System in HetNet under Power and Backhaul Constraints.
KSII Trans. Internet Inf. Syst., 2014

NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2014

A Fast Modular Reduction Method.
IACR Cryptol. ePrint Arch., 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PLAM: A privacy-preserving framework for local-area mobile social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Statistical analysis of capacity in joint processing coordinated multi-point systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Natural image splicing detection based on defocus blur at edges.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A framework for privacy-preserving data sharing in the Smart Grid.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Power allocation for CoMP system with backhaul limitation.
Proceedings of the IEEE International Conference on Communications, 2014

User-satisfaction-based weighted SLNR beamforming in TD-LTE-A system.
Proceedings of the IEEE International Conference on Communications, 2014

Separate-combine recovery for compressed sensing of large images.
Proceedings of the IEEE International Conference on Communications, 2014

Cooperative sensing scheduling in Cognitive Radio Networks with multiple Primary Networks.
Proceedings of the IEEE Global Communications Conference, 2014

Toward secure user-habit-oriented authentication for mobile devices.
Proceedings of the IEEE Global Communications Conference, 2014

An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Security and Privacy in Mobile Social Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013

Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wirel. Commun., 2013

On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wirel. Commun., 2013

Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2013

A New Delay Analysis for IEEE 802.11 PCF.
IEEE Trans. Veh. Technol., 2013

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid.
IEEE Trans. Smart Grid, 2013

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
IEEE Trans. Parallel Distributed Syst., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE J. Sel. Areas Commun., 2013

A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems.
IEEE Intell. Syst., 2013

Kernel regression based encrypted images compression for e-healthcare systems.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Community detection based reference points clustering for indoor localization in WLAN.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

On symbol mapping for FQPSK modulation enabled Physical-layer Network Coding.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

EATH: An efficient aggregate authentication protocol for smart grid communications.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On optimal communication strategies for cooperative cognitive radio networking.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Effective epidemic control and source tracing through mobile social sensing over WBANs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Analysis on dynamic of node storage in space delay/disruption tolerant networking.
Proceedings of IEEE International Conference on Communications, 2013

Joint optimization of spectrum sensing and dynamic spectrum access system.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Secure and effective image storage for cloud based e-healthcare systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

RECCE: A reliable and efficient cloud cooperation scheme in E-healthcare.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Detecting GPS information leakage in Android applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Selectively iterative particle filtering and its applications for target tracking in WSNs.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Veh. Technol., 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012

Security and privacy in emerging information technologies.
Secur. Commun. Networks, 2012

Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Netw. Comput. Appl., 2012

Guest Editorial.
J. Commun., 2012

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Commun. Mag., 2012

Cross entropy based component carrier allocation in LTE-Advanced wireless communication system.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

PDP: A Privacy-Preserving Data Provenance Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Towards hierarchical security framework for smartphones.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

A secure message delivery scheme with path tracking for delay tolerant networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Enabling pervasive healthcare with privacy preservation in smart community.
Proceedings of IEEE International Conference on Communications, 2012

Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012

A privacy-preserving proximity friend notification scheme with opportunistic networking.
Proceedings of IEEE International Conference on Communications, 2012

Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Capillary Machine-to-Machine Communications: The Road Ahead.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks.
Wirel. Commun. Mob. Comput., 2011

An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011

A provably secure threshold signature scheme based on DDH assumption.
Secur. Commun. Networks, 2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network.
Mob. Networks Appl., 2011

A clique-based secure admission control scheme for mobile ad hoc networks (MANETs).
J. Netw. Comput. Appl., 2011

Emerging technologies and applications of wireless communication in healthcare.
J. Commun. Networks, 2011

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011

GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011

Smart community: an internet of things application.
IEEE Commun. Mag., 2011

STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks.
Proceedings of IEEE International Conference on Communications, 2011

EVSE: An Efficient Vehicle Social Evaluation Scheme with Location Privacy Preservation for Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient and Secure User Revocation Scheme in Mobile Social Networks.
Proceedings of the Global Communications Conference, 2011

A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011

2010
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2010

Complementing public key infrastructure to secure vehicular ad hoc networks.
IEEE Wirel. Commun., 2010

Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wirel. Commun., 2010

An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks.
Comput. Networks, 2010

PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs.
Proceedings of IEEE International Conference on Communications, 2010

A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2010

TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010

Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding.
Proceedings of the Global Communications Conference, 2010

On Achieving Encrypted File Recovery.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

An Efficient Searchable Encryption Scheme and Its Application in Network Forensics.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010

Emerging trends in network forensics.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

2009
Security in service-oriented vehicular networks.
IEEE Wirel. Commun., 2009

PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Veh. Technol., 2009

SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009

A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009

Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE J. Sel. Areas Commun., 2009

SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Location-Release Signature for Vehicular Communications.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Group-Based Key Management Protocol for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008

TSVC: timed efficient and secure vehicular communications with privacy preserving.
IEEE Trans. Wirel. Commun., 2008

TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2008

An Efficient Message Authentication Scheme for Vehicular Communications.
IEEE Trans. Veh. Technol., 2008

New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks.
Int. J. Secur. Networks, 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Security in vehicular ad hoc networks.
IEEE Commun. Mag., 2008

RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A model-based semi-quantitative approach for evaluating security of enterprise networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008

BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications.
IEEE Trans. Veh. Technol., 2007

TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A keyless facility access control system with wireless enabled personal devices.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Towards compromise-resilient localized authentication architecture for wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2007

Two-Factor Localized Authentication Scheme for WLAN Roaming.
Proceedings of IEEE International Conference on Communications, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

Performance Enhancement for Secure Vehicular Communications.
Proceedings of the Global Communications Conference, 2007

2006
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2000
Performance Analysis of Secure Web Server Based on SSL.
Proceedings of the Information Security, Third International Workshop, 2000


  Loading...