Yue-Hsun Lin
According to our database1,
Yue-Hsun Lin
authored at least 24 papers
between 2006 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
Eliminating rouge femtocells based on distance bounding protocol and geographic information.
Expert Syst. Appl., 2014
Comput. Commun. Rev., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks.
IEEE Trans. Knowl. Data Eng., 2013
SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN.
J. Inf. Hiding Multim. Signal Process., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013
2012
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
ACM Trans. Sens. Networks, 2012
oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks.
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2010
IEEE Trans. Mob. Comput., 2010
2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Embedded Software and Systems, 2008
2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006