Jiang, Y., Lin, C., Shi, M., & Shen, X. S. (2006). A self-encryption authentication protocol for teleconference services International Journal of Security and Networks, 1, 198-205.
Reference author: Chuang Lin
First name
Chuang
Last name
Lin
Shen, X. S., Lin, C., Sun, Y. L., Pan, J., Langendoerfer, P., & Cao, Z. (2006). Wireless network security Wireless Communications and Mobile Computing, 6, 269-271.
Cheng, Y., Jiang, H., Zhuang, W., Niu, Z., & Lin, C. (2005). Efficient resource allocation for China s 3G/4G wireless networks IEEE Communications Magazine, 43, 76-83.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2006). Multiple Key Sharing and Distribution Scheme With $(n, t) $ Threshold for NEMO Group Communications IEEE Journal on Selected Areas in Communications, 24, 1738-1747.
Jiang, Y., Lin, C., & Shen, X. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks IEEE Transactions on Wireless Communications, 5, 2569-2577.
Jiang, Y., Lin, C., Shi, M., & Shen, X. S. (2007). Self-healing group key distribution with time-limited node revocation for wireless sensor networks Ad Hoc Networks, 5, 14-23.
Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks IEEE Wireless Communications, 14.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Key management schemes for wireless sensor networks Security in Sensor Networks, 113-143.
Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). SECURITY IN WIRELESS MOBILE AD HOC AND SENSOR NETWORKS-SELF-HEALING GROUP-WISE KEY DISTRIBUTION SCHEMES WITH TIME-LIMITED NODE REVOCATION FOR WIRELESS SENSOR NETWORKS IEEE Wireless Communications, 14, 38-47.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2008). A tree-based signature scheme for VANETs Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5. IEEE.
- Currently on page 1 1
- Next page