Shi, M., Rutagemwa, H., Shen, X. S., Mark, J. W., Jiang, Y., & Lin, C. (2007). AAA Architecture and Authentication for Wireless Lan roaming In Wireless Network Security (pp. 273-294). Springer, Boston, MA.
Reference author: Chuang Lin
First name
Chuang
Last name
Lin
Jiang, Y., Lin, C., Shi, M., Shen, X. S., & Chu, X. (2007). A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks Computer Communications, 30, 2428-2441.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Hash-binary-tree based group key distribution with time-limited node revocation In Security in Distributed and Networking Systems (pp. 339-366). University of Waterloo.
Jiang, Y., Fan, Y., Shen, X. S., & Lin, C. (2009). A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding Computer Networks, 53, 3089-3101.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2008). Efficient Re-Keying Scheme for Group Key Distribution Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 2639-2644. IEEE.
Lei, L., Lin, C., Cai, J., & Shen, X. (2008). Flow-level performance of opportunistic OFDM-TDMA and OFDMA networks IEEE Transactions on Wireless Communications, 7, 5461-5472.
Lei, L., Lin, C., Cai, J., & Shen, X. (2009). Performance analysis of wireless opportunistic schedulers using stochastic Petri nets IEEE Transactions on Wireless Communications, 8.
Xiao, Y., Lin, C., Jiang, Y., Chu, X., & Shen, X. (2010). Reputation-based qos provisioning in cloud computing via dirichlet multinomial model Communications (ICC), 2010 IEEE International Conference on, 1-5. IEEE.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2009). BAT: A robust signature scheme for vehicular networks using binary authentication tree IEEE Transactions on Wireless Communications, 8, 1974-1983.
Zhang, P., Jiang, Y., Lin, C., Fan, Y., & Shen, X. (2010). P-coding: secure network coding against eavesdropping attacks INFOCOM, 2010 Proceedings IEEE, 1-9. IEEE.
- Previous page
- Currently on page 2 2
- Next page