Lin, X., Lu, R., Liang, X., & Shen, X. (2011). STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs INFOCOM, 2011 Proceedings IEEE, 2147-2155. IEEE.
Reference author: Rongxing Lu
First name
Rongxing
Last name
Lu
Li, X., Liang, X., Lu, R., He, S., Chen, J., & Shen, X. (2011). Toward reliable actor services in wireless sensor and actor networks Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on, 351-360. IEEE.
Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). Towards a light-weight message authentication mechanism tailored for smart grid communications Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, 1018-1023. IEEE.
Liang, X., Lu, R., Lin, X., & Shen, X. S. (2010). Ciphertext policy attribute based encryption with efficient revocation N/A.
Wasef, A., Lu, R., Lin, X., & Shen, X. (2010). Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks] IEEE Wireless Communications, 17.
Li, X., He, S., Chen, J., Liang, X., Lu, R., & Shen, S. (2011). Coordinate-free distributed algorithm for boundary detection in wireless sensor networks Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 1-5. IEEE.
Lu, R., Lin, X., Liang, X., & Shen, X. S. (2011). An efficient and provably secure public key encryption scheme based on coding theory Security and Communication Networks, 4, 1440-1447.
Liang, X., Li, X., Lu, R., Lin, X., & Shen, X. (2011). An efficient and secure user revocation scheme in mobile social networks Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 1-5. IEEE.
Chen, L., Cao, Z., Lu, R., Liang, X., & Shen, X. (2011). EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 1-5. IEEE.
Barua, M., Liang, X., Lu, R., & Shen, X. (2011). ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing International Journal of Security and Networks, 6, 67-76.
- Previous page
- Currently on page 6 6
- Next page