Sun, R., Shi, Z., Lu, R., Qiao, J., & Shen, X. (2012). A lightweight key management scheme for 60 GHz WPAN Wireless Communications & Signal Processing (WCSP), 2012 International Conference on, 1-6. IEEE.
Reference author: Rongxing Lu
First name
Rongxing
Last name
Lu
Liang, X., Li, X., Luan, T. H., Lu, R., Lin, X., & Shen, X. (2012). Morality-driven data forwarding with privacy preservation in mobile social networks IEEE Transactions on Vehicular Technology, 61, 3209-3222.
Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks Computer Networks, 57, 3492-3510.
Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency IEEE Transactions on Parallel and Distributed Systems, 24, 614-624.
Liang, X., Li, X., Lu, R., Lin, X., & Shen, X. (2013). UDP: Usage-based dynamic pricing with privacy preservation for smart grid IEEE Transactions on Smart Grid, 4, 141-150.
Shi, Z., Sun, R., Lu, R., Qiao, J., Chen, J., & Shen, X. (2013). A wormhole attack resistant neighbor discovery scheme with rdma protocol for 60 ghz directional network IEEE Transactions on Emerging Topics in Computing, 1, 341-352.
Lu, R., Lin, X., Zhu, H., Liang, X., & Shen, X. (2012). BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks IEEE Transactions on Parallel and Distributed Systems, 23, 32-43.
Wen, M., Lu, R., Zhang, K., Lei, J., Liang, X., & Shen, X. (2013). PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid IEEE Transactions on Emerging Topics in Computing, 1, 178-191.
Wen, M., Lu, R., Lei, J., Li, H., Liang, X., & Shen, X. S. (2014). SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing Security and Communication Networks, 7, 234-244.
Chen, S., Lu, R., & Shen, X. S. (2014). SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection Security and Communication Networks, 7, 265-278.
- Previous page
- Currently on page 9 9
- Next page