Jiang, Y., Lin, C., Shi, M., & Shen, X. S. (2006). A self-encryption authentication protocol for teleconference services International Journal of Security and Networks, 1, 198-205.
Reference author: Yixin Jiang
First name
Yixin
Last name
Jiang
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2006). Multiple Key Sharing and Distribution Scheme With $(n, t) $ Threshold for NEMO Group Communications IEEE Journal on Selected Areas in Communications, 24, 1738-1747.
Jiang, Y., Lin, C., & Shen, X. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks IEEE Transactions on Wireless Communications, 5, 2569-2577.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Key management schemes for wireless sensor networks Security in Sensor Networks, 113-143.
Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). SECURITY IN WIRELESS MOBILE AD HOC AND SENSOR NETWORKS-SELF-HEALING GROUP-WISE KEY DISTRIBUTION SCHEMES WITH TIME-LIMITED NODE REVOCATION FOR WIRELESS SENSOR NETWORKS IEEE Wireless Communications, 14, 38-47.
Jiang, Y., Lin, C., Shi, M., & Shen, X. S. (2007). Self-healing group key distribution with time-limited node revocation for wireless sensor networks Ad Hoc Networks, 5, 14-23.
Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks IEEE Wireless Communications, 14.
Jiang, Y., Lin, C., Shi, M., Shen, X. S., & Chu, X. (2007). A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks Computer Communications, 30, 2428-2441.
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Hash-binary-tree based group key distribution with time-limited node revocation In Security in Distributed and Networking Systems (pp. 339-366). University of Waterloo.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2008). A tree-based signature scheme for VANETs Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5. IEEE.
- Currently on page 1 1
- Next page