Jiang, Y., Lin, C., Shi, M., Shen, X. S., & Chu, X. (2007). A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks Computer Communications, 30, 2428-2441.
Reference author: Yixin Jiang
First name
Yixin
Last name
Jiang
Jiang, Y., Lin, C., Shi, M., & Shen, X. (2007). Hash-binary-tree based group key distribution with time-limited node revocation In Security in Distributed and Networking Systems (pp. 339-366). University of Waterloo.
Jiang, Y., Fan, Y., Shen, X. S., & Lin, C. (2009). A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding Computer Networks, 53, 3089-3101.
Fan, Y., Shen, X. S., Jiang, Y., Zhu, H., & Chen, J. (2009). Source Unobservability using Network Coding Engine.
Wasef, A., Jiang, Y., & Shen, X. (2008). ECMV: efficient certificate management scheme for vehicular networks Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5. IEEE.
Fan, Y., Lin, B., Jiang, Y., & Shen, X. (2008). An efficient privacy-preserving scheme for wireless link layer security Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5. IEEE.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2008). Efficient Re-Keying Scheme for Group Key Distribution Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 2639-2644. IEEE.
Fan, Y., Jiang, Y., Zhu, H., & Shen, X. (2009). An efficient privacy-preserving scheme against traffic analysis attacks in network coding INFOCOM 2009, IEEE, 2213-2221. IEEE.
Xiao, Y., Lin, C., Jiang, Y., Chu, X., & Shen, X. (2010). Reputation-based qos provisioning in cloud computing via dirichlet multinomial model Communications (ICC), 2010 IEEE International Conference on, 1-5. IEEE.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2009). BAT: A robust signature scheme for vehicular networks using binary authentication tree IEEE Transactions on Wireless Communications, 8, 1974-1983.
- Previous page
- Currently on page 2 2
- Next page