Shi, M., Shen, X. S., Mark, J. W., Zhao, D., & Jiang, Y. (2008). User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks Computer Networks, 52, 1693-1702.
Reference author: Yixin Jiang
First name
Yixin
Last name
Jiang
Shi, M., Rutagemwa, H., Shen, X. S., Mark, J. W., Jiang, Y., & Lin, C. (2007). AAA Architecture and Authentication for Wireless Lan roaming In Wireless Network Security (pp. 273-294). Springer, Boston, MA.
Jiang, Y., Fan, Y., Shen, X. S., & Lin, C. (2009). A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding Computer Networks, 53, 3089-3101.
Fan, Y., Shen, X. S., Jiang, Y., Zhu, H., & Chen, J. (2009). Source Unobservability using Network Coding Engine.
Wasef, A., Jiang, Y., & Shen, X. (2008). ECMV: efficient certificate management scheme for vehicular networks Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5. IEEE.
Fan, Y., Lin, B., Jiang, Y., & Shen, X. (2008). An efficient privacy-preserving scheme for wireless link layer security Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5. IEEE.
Jiang, Y., Shi, M., Shen, X., & Lin, C. (2008). Efficient Re-Keying Scheme for Group Key Distribution Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 2639-2644. IEEE.
Fan, Y., Jiang, Y., Zhu, H., & Shen, X. (2009). An efficient privacy-preserving scheme against traffic analysis attacks in network coding INFOCOM 2009, IEEE, 2213-2221. IEEE.
Zhang, P., Jiang, Y., Lin, C., Fan, Y., & Shen, X. (2010). P-coding: secure network coding against eavesdropping attacks INFOCOM, 2010 Proceedings IEEE, 1-9. IEEE.
Fan, Y., Jiang, Y., Zhu, H., & Shen, X. (2010). PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks IEEE Transactions on Wireless Communications, 9, 945-950.
- Previous page
- Currently on page 2 2
- Next page