-
2
-
-
67249136801
-
-
Springer: Berlin, Heidelberg.
-
Deng LY, Li H, Shiau JH, Tsai G,. Design and Implementation of Efficient and Portable Multiple Recursive Generators with Few Zero Coefficients. Springer: Berlin, Heidelberg, 2006.
-
(2006)
Design and Implementation of Efficient and Portable Multiple Recursive Generators with Few Zero Coefficients
-
-
Deng, L.Y.1
Li, H.2
Shiau, J.H.3
Tsai, G.4
-
3
-
-
79951981444
-
Multiple recursive random generators and their APL programmes
-
Foulley J-L,. Multiple recursive random generators and their APL programmes, Technical Report, INRA-SGQA, 2005.
-
(2005)
Technical Report, INRA-SGQA
-
-
Foulley, J.-L.1
-
5
-
-
84968513334
-
Primitive polynomials (mod 2)
-
Watson EJ,. Primitive polynomials (mod 2). Mathematics of Computation 1962; 16: 368-369.
-
(1962)
Mathematics of Computation
, vol.16
, pp. 368-369
-
-
Watson, E.J.1
-
6
-
-
56949107218
-
Security co-existence of wireless sensor networks and RFID for pervasive computing
-
Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing,; ().
-
Sun B, Xiao Y, Li C-C, Chen H, Yang TA,. Security co-existence of wireless sensor networks and RFID for pervasive computing. Computer Communications Journal Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing, 2008; 31 (18): 4294-4303.
-
(2008)
Computer Communications Journal
, vol.31
, Issue.18
, pp. 4294-4303
-
-
Sun, B.1
Xiao, Y.2
Li, C.-C.3
Chen, H.4
Yang, T.A.5
-
7
-
-
44349157008
-
Low-cost wireless sensor networks for remote cardiac patients monitoring applications
-
DOI 10.1002/wcm.488
-
Hu F, Jiang M, Xiao Y,. Low-cost wireless sensor networks for remote cardiac patients monitoring applications. Journal of Wireless Communications and Mobile Computing 2008; 8 (4): 513-529. (Pubitemid 351747464)
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.4
, pp. 513-529
-
-
Hu, F.1
Jiang, M.2
Xiao, Y.3
-
11
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
Kiayias A, Yung M,. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1 (1/2): 24-45.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.12
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
14
-
-
77954341184
-
An approach to synthesise safe systems
-
Jhumka A, Freiling F, Fetzer C, Suri N,. An approach to synthesise safe systems. International Journal of Security and Networks 2006; 1 (1/2): 62-74.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.12
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
15
-
-
74549166520
-
Wireless networking security: Open issues in trust, management, interoperation and measurement
-
Evans JB, Wang W, Ewy BJ, Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1 (1/2): 84-94.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.12
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
16
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
Englund H, Johansson T,. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1 (1/2): 95-102.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.12
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
19
-
-
79951685922
-
Editorial: Security issues on sensor networks
-
Xiao Y, Jia X, Sun B, Du X,. Editorial: security issues on sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 125-126.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
21
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
Zheng J, Li J, Lee MJ, Michael A,. A lightweight encryption and authentication scheme for wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 138-146.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Michael, A.4
-
22
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
Al-Karaki JN,. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 147-157.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
23
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz O, Qi H,. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 158-166.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
24
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng J, Han R, Mishra S,. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 167-178.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
25
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
Hwu J-S, Hsu S-F, Lin Y-B, Chen R-J,. End-to-end security mechanisms for SMS. International Journal of Security and Networks 2006; 1 (3/4): 177-183.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 177-183
-
-
Hwu, J.-S.1
Hsu, S.-F.2
Lin, Y.-B.3
Chen, R.-J.4
-
26
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang X,. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1 (3/4): 184-197.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 184-197
-
-
Wang, X.1
-
27
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Jiang Y, Lin C, Shi M, Shen XS,. A self-encryption authentication protocol for teleconference services. International Journal of Security and Networks 2006; 1 (3/4): 198-205.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.S.4
-
30
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo JCM, Tan CH, Ng JM,. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1 (3/4): 226-236.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 226-236
-
-
Teo, J.C.M.1
Tan, C.H.2
Ng, J.M.3
-
31
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan CH,. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1 (3/4): 237-242.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 237-242
-
-
Tan, C.H.1
-
32
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
-
Liu Y, Comaniciu C,., Man H,. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1 (3/4): 243-254.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
33
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V,. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. International Journal of Security and Networks 2006; 1 (3/4): 255-265.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
35
-
-
17644416411
-
Efficient and portable multiple recursive generators of large order
-
Deng LY,. Efficient and portable multiple recursive generators of large order. ACM Transactions on Modeling and Computer Simulation 2005; 15 (1): 1-13.
-
(2005)
ACM Transactions on Modeling and Computer Simulation
, vol.15
, Issue.1
, pp. 1-13
-
-
Deng, L.Y.1
-
36
-
-
79951997971
-
-
Primitive polynomial. Available at: [16 December 2007]
-
Primitive polynomial. Available at: [16 December 2007].
-
-
-
-
37
-
-
0034379856
-
Random number generation for the new century
-
Deng LY, Lin DKJ,. Random number generation for the new century. American Statistician 2000; 54 (2): 145-150.
-
(2000)
American Statistician
, vol.54
, Issue.2
, pp. 145-150
-
-
Deng, L.Y.1
Lin, D.K.J.2
-
38
-
-
4243066342
-
A system of high-dimensional, efficient, long-cycle and portable uniform random number generators
-
Deng LY, Xu HQ,. A system of high-dimensional, efficient, long-cycle and portable uniform random number generators. ACM Transactions on Modeling and Computer Simulation 2003; 13 (4): 299-309.
-
(2003)
ACM Transactions on Modeling and Computer Simulation
, vol.13
, Issue.4
, pp. 299-309
-
-
Deng, L.Y.1
Xu, H.Q.2
-
40
-
-
51249089651
-
A Virtual Password Scheme to Protect Passwords
-
Lei M, Xiao Y, Vrbsky SV, Li C-C, Liu L,. A Virtual Password Scheme to Protect Passwords, Proceedings of IEEE ICC, 2008.
-
(2008)
Proceedings of IEEE ICC
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.V.3
Li, C.-C.4
Liu, L.5
-
42
-
-
46449131007
-
Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining
-
Hu F, Jiang M, Celentano L, Xiao Y,. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. Ad Hoc Networks 2008; 6 (7): 986-1012.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.7
, pp. 986-1012
-
-
Hu, F.1
Jiang, M.2
Celentano, L.3
Xiao, Y.4
-
43
-
-
33646943487
-
Security and privacy in RFID and applications in telemedicine
-
DOI 10.1109/MCOM.2006.1632651
-
Xiao Y, Shen X, Sun B, Cai L,. Security and privacy in RFID and applications in telemedicine. IEEE Communications Magazine, Special issue on Quality Assurance and Devices in Telemedicine, 2006; 64-72. (Pubitemid 43792670)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 64-72
-
-
Xiao, Y.1
Shen, X.2
Sun, B.3
Cai, L.4
-
44
-
-
33746734206
-
A lightweight secure protocol for wireless sensor networks
-
DOI 10.1016/j.comcom.2006.02.006, PII S0140366406000545
-
Sun B, Li C, Wu K, Xiao Y,. A lightweight secure protocol for wireless sensor networks. Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance, Reliability, Security and Beyond, 2006; 29 (13-14): 2556-2568. (Pubitemid 44162986)
-
(2006)
Computer Communications
, vol.29
, Issue.13-14
, pp. 2556-2568
-
-
Sun, B.1
Li, C.-C.2
Wu, K.3
Xiao, Y.4
-
45
-
-
0003657590
-
-
(3rd edn), Addison-Wesley, Reading, MA.
-
Knuth DE,. The Art of Computer Programming, Vol. 2: Seminumerical Algorithms (3rd edn), Addison-Wesley, Reading, MA, 1988.
-
(1988)
The Art of Computer Programming, Vol. 2: Seminumerical Algorithms
-
-
Knuth, D.E.1
-
46
-
-
0002868910
-
Bad lattice structures for vectors of non-successive values produced by some linear recurrences
-
LEcuyer P,. Bad lattice structures for vectors of non-successive values produced by some linear recurrences. INFORMS Journal on Computing 1997; 9: 57-60.
-
(1997)
INFORMS Journal on Computing
, vol.9
, pp. 57-60
-
-
Lecuyer, P.1
-
49
-
-
34247512176
-
Radio frequency identification: Technologies, applications, and research issues
-
DOI 10.1002/wcm.365
-
Xiao Y, Yu S, Wu K, Ni Q, Janecek C, Nordstad J,. Radio frequency identification: technologies, applications, and research issues. Journal of Wireless Communications and Mobile Computing 2007; 7 (4): 457-472. (Pubitemid 46659482)
-
(2007)
Wireless Communications and Mobile Computing
, vol.7
, Issue.4
, pp. 457-472
-
-
Xiao, Y.1
Yu, S.2
Wu, K.3
Ni, Q.4
Janecek, C.5
Nordstad, J.6
|