-
1
-
-
84921441831
-
Dominating set and network coding-based routing in wireless mesh networks
-
Feb
-
J. Chen, K. He, R. Du, Y. Xiang, and Q. Yuan, "Dominating set and network coding-based routing in wireless mesh networks," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, pp. 423-433, Feb. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst
, vol.26
, Issue.2
, pp. 423-433
-
-
Chen, J.1
He, K.2
Du, R.3
Xiang, Y.4
Yuan, Q.5
-
2
-
-
84863935030
-
Indirect reciprocity security game for large-scale wireless networks
-
Aug
-
L. Xiao, Y. Chen, W. S. Lin, and K. J. R. Liu, "Indirect reciprocity security game for large-scale wireless networks," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 4, pp. 1368-1380, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Secur
, vol.7
, Issue.4
, pp. 1368-1380
-
-
Xiao, L.1
Chen, Y.2
Lin, W.S.3
Liu, K.J.R.4
-
3
-
-
84974824406
-
Distributed greedy coding-aware deterministic routing for multi-flow in wireless networks
-
J. Chen, K. He, Q. Yuan, R. Du, and J. Wu, "Distributed greedy coding-aware deterministic routing for multi-flow in wireless networks," Comput. Netw., vol. 105, pp. 194-206, 2016.
-
(2016)
Comput. Netw
, vol.105
, pp. 194-206
-
-
Chen, J.1
He, K.2
Yuan, Q.3
Du, R.4
Wu, J.5
-
4
-
-
84975886698
-
Mobilityaware caching and computation offloading in 5G ultradense cellular networks
-
M. Chen, Y. Hao, M. Qiu, J. Song, D. Wu, and I. Humar, "Mobilityaware caching and computation offloading in 5G ultradense cellular networks," Sensors, vol. 16, no. 7, pp. 974-986, 2016.
-
(2016)
Sensors
, vol.16
, Issue.7
, pp. 974-986
-
-
Chen, M.1
Hao, Y.2
Qiu, M.3
Song, J.4
Wu, D.5
Humar, I.6
-
5
-
-
84952313614
-
The Mason test: A defense against Sybil attacks in wireless networks without trusted authorities
-
Nov
-
Y. Liu, D. Bild, R. Dick, Z. Mao, and D. Wallach, "The Mason test: A defense against Sybil attacks in wireless networks without trusted authorities," IEEE Trans. Mobile Comput., vol. 14, no. 11, pp. 2376-2391, Nov. 2015.
-
(2015)
IEEE Trans. Mobile Comput
, vol.14
, Issue.11
, pp. 2376-2391
-
-
Liu, Y.1
Bild, D.2
Dick, R.3
Mao, Z.4
Wallach, D.5
-
6
-
-
84953392935
-
Softwaredefined mobile networks security
-
M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, "Softwaredefined mobile networks security," Mobile Netw. Appl., 2016. [Online]. Available: http://doi:10.1007/s11036-015-0665-5.
-
(2016)
Mobile Netw. Appl
-
-
Chen, M.1
Qian, Y.2
Mao, S.3
Tang, W.4
Yang, X.5
-
7
-
-
84894565582
-
Efficient authentication for mobile and pervasive computing
-
Mar
-
B. Alomair and R. Poovendran, "Efficient authentication for mobile and pervasive computing," IEEE Trans. Mobile Comput., vol. 13, no. 3, pp. 496-481, Mar. 2014.
-
(2014)
IEEE Trans. Mobile Comput
, vol.13
, Issue.3
, pp. 481-496
-
-
Alomair, B.1
Poovendran, R.2
-
8
-
-
85038858282
-
Searchable encryption over feature-rich data
-
Q. Wang, M. He, M. Du, S. S. M. Chow, R. W. F. Lai, and Q. Zou, "Searchable encryption over feature-rich data," IEEE Trans. Depend. Secure Comput., 2016. [Online]. Available: http://doi.org/ 10.1109/TDSC.2016.2593444
-
(2016)
IEEE Trans. Depend. Secure Comput
-
-
Wang, Q.1
He, M.2
Du, M.3
Chow, S.S.M.4
Lai, R.W.F.5
Zou, Q.6
-
9
-
-
84861148357
-
A batch-authenticated and key agreement framework for P2P-based online social networks
-
May
-
L. Y. Yeh, Y. L. Huang, A. Joseph, S. Shieh, and W. Tsaur, "A batch-authenticated and key agreement framework for P2P-based online social networks," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1907-1924, May 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.4
, pp. 1907-1924
-
-
Yeh, L.Y.1
Huang, Y.L.2
Joseph, A.3
Shieh, S.4
Tsaur, W.5
-
10
-
-
84998890585
-
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments
-
K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments," IEEE Trans. Comput., 2016. [Online]. Available: http:// doi.org/10.1109/TC.2016.2560812
-
(2016)
IEEE Trans. Comput
-
-
He, K.1
Chen, J.2
Du, R.3
Wu, Q.4
Xue, G.5
Zhang, X.6
-
12
-
-
0041863206
-
Can DSA be improved? Complexity trade-offs with the digital signature standard
-
D. Naccache, D. M'Raihi, S. Vaudenay, and D. Raphaeli, "Can DSA be improved? complexity trade-offs with the digital signature standard," in Proc. EUROCRYPT, 1994, pp. 77-85.
-
(1994)
Proc. EUROCRYPT
, pp. 77-85
-
-
Naccache, D.1
M'Raihi, D.2
Vaudenay, S.3
Raphaeli, D.4
-
13
-
-
84883356524
-
Batch fully homomorphic encryption over the integers
-
J. Cheon, J. Coron, J. Kim, and M. Lee, "Batch fully homomorphic encryption over the integers," in Proc. EUROCRYPT, 2013, pp. 315-335.
-
(2013)
Proc. EUROCRYPT
, pp. 315-335
-
-
Cheon, J.1
Coron, J.2
Kim, J.3
Lee, M.4
-
14
-
-
51349130622
-
An efficient signaturebased scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proc. IEEE INFOCOM, 2008, pp. 1409-1417.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1409-1417
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
15
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. S. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
-
(2008)
Proc. IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.S.5
-
16
-
-
84887266426
-
B-SPECS+: Batch verification for secure pseudonymous authentication in VANET
-
Nov
-
S. Horng, S. Tzeng, Y. Pan, and P. Fan, "b-SPECS+: Batch verification for secure pseudonymous authentication in VANET," IEEE Trans. Inf. Forensics Secur., vol. 8, no. 11, pp. 1860-1875, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Secur
, vol.8
, Issue.11
, pp. 1860-1875
-
-
Horng, S.1
Tzeng, S.2
Pan, Y.3
Fan, P.4
-
17
-
-
84957804123
-
Identification of bad signatures in batches
-
J. Pastuszak, D. Michalek, J. Pieprzyk, and J. Seberry, "Identification of bad signatures in batches," in Proc. 3rd Int. Workshop Practice Theory Public Key Cryptography, 2000, pp. 28-45.
-
(2000)
Proc. 3rd Int. Workshop Practice Theory Public Key Cryptography
, pp. 28-45
-
-
Pastuszak, J.1
Michalek, D.2
Pieprzyk, J.3
Seberry, J.4
-
18
-
-
84976428104
-
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
-
Jul
-
S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data," IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, Jul. 2016.
-
(2016)
IEEE Trans. Image Process
, vol.25
, Issue.7
, pp. 3411-3425
-
-
Hu, S.1
Wang, Q.2
Wang, J.3
Qin, Z.4
Ren, K.5
-
19
-
-
32244432588
-
Efficient identication of bad signatures in RSA-type batch signature
-
Jan
-
S. Lee, S. Cho, J. Choi, and Y. Cho, "Efficient identication of bad signatures in RSA-type batch signature," IEICE Trans. Fundamentals Electron. Commun. Comput. Sci., vol. E89-A, no. 1, pp. 74-80, Jan. 2006.
-
(2006)
IEICE Trans. Fundamentals Electron. Commun. Comput. Sci
, vol.E89-A
, Issue.1
, pp. 74-80
-
-
Lee, S.1
Cho, S.2
Choi, J.3
Cho, Y.4
-
20
-
-
38149073980
-
Finding invalid signatures in pairing-based bathes
-
Berlin, Germany: Springer
-
L. Law and B. Matt, "Finding invalid signatures in pairing-based bathes," in Cryptography and Coding. Berlin, Germany: Springer, 2007, pp. 34-53.
-
(2007)
Cryptography and Coding
, pp. 34-53
-
-
Law, L.1
Matt, B.2
-
21
-
-
78650256851
-
Attacking LCCC batch verification of RSA signatures
-
M. Stanek, "Attacking LCCC batch verification of RSA signatures," Int. J. Netw. Secur., vol. 6, no. 2, pp. 238-240, 2008.
-
(2008)
Int. J. Netw. Secur
, vol.6
, Issue.2
, pp. 238-240
-
-
Stanek, M.1
-
22
-
-
67049087745
-
Identification of multiple invalid signatures in pairingbased batched signatures
-
B. J. Matt, "Identification of multiple invalid signatures in pairingbased batched signatures," in Proc. 12th Int. Conf. Practice Theory Public Key Cryptography, 2009, pp. 337-356.
-
(2009)
Proc. 12th Int. Conf. Practice Theory Public Key Cryptography
, pp. 337-356
-
-
Matt, B.J.1
-
24
-
-
84855615935
-
On batch verification with group testing for vehicular communications
-
C. Zhang, P. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Netw., vol. 17, no. 8, pp. 1851-1865, 2011.
-
(2011)
Wireless Netw
, vol.17
, Issue.8
, pp. 1851-1865
-
-
Zhang, C.1
Ho, P.2
Tapolcai, J.3
-
25
-
-
84880254414
-
Toward a secure batch verification with group testing for VANET
-
C. Lee and Y. Lai, "Toward a secure batch verification with group testing for VANET," Wireless Netw., vol. 19, no. 6, pp. 1441-1449, 2013.
-
(2013)
Wireless Netw
, vol.19
, Issue.6
, pp. 1441-1449
-
-
Lee, C.1
Lai, Y.2
-
26
-
-
84869480265
-
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
-
J. A. Akinyele, M. Green, S. Hohenberger, and M. W. Pagano, "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes," in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 474-487.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur
, pp. 474-487
-
-
Akinyele, J.A.1
Green, M.2
Hohenberger, S.3
Pagano, M.W.4
-
27
-
-
84954234227
-
Game-theory-based batch identification of invalid signatures in wireless mobile networks
-
J. Chen, Q. Yuan, G. L. Xue, and R. Y. Du, "Game-theory-based batch identification of invalid signatures in wireless mobile networks," in Proc. IEEE INFOCOM, 2015, pp. 262-270.
-
(2015)
Proc. IEEE INFOCOM
, pp. 262-270
-
-
Chen, J.1
Yuan, Q.2
Xue, G.L.3
Du, R.Y.4
-
28
-
-
84904439253
-
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
-
Z. Lu, W. Wang, and C. Wang, "How can botnets cause storms? Understanding the evolution and impact of mobile botnets," in Proc. IEEE INFOCOM, 2014, pp. 1501-1509.
-
(2014)
Proc. IEEE INFOCOM
, pp. 1501-1509
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
-
29
-
-
60549085782
-
An em algorithm for Markov modulated Markov processes
-
Feb
-
Y. Ephraim and W. J. J. Roberts, "An EM algorithm for Markov modulated Markov processes," IEEE Trans. Signal Process., vol. 57, no. 2, pp. 463-470, Feb. 2009.
-
(2009)
IEEE Trans. Signal Process
, vol.57
, Issue.2
, pp. 463-470
-
-
Ephraim, Y.1
Roberts, W.J.J.2
|