dblp.uni-trier.dewww.uni-trier.de

Yingfang Fu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEYingfang Fu, Jingsha He, Liangyu Luan, Rong Wang, Guorui Li: A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks. COMPSAC 2008: 68-71
12EEYingfang Fu, Jingsha He, Rong Wang, Guorui Li: Mutual Authentication in Wireless Mesh Networks. ICC 2008: 1690-1694
11EEGuorui Li, Jingsha He, Yingfang Fu: A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. ICDCS Workshops 2008: 309-314
10EEYingfang Fu, Jingsha He, Liangyu Luan, Guorui Li, Wang Rong: A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. KES-AMSTA 2008: 584-593
9EEGuorui Li, Jingsha He, Yingfang Fu: Group-based intrusion detection system in wireless sensor networks. Computer Communications 31(18): 4324-4332 (2008)
2007
8EEGuorui Li, Jingsha He, Yingfang Fu: A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. AINA Workshops (2) 2007: 127-132
7EEYingfang Fu, Jingsha He, Guorui Li: A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. COMPSAC (2) 2007: 75-80
6EEGuorui Li, Jingsha He, Yingfang Fu: Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks. International Conference on Computational Science (4) 2007: 409-416
5EEGuorui Li, Jingsha He, Yingfang Fu: Secure Multiple Deployment in Wireless Sensor Networks. MobiQuitous 2007: 1-4
2006
4EEGuorui Li, Jingsha He, Yingfang Fu: A Hexagon-Based Key Predistribution Scheme in Sensor Networks. ICPP Workshops 2006: 175-180
3EEYingfang Fu, Jingsha He, Guorui Li: A Composite Key Management Scheme for Mobile Ad Hoc Networks. OTM Workshops (1) 2006: 575-584
2EEGuorui Li, Jingsha He, Yingfang Fu: Key Predistribution in Sensor Networks. UIC 2006: 845-853
1EEGuorui Li, Jingsha He, Yingfang Fu: Key Management in Sensor Networks. WASA 2006: 457-466

Coauthor Index

1Jingsha He [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]
2Guorui Li [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]
3Liangyu Luan [10] [13]
4Wang Rong [10]
5Rong Wang [12] [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)