dblp.uni-trier.dewww.uni-trier.de

Yih-Chun Hu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
28EEJerry T. Chiang, Jason J. Haas, Yih-Chun Hu: Secure and precise location verification using distance bounding and simultaneous multilateration. WISEC 2009: 181-192
2008
27 Varsha K. Sadekar, Paolo Santi, Yih-Chun Hu, Martin Mauve: Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008 ACM 2008
26EEQing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe: SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. ASIACCS 2008: 201-204
25EEJerry T. Chiang, Yih-Chun Hu: Dynamic Jamming Mitigation for Wireless Broadcast Networks. INFOCOM 2008: 1211-1219
24EEKenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu: Security certificate revocation list distribution for vanet. Vehicular Ad Hoc Networks 2008: 88-89
2007
23 Wieland Holfelder, Paolo Santi, Yih-Chun Hu, Jean-Pierre Hubaux: Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, VANET 2007, Montréal, Québec, Canada, September 10, 2007 ACM 2007
22EEJerry T. Chiang, Yih-Chun Hu: Cross-layer jamming detection and mitigation in wireless broadcast networks. MOBICOM 2007: 346-349
21EETao Jiang, Helen J. Wang, Yih-Chun Hu: Preserving location privacy in wireless lans. MobiSys 2007: 246-257
20EEBryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu: Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300
2006
19EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2): 370-380 (2006)
2005
18EEYih-Chun Hu, Markus Jakobsson, Adrian Perrig: Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441
17EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2): 21-38 (2005)
2004
16EEYih-Chun Hu, David B. Johnson: Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks. ICDCS 2004: 301-310
15EEHelen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang: Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194
14EEYih-Chun Hu, David B. Johnson: Securing quality-of-service route discovery in on-demand routing for ad hoc networks. SASN 2004: 106-117
13EEYih-Chun Hu, Adrian Perrig, Marvin A. Sirbu: SPV: secure path vector routing for securing BGP. SIGCOMM 2004: 179-192
12EEYih-Chun Hu, Adrian Perrig: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3): 28-39 (2004)
2003
11EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. INFOCOM 2003
10EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Efficient Security Mechanisms for Routing Protocolsa. NDSS 2003
9EEJorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalChaudhuri, Amit Kumar Saha, David B. Johnson: Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. WMCSA 2003: 32-43
8EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Rushing attacks and defense in wireless ad hoc network routing protocols. Workshop on Wireless Security 2003: 30-40
7EEYih-Chun Hu, David B. Johnson, Adrian Perrig: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1(1): 175-192 (2003)
2002
6EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: a secure on-demand routing protocol for ad hoc networks. MOBICOM 2002: 12-23
5EEYih-Chun Hu, David B. Johnson: Ensuring cache freshness in on-demand ad hoc network routing protocols. POMC 2002: 25-30
4EEYih-Chun Hu, David B. Johnson, Adrian Perrig: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13
2001
3EEYih-Chun Hu, David B. Johnson: Implicit source routes for on-demand ad hoc network routing. MobiHoc 2001: 1-10
2000
2EEYih-Chun Hu, David B. Johnson: Caching strategies in on-demand routing protocols for wireless ad hoc networks. MOBICOM 2000: 231-242
1998
1EEJosh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta G. Jetcheva: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. MOBICOM 1998: 85-97

Coauthor Index

1Josh Broch [1]
2Jerry T. Chiang [22] [25] [28]
3Jason J. Haas [24] [28]
4Wieland Holfelder [23]
5Jean-Pierre Hubaux [23]
6Markus Jakobsson [18]
7Jorjeta G. Jetcheva [1] [9]
8Tao Jiang [21]
9David B. Johnson [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [14] [16] [17] [19]
10Kenneth P. Laberteaux [24]
11Qing Li [26]
12Bruce M. Maggs [20]
13David A. Maltz [1]
14Martin Mauve [27]
15Santashil PalChaudhuri [9]
16Bryan Parno [20]
17Adrian Perrig [4] [6] [7] [8] [10] [11] [12] [13] [17] [18] [19] [20] [26]
18Varsha K. Sadekar [27]
19Amit Kumar Saha [9]
20Paolo Santi [23] [27]
21Elaine Shi [20]
22Marvin A. Sirbu [13]
23Wade Trappe [26]
24Jesse Walker [26]
25Helen J. Wang [15] [21]
26Yi-Min Wang [15]
27Dan Wendlandt [20]
28Chun Yuan [15]
29Zheng Zhang [15]
30Meiyuan Zhao [26]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)