dblp.uni-trier.dewww.uni-trier.de

Chin-Tser Huang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEChin-Tser Huang: LOFT: Low-Overhead Freshness Transmission in Sensor Networks. SUTC 2008: 241-248
18EESen Xu, Chin-Tser Huang, Manton M. Matthews: Secure Multicast in WiMAX. JNW 3(2): 48-57 (2008)
2007
17EEXinliang Zheng, Chin-Tser Huang, Manton M. Matthews: Chinese remainder theorem based group key management. ACM Southeast Regional Conference 2007: 266-271
16EEChin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov: Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. GLOBECOM 2007: 2769-2773
15EEJeff Janies, Chin-Tser Huang: Fates: A Granular Approach to Real-Time Anomaly Detection. ICCCN 2007: 605-610
14EETheodor Richardson, Chin-Tser Huang: Containing Hitlist-Based Worms with Polymorphic Signatures. ICCCN 2007: 652-657
13EEChung-Kuo Chang, Chin-Tser Huang: Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. ICPP Workshops 2007: 46
12EEJeff Janies, Chin-Tser Huang, Nathan L. Johnson, Theodor Richardson: SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks. IJSNet 2(5/6): 358-367 (2007)
2006
11EESen Xu, Manton M. Matthews, Chin-Tser Huang: Security issues in privacy and key management protocols of IEEE 802.16. ACM Southeast Regional Conference 2006: 113-118
10EEChin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu: On capturing and containing E-mail worms. IPCCC 2006
9EEMohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang: Fault Masking in Tri-redundant Systems. SSS 2006: 304-313
8EEChin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006)
2005
7EEChin-Tser Huang, Mohamed G. Gouda: State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34
2003
6EEChin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27
5EEMohamed G. Gouda, Chin-Tser Huang: A secure address resolution protocol. Computer Networks 41(1): 57-71 (2003)
2002
4EEMohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy: Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468
3EEMohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002)
2001
2EEMohamed G. Gouda, Chin-Tser Huang, Anish Arora: On the Security and Vulnerability of PING. WSS 2001: 124-135
2000
1EEMohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop Integrity in Computer Networks. ICNP 2000: 3-11

Coauthor Index

1Alexander B. Alexandrov [16]
2Anish Arora [2]
3Chung-Kuo Chang [13]
4Jorge Arturo Cobb [9]
5E. N. Elnozahy (Elmootazbellah (Mootaz) Elnozahy) [1] [3] [4] [6] [8]
6Mohamed G. Gouda [1] [2] [3] [4] [5] [6] [7] [8] [9]
7Jeff Janies [10] [12] [15]
8Nathan L. Johnson [10] [12]
9Prasanth Kalakota [16]
10Alex X. Liu (Xiang-Yang Alex Liu) [10]
11Manton M. Matthews [11] [17] [18]
12Tommy M. McGuire [1] [3]
13Theodor Richardson [12] [14]
14Sen Xu [11] [18]
15Xinliang Zheng [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)