2008 |
19 | EE | Chin-Tser Huang:
LOFT: Low-Overhead Freshness Transmission in Sensor Networks.
SUTC 2008: 241-248 |
18 | EE | Sen Xu,
Chin-Tser Huang,
Manton M. Matthews:
Secure Multicast in WiMAX.
JNW 3(2): 48-57 (2008) |
2007 |
17 | EE | Xinliang Zheng,
Chin-Tser Huang,
Manton M. Matthews:
Chinese remainder theorem based group key management.
ACM Southeast Regional Conference 2007: 266-271 |
16 | EE | Chin-Tser Huang,
Prasanth Kalakota,
Alexander B. Alexandrov:
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks.
GLOBECOM 2007: 2769-2773 |
15 | EE | Jeff Janies,
Chin-Tser Huang:
Fates: A Granular Approach to Real-Time Anomaly Detection.
ICCCN 2007: 605-610 |
14 | EE | Theodor Richardson,
Chin-Tser Huang:
Containing Hitlist-Based Worms with Polymorphic Signatures.
ICCCN 2007: 652-657 |
13 | EE | Chung-Kuo Chang,
Chin-Tser Huang:
Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks.
ICPP Workshops 2007: 46 |
12 | EE | Jeff Janies,
Chin-Tser Huang,
Nathan L. Johnson,
Theodor Richardson:
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks.
IJSNet 2(5/6): 358-367 (2007) |
2006 |
11 | EE | Sen Xu,
Manton M. Matthews,
Chin-Tser Huang:
Security issues in privacy and key management protocols of IEEE 802.16.
ACM Southeast Regional Conference 2006: 113-118 |
10 | EE | Chin-Tser Huang,
Nathan L. Johnson,
Jeff Janies,
Alex X. Liu:
On capturing and containing E-mail worms.
IPCCC 2006 |
9 | EE | Mohamed G. Gouda,
Jorge Arturo Cobb,
Chin-Tser Huang:
Fault Masking in Tri-redundant Systems.
SSS 2006: 304-313 |
8 | EE | Chin-Tser Huang,
Mohamed G. Gouda,
E. N. Elnozahy:
Convergence of IPsec in presence of resets.
J. High Speed Networks 15(2): 173-183 (2006) |
2005 |
7 | EE | Chin-Tser Huang,
Mohamed G. Gouda:
State Checksum and Its Role in System Stabilization.
ICDCS Workshops 2005: 29-34 |
2003 |
6 | EE | Chin-Tser Huang,
Mohamed G. Gouda,
E. N. Elnozahy:
Convergence of IPsec in Presence of Resets.
ICDCS Workshops 2003: 22-27 |
5 | EE | Mohamed G. Gouda,
Chin-Tser Huang:
A secure address resolution protocol.
Computer Networks 41(1): 57-71 (2003) |
2002 |
4 | EE | Mohamed G. Gouda,
Chin-Tser Huang,
E. N. Elnozahy:
Key Trees and the Security of Interval Multicast.
ICDCS 2002: 467-468 |
3 | EE | Mohamed G. Gouda,
E. N. Elnozahy,
Chin-Tser Huang,
Tommy M. McGuire:
Hop integrity in computer networks.
IEEE/ACM Trans. Netw. 10(3): 308-319 (2002) |
2001 |
2 | EE | Mohamed G. Gouda,
Chin-Tser Huang,
Anish Arora:
On the Security and Vulnerability of PING.
WSS 2001: 124-135 |
2000 |
1 | EE | Mohamed G. Gouda,
E. N. Elnozahy,
Chin-Tser Huang,
Tommy M. McGuire:
Hop Integrity in Computer Networks.
ICNP 2000: 3-11 |