dblp.uni-trier.dewww.uni-trier.de

Dijiang Huang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEZhibin Zhou, Dijiang Huang: SRK: A Distributed RFID Data Access Control Mechanism. ICC 2008: 2854-2858
16EEVinayak Kandiah, Dijiang Huang, Harsh Kapoor: C-Mix: A Lightweight Anonymous Routing Approach. Information Hiding 2008: 294-308
15EEDijiang Huang, Vinayak Kandiah, Mayank Verma: Privacy preservation services: challenges and solutions. SAC 2008: 2110-2115
14EEDijiang Huang, Deep Medhi: A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Networks 6(4): 560-577 (2008)
13EEDijiang Huang: Unlinkability Measure for IEEE 802.11 Based MANETs. IEEE Transactions on Wireless Communications 7(3): 1025-1034 (2008)
12EEHao Li, Jian Huang, Philip H. Sweany, Dijiang Huang: FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field. Journal of Systems Architecture - Embedded Systems Design 54(12): 1077-1088 (2008)
2007
11EEZhibin Zhou, Dijiang Huang: RFID Keeper: An RFID Data Access Control Mechanism. GLOBECOM 2007: 4570-4574
10EEDijiang Huang, Manish Mehta, Appie van de Liefvoort, Deep Medhi: Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. 15(5): 1204-1215 (2007)
9EEDijiang Huang: Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. IJSN 2(3/4): 272-283 (2007)
8EEDijiang Huang, Deep Medhi: Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. TOSN 3(3): (2007)
2006
7EEDijiang Huang: On Measuring Anonymity For Wireless Mobile Ad-hoc Networks. LCN 2006: 779-786
6EEDijiang Huang: Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems. Workshop on Wireless Security 2006: 65-74
5EEDijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi: New architecture for intra-domain network security issues. Commun. ACM 49(11): 64-72 (2006)
2005
4EEManish Mehta, Dijiang Huang, Lein Harn: RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. IPCCC 2005: 193-197
3EEDijiang Huang, Deep Medhi: A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks. IPDPS 2005
2004
2EEDijiang Huang, Manish Mehta, Deep Medhi, Lein Harn: Location-aware key management scheme for wireless sensor networks. SASN 2004: 29-42
1EEDijiang Huang, Deep Medhi: A key-chain-based keying scheme for many-to-many secure group communication. ACM Trans. Inf. Syst. Secur. 7(4): 523-552 (2004)

Coauthor Index

1Cory C. Beard [5]
2Qing Cao [5]
3Lein Harn [2] [4] [5]
4Jian Huang [12]
5Vinayak Kandiah [15] [16]
6Harsh Kapoor [16]
7Hao Li [12]
8Appie van de Liefvoort [10]
9Deep Medhi (D. Medhi) [1] [2] [3] [5] [8] [10] [14]
10Manish Mehta [2] [4] [10]
11Marc J. Schniederjans [5]
12Amit Sinha [5]
13Philip H. Sweany [12]
14Mayank Verma [15]
15Zhibin Zhou [11] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)