![]() | ![]() |
2008 | ||
---|---|---|
5 | EE | Cungang Yang, Celia Li, Jie Xiao: Location-based design for secure and efficient wireless sensor networks. Computer Networks 52(16): 3119-3129 (2008) |
2007 | ||
4 | EE | Celia Li, Cungang Yang, Richard Cheung: Key management for role hierarchy in distributed systems. J. Network and Computer Applications 30(3): 920-936 (2007) |
2005 | ||
3 | EE | Celia Li, Cungang Yang, Richard Cheung: Key Management for Role Hierarchy in Distributed Systems. ACISP 2005: 293-302 |
2004 | ||
2 | EE | Cungang Yang, Celia Li: Access control in a hierarchy using one-way hash functions. Computers & Security 23(8): 659-664 (2004) |
1 | Cungang Yang, Celia Li, Chang N. Zhang: An XML-Based Administration Method on Role-Based Access Control in Distributed Systems. I. J. Comput. Appl. 11(2): 98-105 (2004) |
1 | Richard Cheung | [3] [4] |
2 | Jie Xiao | [5] |
3 | Cungang Yang | [1] [2] [3] [4] [5] |
4 | Chang Nian Zhang (Chang N. Zhang) | [1] |