![]() |
| 2008 | ||
|---|---|---|
| 5 | EE | Cungang Yang, Celia Li, Jie Xiao: Location-based design for secure and efficient wireless sensor networks. Computer Networks 52(16): 3119-3129 (2008) |
| 2007 | ||
| 4 | EE | Celia Li, Cungang Yang, Richard Cheung: Key management for role hierarchy in distributed systems. J. Network and Computer Applications 30(3): 920-936 (2007) |
| 2005 | ||
| 3 | EE | Celia Li, Cungang Yang, Richard Cheung: Key Management for Role Hierarchy in Distributed Systems. ACISP 2005: 293-302 |
| 2004 | ||
| 2 | EE | Cungang Yang, Celia Li: Access control in a hierarchy using one-way hash functions. Computers & Security 23(8): 659-664 (2004) |
| 1 | Cungang Yang, Celia Li, Chang N. Zhang: An XML-Based Administration Method on Role-Based Access Control in Distributed Systems. I. J. Comput. Appl. 11(2): 98-105 (2004) | |
| 1 | Richard Cheung | [3] [4] |
| 2 | Jie Xiao | [5] |
| 3 | Cungang Yang | [1] [2] [3] [4] [5] |
| 4 | Chang Nian Zhang (Chang N. Zhang) | [1] |