dblp.uni-trier.dewww.uni-trier.de

Donggang Liu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
23EEDazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Kung: Reusing Existing Test Cases for Security Testing. ISSRE 2008: 323-324
22EEQi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12
21EEDonggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008)
20EEDonggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008)
2007
19EEDonggang Liu: Efficient and Distributed Access Control for Sensor Networks. DCOSS 2007: 21-35
18EEDonggang Liu: Resilient Cluster Formation for Sensor Networks. ICDCS 2007: 40
17EEK. Mehta, Donggang Liu, M. Wright: Location Privacy in Sensor Networks Against a Global Eavesdropper. ICNP 2007: 314-323
16EEDonggang Liu, Qi Dong: Detecting Misused Keys in Wireless Sensor Networks. IPCCC 2007: 272-280
15EEQi Dong, Donggang Liu: Using Auxiliary Sensors for Pairwise Key Establishment in WSN. Networking 2007: 251-262
14EESencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007)
2006
13 Sencun Zhu, Donggang Liu: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
2005
12EESencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55
11EEDonggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619
10EEDonggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106
9EEDonggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
8EEDonggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20
7EEDonggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005)
6EEDonggang Liu, Peng Ning: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 1(2): 204-239 (2005)
2004
5EEDonggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004)
2003
4EEDonggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240
3EEDonggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61
2EEDonggang Liu, Peng Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003
1EEDonggang Liu, Peng Ning: Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82

Coauthor Index

1Qi Dong [15] [16] [22]
2Wenliang Du [8] [10] [11] [20] [21]
3Sushil Jajodia [9] [12] [14]
4David Kung [23]
5Yu Lei [23]
6Rongfang Li [7]
7An Liu [21]
8K. Mehta [17]
9Peng Ning [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [20] [21] [22]
10Sanjeev Setia [12] [14]
11Kun Sun [4]
12Cliff Wang [21]
13Wenhua Wang [23]
14M. Wright [17]
15Chao Yao [12] [14]
16Dazhi Zhang [23]
17Sencun Zhu [9] [12] [13] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)